Mixed content refers to a security vulnerability where a website incorporates both secure (HTTPS) and insecure (HTTP) elements. This combination poses a risk as attackers can exploit the insecure elements to compromise the overall website security.


Everything is ok
1 script(s)
  All script files are secured

View resources
Total Resources
/static/js/main.fa22464d.js
7 stylesheets(s)
  All stylesheets files are secured

View resources
Total Resources
/favicon.svg
https://cdn.jsdelivr.net/npm/bootstrap@5.3.2/dist/css/bootstrap.min.css
/manifest.json
https://fonts.googleapis.com
https://fonts.gstatic.com
https://fonts.googleapis.com/css2?family=Inter:ital,opsz,wght@0,14..32,100..900;1,14..32,100..900&family=Onest:wght@100..900&display=swap
/static/css/main.85caf6f8.css

All resources are secured

The resources are encrypted and protected from potential eavesdropping or tampering. When the resources for mixed content are protected, it means that measures have been taken to secure resources (such as images, scripts, or stylesheets) loaded via HTTP on a web page served over HTTPS. This protection involves encrypting these resources during transmission to prevent eavesdropping and tampering. Additionally, features like Subresource Integrity (SRI) can be used to verify the integrity of these resources. These efforts collectively ensure that even mixed content remains secure, maintaining the overall safety and trustworthiness of the web page.