40
/100
D
◔ Limited 2⁄5
Shield
Protect digital identities and infrastructure by scanning for data breaches, malicious URLs, and compromised credentials. Secure interactions by detecting prompt injection attacks and evaluating plugin supply chain risks. Monitor the reputation of domains, IPs, and email addresses to defend against phishing and malware.
Email
Limited visibility
— 2/5 applicable dimensions scored
○ Schema Quality
○ Protocol
✓ Reliability
○ Docs & Maintenance
✓ Security Hygiene
— Schema Interpretability
A remote probe is needed for Protocol and Reliability scores.
Schema Quality
—
25% weight
Protocol Compliance
—
20% weight
Reliability
—
20% weight
Docs & Maintenance
—
15% weight
Security Hygiene
81
20% weight
Score History
Category Trends
30-Day Uptime
30 days ago
Today
Latest Health Check
Checked 4 weeks ago