1.) The first thing I noticed was "delivery by mail" in the top text,
and it made me concerned; any communication of potential vulnerabilities
(i.e. scan results) should be properly encrypted to the recipient and
authenticated from you.<p>2.) The site layout (css) is buggy. On older browsers, some text is
positioned partially off screen on the left. Yes, supporting old
browsers is a pain, but within reason, it's worthwhile.<p>3.) The top menu has a white text, but since the top menu stays in place
when scrolling on to a white background below, the menu text becomes
unreadable (white on white).<p>Good Luck!
How is PatrolServer's own security? Are results encrypted? Can the results be gathered (i.e. 'site X is vulnerable to exploits A, B and C)? I know that sounds like security by obscurity, but it has to be asked.<p>I'd much prefer to install a tool on the actual server that reports a local report. But that's hard to monetize.
Thanks everybody! 1 day on Hacker News, 1574 uniques, 103 signups, 15% signup rate and 53% total vulnerability rate. You all have some fixing to do. If you have more feedback, let us know (or spread the love).
Eh, it just seems to compare detected versions against the latest version of software. It would be nice if it said <i>why</i> the installed version is vulnerable, links to CVEs, etc.