Hosting Location: San Francisco, California, United States ISP: Railway Status: Online (HTTP 200)
The application is hosted on Railway cloud infrastructure. This suggests a managed hosting environment where OS-level access may be abstracted.
SSL/TSL Config
DNS.
Cloudflare Name Servers:
Risk: Exposing the origin server IP bypasses CDN/WAF protection mechanisms.
Detected Open Ports:
Risk: For Port: 22 (SSH): Public SSH exposure increases attack surface:
DNSSEC Status: Not Found, the risk is allows potential DNS spoofing scenarios.
No security.txt
Conclusion: Overall, the current security posture demonstrates a stable and modern baseline configuration, particularly in terms of SSL/TLS implementation and limited exposed services. However, several infrastructure-level exposures remain, including public SSH access, visible origin IP, lack of DNSSEC, and absence of a security disclosure policy. While none of these findings indicate an immediate critical vulnerability, they increase reconnaissance visibility and potential attack surface. Strengthening network concealment, access control, and DNS integrity mechanisms would significantly improve resilience against automated attacks and targeted exploitation.
You can see all the reports here: https://jsonhero.io/j/zkvAeMsVXQbz