Skip to main content

Is cnfth.com a Scam? Security Check Results - 深圳市江胜科技有限公司 Reviews

cnfth.com favicon

Is cnfth.com Safe? Security Analysis for 深圳市江胜科技有限公司

Check if cnfth.com is a scam or legitimate. Free security scan and reviews.

E-commerceChinasmall
jQuerySWFObjectjCarouselJavaScript
Analyzed 8/2/2025Completed 9:15:59 AM
31
Security Score
HIGH RISK

AI Summary

The website cnfth.com represents Shenzhen Jiangsheng Technology Co., Ltd., a small-sized Chinese company specializing in e-commerce management software primarily targeting AliExpress and other cross-border platforms. Their flagship product, the Global Trading Assistant, offers multi-store product and order management, batch data modification, logistics tracking, and customized services tailored for sellers on platforms like AliExpress, eBay, and Dunhuang. The company positions itself as a niche provider of third-party tools to enhance seller efficiency and cross-platform data interoperability. Technically, the website is built on legacy ASP.NET Web Forms technology with client-side JavaScript libraries such as jQuery and jCarousel. The site includes basic SEO metadata and some tracking via CNZZ analytics and QQ enterprise chat integration. However, mobile optimization and accessibility are basic, and performance is moderate. The site lacks modern security best practices such as HTTPS enforcement, DNSSEC, and security headers, which lowers its security posture. From a security perspective, the site does not publish privacy or cookie policies, nor does it provide incident response or vulnerability disclosure information. The absence of DNSSEC and security headers, combined with no visible HTTPS enforcement in the provided data, indicates potential risks. The domain WHOIS data is consistent and long-standing, supporting legitimacy, but the site should improve compliance and security measures. Overall, the website is functional and relevant to its target audience but requires significant improvements in privacy compliance, security hardening, and modernization of technical infrastructure to enhance trust and reduce risk.

Detected Technologies

jQuerySWFObjectjCarouselJavaScript

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

The company operates in the e-commerce software sector, focusing on cross-border trade platforms like AliExpress. Its competitive advantage lies in specialized tools for multi-store management, batch processing, and logistics integration, addressing pain points for sellers expanding internationally. Revenue likely derives from software sales, subscriptions, and custom development services. The target customers are small to medium-sized cross-border sellers needing efficient product and order management. The company maintains partnerships with logistics providers and integrates with major e-commerce platforms, enhancing its ecosystem. Growth indicators include ongoing feature development and video tutorials. Strategic observations suggest the company should invest in compliance and security to maintain market trust and expand internationally.

Extracted Contact Information

Marketing Intelligence Data

Phone Numbers (1)

400*******

Security Posture Analysis

Comprehensive Security Assessment

The current security maturity is low to moderate. Key vulnerabilities include lack of HTTPS enforcement, missing security headers, absence of DNSSEC, and no published privacy or cookie policies. These gaps expose users to potential data interception and privacy risks. The site does not provide incident response contacts or vulnerability disclosure mechanisms, limiting transparency and responsiveness to security issues. While no critical vulnerabilities or malware indicators were found, the security posture requires urgent improvement to meet modern standards and regulatory compliance such as GDPR. The use of legacy ASP.NET Web Forms may also pose risks if not regularly patched.

Strategic Recommendations

Priority Actions for Security Improvement

1

Implement HTTPS with strong TLS configuration and enforce HSTS site-wide.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

深圳市江胜科技有限公司

Description:

全球交易助手是深圳市江胜科技有限公司针对速卖通及其他外贸平台打造的线下管理软件,支持多店铺管理产品和订单,批量修改,数据搬家,订单管理,买家管理,物流追踪及定制化服务。

Key Services:
速卖通助理软件多店铺产品管理批量数据修改订单管理买家管理物流追踪定制化服务
Content Quality:

good

Branding:

moderate

Technical Stack

Technologies:
jQuerySWFObjectjCarouselJavaScript
Frameworks:
ASP.NET
Performance:

moderate

Mobile:

basic

Accessibility:

basic

SEO:

basic

Security Assessment

Security Score:
45/100
Best Practices:
  • Use of POST method in forms
  • Hidden __VIEWSTATE and __VIEWSTATEGENERATOR fields for ASP.NET state management

Analytics & Tracking

Services:
CNZZ
Tracking Level:moderate
Privacy Compliance:poor

Advertising & Marketing

Ad Networks:
CNZZ
Tracking Pixels:
CNZZ
Marketing Tools:
QQ Enterprise (wp.qiye.qq.com)
Transparency Level:basic

Website Quality Assessment

Design Quality:basic
User Experience:basic
Content Relevance:good
Navigation Clarity:good
Professionalism:basic
Trustworthiness:moderate

Key Observations

1

Website is a Chinese e-commerce software provider focused on AliExpress and other platforms.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

15/100
Score

Missing Strict-Transport-Security header

HIGH

Forces HTTPS connections

Missing X-Frame-Options header

HIGH

Prevents clickjacking attacks

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

50/100
Score

No Privacy Policy found

HIGH

GDPR requires a clear and accessible privacy policy

No Cookie Policy found

HIGH

GDPR requires clear information about cookie usage

No Cookie Consent Banner found

HIGH

GDPR requires explicit consent for non-essential cookies

GDPR Compliance Analysis

Privacy Policy0% confidence
Cookie Policy0% confidence
Contact Information Found90% confidence
phone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

2/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

Critical sector without clear security compliance

HIGH

Detected sectors: transport, digital

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

40/100
Score

No SPF record found

HIGH

SPF helps prevent email spoofing

No DKIM record found

MEDIUM

DKIM adds cryptographic signatures to emails

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

No email authentication configured

CRITICAL

Domain is vulnerable to email spoofing

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

0/100
Score

Unable to retrieve SSL certificate

CRITICAL

Could not establish secure connection to retrieve certificate information

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

75/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

No DMARC Record

MEDIUM

DMARC policy not configured

DNS Records

A Records:120.27.217.84
Name Servers:
f1g1ns1.dnspod.netDNS only
f1g1ns2.dnspod.netDNS only
MX Records:
10: mxbiz2.qq.com
5: mxbiz1.qq.com
SOA:Serial: , TTL: 1209600s

DNSSEC Status

DNSSEC Enabled

DNS Performance

Resolution Time:47ms

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

0/100
Score

Critical Service Exposed: RDP

CRITICAL

Port 3389 (RDP) is publicly accessible - RDP - Remote Desktop, prime ransomware target

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website uses legacy ASP.NET Web Forms technology with client-side jQuery and related plugins. The site structure includes standard meta tags but lacks modern SEO and accessibility features. Performance is moderate with basic mobile optimization. The hosting and registrar are consistent with the company location. Technical debt is evident in the use of outdated frameworks and missing security best practices. Modernization opportunities include migrating to newer web frameworks, improving mobile responsiveness, and adopting security standards. Technical risks include potential vulnerabilities from legacy code and lack of HTTPS enforcement.
Analyze Another Website