Lessons
-
Introduction
-
Search engine optimization
- Broken links
- Site map
- Micro-markup
- Robots.txt
- References
- Text
- Duplicates
- Basic
- Pictures
-
Speed
-
Minification
-
CSS minification
Minification of JavaScript files
Minification of inline CSS code
Minification of images without loss of quality
Minification of JavaScript files
Unused CSS code
Data optimization:Image URLs
Format of animated images
Unused JavaScript code
Using WebP
Image compression is missing
Video bitrate
-
Reducing requests
-
An overabundance of small pictures
Ungrouped CSS files
Ungrouped JavaScript files
An overabundance of fonts
Availability of end-to-end CSS, JS files
The presence of a monochrome font
Uploading duplicate files
Using JS facades
Redirecting JavaScript code
Adding lazy loading
Redirect from/to www version
- Fonts
- Loading time
- Server Settings
- Pictures
- The first content
-
Minification
- Mobility
- Bugs
-
Convenience
- Social networks
- Web Application Manifest
- Favicons
- Basic
- Text readability
-
Security
- Encrypted connection
- Exploits
-
Vulnerabilities
-
Vulnerable JavaScript code
Vulnerable JavaScript library
Antiviruses
SSL vulnerabilities
Vulnerable JavaScript library
Usually, an attacker uses a whole chain of vulnerabilities in an attack. A single problem does not mean that your site can be hacked. But it’s still worth fixing the problem.
We use the library [Retire.js ](https://retirejs .github.io/retire.js/) to search for vulnerabilities. It contains more than 450 different popular libraries that are used on almost every site.
In this check, we check the JavaScript files themselves.
Each vulnerability is relevant for a specific version of the library.When a new security breach becomes known, a new version of the library is released. Thus, if you are using the latest version, you can be sure that no vulnerabilities have been detected.
Any comments or additions? Send us an email admin@site-alarm.com .
Check your website