Confidential

Security Assessment: myseodesk.com

External reconnaissance and vulnerability assessment for myseodesk developer portfolio.

Date: March 17, 2026 Prepared by: myseodesk Target: myseodesk.com (Cloudflare proxy) Type: External / Non-Authenticated
1
Critical
2
High
4
Medium
4
Informational

Executive Summary

An external security reconnaissance of myseodesk.com was conducted on March 17, 2026. The assessment examined the site's SSL/TLS configuration, HTTP security headers, DNS records, email authentication, subdomain exposure, and technology stack from an unauthenticated external perspective.

The site runs behind Cloudflare with solid basics including HSTS with includeSubDomains, X-Frame-Options, and X-Content-Type-Options. However, critical gaps exist: there is no Content-Security-Policy header, the origin server IP is exposed in the SPF record (allowing Cloudflare bypass), and the robots.txt reveals internal application paths. The site hosts multiple backend services (portal, phonesys, sillygames) and has 10 subdomains discoverable via Certificate Transparency logs.

Findings

Critical
Missing Content-Security-Policy Header
No CSP header is set, providing zero browser-level defense against XSS and content injection attacks. Given that the site hosts PHP applications (chat API, portal) and multiple backend services, a single XSS vulnerability anywhere could compromise user sessions or inject malicious content.
Fix: Implement a CSP starting with Content-Security-Policy: default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline' fonts.googleapis.com; and iterate. Consider CSP report-only mode first.
High
Origin Server IP Exposed in SPF Record
The SPF TXT record contains ip4:45.32.160.36, which is the origin server IP. This allows attackers to bypass Cloudflare entirely by sending requests directly to the origin, circumventing WAF rules, rate limiting, and DDoS protection.
Fix: Remove the direct IP from SPF. Use Cloudflare's email routing exclusively or route outbound mail through a third-party SMTP service (smtp2go is already configured). On the origin server, configure the firewall to only accept HTTP/HTTPS from Cloudflare IP ranges.
High
robots.txt Reveals Internal Application Paths
The robots.txt file disallows /api/, /portal/, /nexus/, /phonesys/, /sillygames/, /jesse-panel/, and /jmfield/zaps/. While intended to block crawlers, this serves as a public directory of internal applications for any attacker to probe.
Fix: Remove internal paths from robots.txt. Instead, protect sensitive paths with authentication or Cloudflare Access rules. Keep only the Sitemap directive and a general Allow.
Medium
Missing Permissions-Policy Header
No Permissions-Policy is set, meaning embedded iframes and third-party scripts can access browser APIs (camera, microphone, geolocation, payment) without restriction.
Fix: Add Permissions-Policy: camera=(), microphone=(), geolocation=(), payment=() to restrict unused APIs.
Medium
SPF Uses Softfail (~all) Instead of Hardfail (-all)
The SPF record ends with ~all (softfail), which marks unauthorized senders as suspicious but does not reject them outright.
Fix: After confirming all legitimate sending services are covered, change ~all to -all (hardfail).
Medium
DMARC Policy Set to Quarantine (Not Reject)
DMARC is configured with p=quarantine at 100% enforcement. Spoofed emails are quarantined rather than rejected, meaning some may still reach recipients' spam folders.
Fix: After monitoring DMARC reports via Brevo, upgrade to p=reject to fully block spoofed emails.
Medium
No CAA DNS Records
No Certificate Authority Authorization records exist. Any CA in the world can issue certificates for myseodesk.com.
Fix: Add CAA records: 0 issue "pki.goog" and 0 issue "letsencrypt.org".
Info
Deprecated X-XSS-Protection Header Present
The X-XSS-Protection: 1; mode=block header is set, but this header is deprecated in modern browsers and can introduce vulnerabilities in older browsers. Modern CSP is the correct replacement.
Fix: Remove the X-XSS-Protection header once CSP is implemented. It provides no benefit in modern browsers.
Info
No IPv6 (AAAA) Record
The domain has no AAAA record. While not a vulnerability, IPv6 support is increasingly expected.
Info
No security.txt File
No /.well-known/security.txt file exists. This RFC 9116 standard file provides security researchers a way to report vulnerabilities responsibly.
Fix: Create a security.txt with contact info at /.well-known/security.txt.
Info
10 Subdomains Discoverable via CT Logs
Certificate Transparency logs reveal 10 subdomains. While the wildcard cert reduces exposure, individual subdomain certificates have been issued that expose names like git.myseodesk.com, voip.myseodesk.com, and ringnow.myseodesk.com.

Positive Findings

ControlStatusDetails
TLS ConfigurationStrongTLSv1.3 with AES-256-GCM-SHA384 cipher suite.
HTTP to HTTPS RedirectEnabled301 permanent redirect from HTTP to HTTPS.
HSTSActivemax-age=15552000 with includeSubDomains.
X-Frame-OptionsActiveSAMEORIGIN prevents clickjacking.
X-Content-Type-OptionsActivenosniff prevents MIME-sniffing attacks.
Referrer-PolicyActivesame-origin prevents referrer leakage.
X-Permitted-Cross-Domain-PoliciesActivemaster-only restricts Flash/PDF cross-domain access.
No Sensitive Files ExposedClean.env, .git/config, phpinfo.php all return 404.
API Path ProtectedBlocked/api/ returns 403 Forbidden.
No Session CookiesCleanNo cookies set on homepage response.

Technology Stack

LayerTechnology
CDN / ProxyCloudflare (Miami POP)
Origin Servernginx (CloudPanel)
SSLGoogle Trust Services / Cloudflare (TLSv1.3)
FrontendStatic HTML, Tailwind CSS (app.min.css)
BackendPHP (chat API, portal), FastAPI (phonesys)
FontsGoogle Fonts (Inter, JetBrains Mono)
EmailCloudflare Email Routing + smtp2go.com + Brevo
DNSCloudflare (lennox, princess)
SEOSchema.org JSON-LD (Person, WebSite, Organization, FAQPage)

Subdomain Enumeration (10 discovered)

Source: Certificate Transparency logs (crt.sh). Highlighted entries indicate potentially sensitive infrastructure.

git.myseodesk.com link.myseodesk.com med-vision.myseodesk.com mobile-detail.myseodesk.com ringnow.myseodesk.com screensareus.myseodesk.com voip.myseodesk.com workflow.myseodesk.com www.myseodesk.com

DNS Configuration

RecordValue
A104.21.44.67, 172.67.196.115 (Cloudflare proxy)
AAAANone (no IPv6)
NSprincess.ns.cloudflare.com, lennox.ns.cloudflare.com
MXCloudflare Email Routing (route1/2/3.mx.cloudflare.net)
SPFv=spf1 ip4:45.32.160.36 include:_spf.mx.cloudflare.net include:spf.smtp2go.com ~all
DMARCv=DMARC1; p=quarantine; pct=100; rua=mailto:rua@dmarc.brevo.com

Priority Remediation Roadmap

Immediate (This Week)

#ActionImpact
1Add Content-Security-Policy header (start in report-only mode)XSS mitigation layer for all hosted applications
2Remove origin IP (45.32.160.36) from SPF recordPrevents Cloudflare bypass attacks
3Remove internal paths from robots.txtStops advertising internal application structure

Short-Term (30 Days)

#ActionImpact
4Add Permissions-Policy headerRestricts browser API access
5Change SPF from ~all to -all (hardfail)Stronger email spoofing rejection
6Add CAA DNS recordsRestricts certificate issuance to authorized CAs
7Lock origin firewall to Cloudflare IP ranges onlyPrevents direct-to-origin attacks

Medium-Term (60-90 Days)

#ActionImpact
8Upgrade DMARC from quarantine to rejectFull email spoofing protection
9Add security.txt fileResponsible disclosure channel
10Remove deprecated X-XSS-Protection headerEliminates legacy attack surface
11Increase HSTS max-age to 31536000 and add preloadHSTS preload list eligibility

Disclaimer

This assessment was performed from an external, unauthenticated perspective using publicly available information and standard reconnaissance techniques. It does not constitute a full penetration test. No exploitation of vulnerabilities was attempted. Findings are based on data available at the time of assessment and may change as the target environment evolves. This report is confidential and intended solely for the authorized recipient.