Skip to main content

Remotely test for production best practices.

Project description

plain.scan

Scan websites for HTTP security misconfigurations.

Overview

Plain Scan checks production websites for common HTTP security issues: headers, SSL certificates, redirects, and server-level security settings.

You can try it immediately without installing anything:

uvx plain-scan github.com

Or visit plainframework.com/scan to scan URLs in your browser.

Plain Scan focuses on practical checks you should actually pay attention to. Every failure is highly actionable with specific guidance on what to fix.

Command line usage

Scan any URL by passing a domain or full URL:

plain-scan example.com
plain-scan https://example.com/login

Bare domains default to HTTPS.

Output formats

Choose between CLI, JSON, or Markdown output:

plain-scan example.com --format cli      # default, human-readable
plain-scan example.com --format json     # machine-readable
plain-scan example.com --format markdown # for reports

Disabling audits

Skip specific audits using --disable:

plain-scan staging.example.com --disable hsts --disable csp

This is useful for staging servers where you might not have HSTS configured yet.

Available audits to disable: csp, hsts, tls, redirects, content-type-options, frame-options, referrer-policy, cookies, cors.

Verbose mode

See the full response chain including headers and cookies:

plain-scan example.com --verbose

Using the Scanner programmatically

You can use the Scanner class directly in Python:

from plain.scan.scanner import Scanner

scanner = Scanner("https://example.com")
result = scanner.scan()

print(f"URL: {result.url}")
print(f"Passed: {result.passed}")
print(f"Audits: {result.passed_count}/{result.total_count} passed")

for audit in result.audits:
    status = "PASS" if audit.passed else "FAIL"
    print(f"  [{status}] {audit.name}")
    for check in audit.checks:
        print(f"    - {check.name}: {check.message}")

Disable specific audits by passing a set of slugs:

scanner = Scanner("https://staging.example.com", disabled_audits={"hsts", "csp"})

The scan result can be serialized to JSON:

import json
result_dict = result.to_dict()
print(json.dumps(result_dict, indent=2))

See ScanResult, AuditResult, and CheckResult for the full result structure.

Audits

Security checks are organized into audits. Each audit first checks if a security feature is detected, then runs specific checks to verify proper configuration.

Required audits

These audits fail if the security feature is missing or misconfigured:

Audit Description
CSP Content Security Policy protects against XSS and data injection
HSTS HTTP Strict Transport Security enforces HTTPS connections
TLS Validates SSL certificate and connection security
Redirects Ensures proper HTTP to HTTPS redirects
Content-Type-Options Prevents MIME-sniffing attacks
Frame-Options Prevents clickjacking attacks
Referrer-Policy Controls referrer information sharing

Optional audits

These audits only fail if the feature is detected but misconfigured:

Audit Description
CORS Cross-Origin Resource Sharing (only needed for cross-origin APIs)

Conditional audits

These audits are automatically detected and only checked when relevant:

Audit Description
Cookies Only checked if your site sets cookies in the response

FAQs

How does the scanner work?

Plain Scan makes a single unauthenticated GET request to the provided URL. It checks what can be inferred from the HTTP response and performs a TLS socket probe. It does not crawl additional pages, execute JavaScript, render in a browser, or follow authenticated flows.

Can I use this against development servers?

Yes. Plain Scan works against any URL, including localhost. Keep in mind that some checks (like TLS) may fail on development servers without valid certificates.

Why does the scanner flag Google Analytics or Google Tag Manager in my CSP?

These domains host JSONP endpoints that can be exploited to bypass CSP and execute arbitrary JavaScript. This is based on research from Google's CSP Evaluator team. If you must use these services, consider using nonce-based or hash-based CSP instead of domain allowlisting.

What about COOP/COEP/CORP headers?

Cross-origin isolation headers are not currently enforced. Most sites do not ship the full header trio yet, so Plain Scan treats them as optional for now.

What security standards does Plain Scan follow?

Plain Scan implements checks based on:

What tools complement Plain Scan?

Plain Scan focuses on HTTP-level security checks. For browser-based audits, performance, and client-side security, consider:

Installation

Web interface (no installation):

Visit plainframework.com/scan to scan any URL directly in your browser.

Command line (no installation):

uvx plain-scan github.com

This uses uvx to run plain-scan without adding it as a project dependency.

As a project dependency:

uv add plain.scan

Then run scans:

plain-scan example.com

Or use the Python API:

from plain.scan.scanner import Scanner

result = Scanner("https://example.com").scan()
print(f"Passed: {result.passed}")

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

plain_scan-0.6.2.tar.gz (30.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

plain_scan-0.6.2-py3-none-any.whl (41.2 kB view details)

Uploaded Python 3

File details

Details for the file plain_scan-0.6.2.tar.gz.

File metadata

  • Download URL: plain_scan-0.6.2.tar.gz
  • Upload date:
  • Size: 30.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: uv/0.10.6 {"installer":{"name":"uv","version":"0.10.6","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for plain_scan-0.6.2.tar.gz
Algorithm Hash digest
SHA256 5bf39a12befba0c8768d64acf57c60235ddb49bed102030c6d00d9ea40e4e015
MD5 c640a1fdab3294cf336cfa8db0ffa376
BLAKE2b-256 9000b9ff72f7f03d5ab51b4038dfa071225f712c92c90e169d30d059d2d20f80

See more details on using hashes here.

File details

Details for the file plain_scan-0.6.2-py3-none-any.whl.

File metadata

  • Download URL: plain_scan-0.6.2-py3-none-any.whl
  • Upload date:
  • Size: 41.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: uv/0.10.6 {"installer":{"name":"uv","version":"0.10.6","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for plain_scan-0.6.2-py3-none-any.whl
Algorithm Hash digest
SHA256 23fe69db68ad4a52aef28c3de993df5c7eea6cf2bf8b55de81c394d4fa8d18c0
MD5 ce04467465197332918eed854f59c82e
BLAKE2b-256 8da302d03371b58df2e27c25f05a1b9b1bfc540d7a1073d0b0b581a1e6a41027

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page