SiteShadow
Back to vulnerability library

SCP09 Communication Security

What this means

SiteShadow flagged transport security patterns that are weak or disabled (HTTP instead of HTTPS, TLS verification disabled, permissive TLS settings, insecure redirects).

Why it matters

Weak transport security allows interception or tampering.

Safer examples

1) Enforce HTTPS and strict TLS verification

Never disable certificate verification in production (see CWE-295 / T01).

2) Use HSTS to prevent downgrade to HTTP

Set Strict-Transport-Security with an appropriate max-age once HTTPS is stable.

3) Use safe clients with timeouts

Set timeouts and restrict TLS versions/ciphers where appropriate (see CWE-757).

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage