Subresource Integrity (SRI) is a web development security mechanism that guarantees the authenticity and integrity of external resources like scripts and stylesheets. By including a cryptographic hash in the resource reference, browsers can verify that the resources haven't been tampered with before loading and executing them.


Check completed with warnings

9 script(s)
  2 resources secured out of 9

View resources
Resource Type Resource Source
External https://s1.wp.com/_static/??-eJzTLy/QTc7PK0nNK9HPKtYvyinRLSjKr6jUyyrW0QfKZeYl55SmpBaDJLMKS1OLKqGUXm5mHkFFurmZ6UWJJalQxfa5tobmRgamxgZmFpZZACbyLJI=
External https://v0.wordpress.com/js/next/videopress-iframe.js?m=1725245713
Local //0.gravatar.com/js/hovercards/hovercards.min.js?ver=2024474048849247f5660a2d05b85c6fc286379897f30a1061ad46e7f037e059ed7fe7
External https://s2.wp.com/wp-content/mu-plugins/gravatar-hovercards/wpgroho.js?m=1610363240i
External https://s0.wp.com/_static/??-eJydUMtOAzEM/CFSw6KqcEB8CsrD2XrXsdN1Utq/Z6laCXFAKsfxvDSGz+qiSkNpMBkUDcTouuHix/XmSLJuJnuAH7rSXeU+khgwzWhw6Nhx7yUxLn+IJ2zVx/mKwbrAB0mE0IkTrE0k1NBZXJT5hs+bQvI7tO2xrL21h9XcmoobwJths8sIf69D/JFG30jv9NlM1THJ7LLGbi7T6R/7s48YVGeHJWC6BawM94SXnkTW4IiSdPmmqvI5E/P1Ne/l7Wk3vO5ehufH7fQFC7atNA==
External https://s0.wp.com/wp-content/plugins/gutenberg-core/v19.6.4/build/hooks/index.min.js?m=1731954715i&ver=84e753e2b66eb7028d38
External https://s0.wp.com/wp-content/plugins/gutenberg-core/v19.6.4/build/i18n/index.min.js?m=1731954715i&ver=bd5a2533e717a1043151
External https://s1.wp.com/_static/??-eJylUe1OwzAMfCEyr0wqvxCPgkzitS75Uux02tsv2toxjQkk+BXf2T7fKXDIxqaoFBVCNdnXgaPARJrRfppGHbJNYWmA1AgzRZcKYNUUUJXtddp6FGFrdKRAZiSfqYBjUSgkOUXhmczMjpJ8ZzaTPMGNm9XKuQtNmLT5WvD65iYjhvcF20HMfC/yINJNkneOFj4qewcWS6pC/ivLQmwCxz+rKntyZkDvqRx/Qv+6IiMWcujc8VxyHH6RW7Nd/vYOtr238Nq97LZd1z/3/XQCUB/PBA==
Local //stats.wp.com/w.js?67

10 stylesheets(s)
  0 resources secured out of 10

View resources
Resource Type Resource Source
External https://s1.wp.com/_static/??-eJxtzE0KgCAQQOELZaMguIrOEmYxNY7SKNHt+6Ndyw8eD/asfOISuECsKlOdkQUI1yCwhJIHv6pHrRdp4D//wtcglSGmsdL1QJ6QsQQlfktEn49718fOOOOsttrZ5QRuhjNe&cssminify=yes
External https://s0.wp.com/_static/??-eJydzMsOwiAQheEXEibEXtKF8VmATggVgcwMNby91U13LlyenHw/vKryJQtmgZpaiJkhtGM6pHA8hLCbRU96ANdiWsGl4h8qRUeWOrD0hNozX+Bn6KsYNpRqP9z20kQFiuu/CbISc+CT3583M1/NMg6zGbc3O1tP4A==&cssminify=yes
External https://s2.wp.com/_static/??-eJzTLy/QzcxLzilNSS3WzyrWz01NyUxMzUnNTc0rQeEU5CRWphbp5qSmJyZX6uVm5uklFxfr6OPTDpRD5sM02efaGpoZmFkYGRuZGmQBAHPvL0Y=&cssminify=yes
External https://s2.wp.com/wp-content/plugins/coblocks/2.18.1-simple-rev.4/dist/coblocks-style.css?m=1681832297i&cssminify=yes
External https://s2.wp.com/_static/??-eJx9jcEKg0AMRH+oaVhorR7Eb9E16IpZg8min2889FZ6GYbhPQYPgbhlo2zIBWQtU8qKcdvJd5be0AmmMfW0Ejv2jKoP/K0daZzIXNdvB6PzvyJ+A8MgO6mCJ6fCYLN/6e113IZXU9WfUL/DcgHSTkDo&cssminify=yes
External https://s2.wp.com/_static/??-eJzTLy/QTc7PK0nNK9EvyUjNTS3WLyhN0k8qLSnJz9M10i8uqcxJ1UsuLtbRJ6AyKSc/ObuYKKWZeckQg3XLC5Lzc0F67HNtDc0NjQzNzE2MLbIAZ1o1+w==&cssminify=yes
External https://s1.wp.com/_static/??-eJzTLy/QTc7PK0nNK9HPLdUtyClNz8wr1i9KTcrJTwcy0/WTi5G5ekCujj52Temp+bo5+cmJJZn5eSgc3bScxMwikFb7XFtDE1NLExMLc0OTLACohS2q&cssminify=yes
External https://s1.wp.com/wp-content/mu-plugins/global-print/global-print.css?m=1465851035i&cssminify=yes
External https://s0.wp.com/_static/??-eJyNjcsKQjEMBX/ImlsQry7ET5GahrbXNCmmRfx7H7gRN+7OwGEGbs2hSifpUIdrPFIRg4V6C3j5MNgQqBoHk4HlcKUYYry/Z5G0RrMV/C06FUEwxRLYsSa1L/iR9Uz1mc0bSKznwK/DsR787Kd5P/ntbnkAuNBIYA==&cssminify=yes
External https://s0.wp.com/_static/??-eJylkMFqxDAMRH+oqtgtJafSb3FlkdVWtowlJ+zfN4UltBT2kN40I+kxDK4NyGpwDSwDmo5ZquOVoyX6hM1aG1m5L9BHxYVrto5phJUUIbRfkyZ3IYgLF4YLa+OOWTywszerLgvDIpnN/zrP5P6Ej+P8SFEsD2XHVfLM4RjWoJlvk8dN+Z80N5KkINv3b3GQS6nbcFb0VbZS4GPUfDjkDtt7vxsHeSHKGeakyv32SH3z38vbaTpNry/n8zRdvwAp29tH&cssminify=yes

Subresource Integrity is present with warnings

When not all resources on a website have Subresource Integrity (SRI) implemented correctly, and some external resources lack the necessary integrity hashes, the website's security is potentially compromised. This situation creates vulnerabilities, especially for resources loaded from third-party servers, where the site owner has less control. Consequently, the website may be exposed to security risks like malicious script execution, impacting both the site's integrity and the safety of its users.