At the time of this assessment, the .env file at perfectcopier.com/.env returned HTTP 200 and contained fully exposed credentials. The following sensitive values were confirmed visible: database credentials (username perfectcopier_root with plaintext password), APP_KEY, JWT_SECRET, mail server password, and Sentry DSN. This file was accessible to anyone on the internet. The exposure has been remediated during this scan session via .htaccess block, but all exposed credentials must be treated as compromised and rotated immediately. There is no way to determine whether this file was previously accessed by a malicious actor.
Fix: Verify .htaccess block is in place and .env now returns 403. Rotate ALL exposed credentials immediately: change the database password for perfectcopier_root, regenerate APP_KEY with php8.2 artisan key:generate, regenerate JWT_SECRET, change the mail server password, and revoke the Sentry DSN. Review server access logs for any prior requests to /.env. Update all rotated values in the live .env file on the server.
The site returns no security-related HTTP headers whatsoever. There is no HSTS, no X-Frame-Options, no X-Content-Type-Options, no Content-Security-Policy, no Referrer-Policy, and no Permissions-Policy. This is the baseline expected header set for any production web application, and its complete absence means the site is maximally exposed to header-based attacks including clickjacking, MIME sniffing, XSS, and referrer leakage.
Fix: Add all required security headers in the nginx configuration for perfectcopier.com. At minimum: Strict-Transport-Security: max-age=31536000; includeSubDomains, X-Frame-Options: SAMEORIGIN, X-Content-Type-Options: nosniff, Referrer-Policy: strict-origin-when-cross-origin, and a CSP policy appropriate for the Laravel + Angular stack.
The DMARC record for perfectcopier.com is set to p=none, which is monitor-only mode. While this collects aggregate report data, it provides zero enforcement -- spoofed emails impersonating perfectcopier.com will not be quarantined or rejected by receiving mail servers that respect DMARC policy.
Fix: Review DMARC aggregate reports (rua) for two to four weeks to identify all legitimate senders. Once confirmed, upgrade the policy to p=quarantine, then to p=reject after further monitoring.
The SPF record for perfectcopier.com explicitly includes the IP address 207.148.5.50, which is the old CentOS 7 server currently being decommissioned. This server is no longer under active management for perfectcopier.com, and its inclusion in SPF means that if the server were to be reassigned or compromised, it would be an SPF-authorized sender for perfectcopier.com email.
Fix: Remove the ip4:207.148.5.50 entry (or the include: that references it) from the SPF record. After removing, verify email deliverability from the remaining authorized senders using an SPF testing tool.
HTTP responses include a custom header x-debug-location: sales-dashboard-prefix. This is a debug or diagnostic header that was left active in the production nginx or Laravel configuration. It exposes internal routing information to anyone who inspects response headers, assisting attackers in mapping the application structure.
Fix: Remove the debug header from the nginx server block configuration. If this header was added in Laravel middleware or a service provider, remove it from the production code path. Audit all response headers for any other debug or diagnostic values.
The origin server uses a self-signed SSL certificate. While Cloudflare's proxy layer provides a valid certificate to end users, the connection between Cloudflare and the origin server is either unencrypted or using a self-signed certificate that Cloudflare cannot fully validate. If Cloudflare SSL mode is set to "Flexible," traffic between Cloudflare and origin travels over HTTP. Even in "Full" mode, the self-signed cert cannot be verified, leaving the connection susceptible to interception.
Fix: Replace the self-signed certificate with a Cloudflare Origin CA certificate. This is a free certificate issued by Cloudflare specifically for securing the Cloudflare-to-origin connection. Set Cloudflare SSL mode to "Full (strict)" after installing the Origin CA cert.
Navigating to perfectcopier.com redirects immediately to /sales-dashboard/, which appears to be an internal application panel. There is no public-facing homepage or landing page. This exposes the application entry point directly to unauthenticated users and reduces the perceived legitimacy of the domain.
Fix: Configure a proper public landing page at the root, or add Cloudflare Access authentication in front of the /sales-dashboard/ path to require login before the application is reachable. At minimum, ensure the dashboard page itself requires authentication before rendering any content.
Certificate transparency logs show approximately 20 subdomains registered for perfectcopier.com, including test, demo, and node environments. These subdomains may represent staging or development environments that have not received the same security attention as the production site.
Fix: Audit all subdomains. Decommission any that are no longer needed. Apply authentication and security headers to all active subdomains, particularly test and staging environments which often contain older code versions with known vulnerabilities.
No security.txt file is present at /.well-known/security.txt, making it unclear how security researchers should report vulnerabilities.
Fix: Add a security.txt file with a contact email for responsible disclosure reports.