Skip to main content

Is 2w.ma a Scam? Security Check Results - 草料二维码 Reviews

2w.ma favicon

Is 2w.ma Safe? Security Analysis for 草料二维码

Check if 2w.ma is a scam or legitimate. Free security scan and reviews.

TechnologyChinamedium
JavaScriptAnt Design (ant- CSS classes)Matomo AnalyticsBaidu AnalyticsVolcano JS SDK+1 more
Analyzed 8/3/2025Completed 12:52:04 PM
54
Security Score
MEDIUM RISK

AI Summary

The website 2w.ma operates as a specialized file transfer tool branded as "草船", affiliated with the 草料二维码 platform. It provides users a convenient method to transfer files from mobile devices to PCs via QR codes, supporting various file types including photos, videos, and text. The service targets primarily Chinese-speaking mobile users seeking quick and easy file transmission solutions. The business model appears to be a free utility integrated within a larger QR code ecosystem, with community support and potential for monetization through related services. Technically, the site employs modern web technologies including Vue.js and Ant Design for UI, and integrates analytics tools such as Matomo and Baidu Analytics. The site is mobile-optimized and provides a smooth user experience, though accessibility features are basic. Performance is moderate with asynchronous loading of scripts and standard SEO meta tags. From a security perspective, the site uses HTTPS and avoids exposing sensitive data in the HTML. However, it lacks visible security headers and explicit privacy or cookie consent mechanisms, which are important for compliance and user trust. No incident response or vulnerability disclosure information is provided, indicating room for improvement in security transparency. Overall, the domain registration data aligns well with the website content and business claims, showing a mature and legitimate operation. The site is safe for general audiences with no adult or questionable content detected. Strategic recommendations include enhancing privacy compliance, implementing security headers, and publishing clear contact and security policies to improve trust and compliance posture.

Detected Technologies

JavaScriptAnt Design (ant- CSS classes)Matomo AnalyticsBaidu AnalyticsVolcano JS SDKWeixin JS SDK

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

2w.ma is positioned as a niche technology service within the Chinese market, leveraging the popularity of QR codes for file transfer. Its competitive advantage lies in simplicity and integration with the 草料二维码 ecosystem, which has a significant user base. The business model focuses on providing a free, easy-to-use tool that drives engagement and potential upsell opportunities within the parent platform. The target customers are individual mobile users and small office users needing quick file transfers. Growth indicators include the reported tens of millions of files transferred. The partnership with cli.im and the presence of an active community forum suggest a collaborative ecosystem supporting product development and user engagement.

Security Posture Analysis

Comprehensive Security Assessment

The website demonstrates a basic security maturity level with HTTPS enabled and no obvious exposure of sensitive data. However, the absence of security headers such as Content Security Policy, HSTS, and X-Frame-Options reduces its defense-in-depth posture. Lack of published security policies, incident response contacts, and vulnerability disclosure mechanisms indicates limited transparency and preparedness for security incidents. The use of third-party analytics and SDKs introduces potential privacy and security risks if not properly managed. Overall, the security posture is functional but could benefit from enhancements to align with best practices and regulatory compliance.

Strategic Recommendations

Priority Actions for Security Improvement

1

Implement comprehensive security headers including CSP, HSTS, and X-Frame-Options to strengthen browser security.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

草料二维码

Description:

草料二维码提供文件传输功能,可以在扫码后把文件传至电脑,支持传输手机中保存的文件、照片、微信聊天记录中的文件,以及草料文件码中的文件。草船是草料二维码传输工具的简称,主要用于手机向PC快速传输文件。

Key Services:
二维码文件传输手机文件传输到电脑支持图片、视频、文本等多种文件类型
Content Quality:

good

Branding:

consistent

Technical Stack

Technologies:
JavaScriptAnt Design (ant- CSS classes)Matomo AnalyticsBaidu AnalyticsVolcano JS SDKWeixin JS SDK
Frameworks:
Vue.jsAnt Design
Platforms:
Web
Performance:

moderate

Mobile:

good

Accessibility:

basic

SEO:

basic

Security Assessment

Security Score:
65/100
Best Practices:
  • HTTPS usage implied by URL (https://2w.ma/)
  • No visible exposed sensitive data in HTML

Analytics & Tracking

Services:
MatomoBaidu Analytics
Tracking Level:moderate
Privacy Compliance:basic

Advertising & Marketing

Tracking Pixels:
MatomoBaidu Analytics
Marketing Tools:
Volcano JS SDKCAT Mini
Transparency Level:basic

Website Quality Assessment

Design Quality:good
User Experience:good
Content Relevance:good
Navigation Clarity:good
Professionalism:good
Trustworthiness:moderate

Key Observations

1

Website is fully accessible with no blocking or WAF challenges.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

15/100
Score

Missing Strict-Transport-Security header

HIGH

Forces HTTPS connections

Missing X-Frame-Options header

HIGH

Prevents clickjacking attacks

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

50/100
Score

No Privacy Policy found

HIGH

GDPR requires a clear and accessible privacy policy

No Cookie Policy found

HIGH

GDPR requires clear information about cookie usage

No Cookie Consent Banner found

HIGH

GDPR requires explicit consent for non-essential cookies

GDPR Compliance Analysis

Privacy Policy0% confidence
Cookie Policy0% confidence
Contact Information Found90% confidence
phone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

2/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

Critical sector without clear security compliance

HIGH

Detected sectors: transport, digital

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

60/100
Score

No DKIM record found

MEDIUM

DKIM adds cryptographic signatures to emails

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

No email authentication configured

CRITICAL

Domain is vulnerable to email spoofing

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

67/100
Score

Weak Protocols Supported

HIGH

Server supports weak protocols: TLSv1.1

OCSP Stapling Not Enabled

LOW

OCSP stapling improves performance and privacy

Certificate Transparency Not Implemented

LOW

Certificate is not logged in Certificate Transparency logs

Mixed Content Detected

MEDIUM

1 resources loaded over insecure HTTP

Partial SSL/TLS Assessment

LOW

Completed 3 of 4 security checks due to time constraints

Protocol Support

TLSv1.3TLSv1.2TLSv1.1

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

60/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

Domain Transfer Lock Not Enabled

MEDIUM

Domain can be transferred without authorization

Domain Delete Lock Not Enabled

LOW

Domain can be deleted without additional verification

No DMARC Record

MEDIUM

DMARC policy not configured

Domain Registration Details

Domain Age
11 years(mature)
Expiry Risk
none(785 days)
Protection Level
none
Suspicious Indicators Detected
  • No domain protection locks enabled

DNS Records

A Records:47.98.167.208
Name Servers:
ns3.dnsv3.com
ns4.dnsv3.com
SOA:Serial: 1751338266, TTL: 180s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:422ms

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

100/100
Score

Good Network Security Posture

LOW

No unnecessary services detected on common risky ports

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website is built on a modern JavaScript framework (Vue.js) with Ant Design UI components, indicating a contemporary front-end architecture. It uses asynchronous loading for analytics and SDK scripts, which helps performance. The site is mobile-optimized with responsive design and viewport meta tags. SEO is basic but present with meta descriptions and keywords. No CMS is detected, suggesting a custom or SPA-based deployment. Hosting details are not explicit but the use of multiple external domains for static resources and analytics indicates a distributed infrastructure. Performance is moderate with room for optimization in accessibility and SEO. Technical risks include reliance on multiple third-party scripts without visible integrity checks or security headers.
Analyze Another Website