Skip to main content

Is deliveroo.com.au a Scam? Security Check Results - Deliveroo Reviews

deliveroo.com.au favicon

Is deliveroo.com.au Safe? Security Analysis for Deliveroo

Check if deliveroo.com.au is a scam or legitimate. Free security scan and reviews.

TransportationUnited Kingdomlarge
ReactNext.jsGoogle Tag ManagerOneTrust Cookie ConsentPolyfill.io+1 more
Analyzed 8/2/2025Completed 4:03:12 PM
75
Security Score
MEDIUM RISK

AI Summary

Deliveroo is a well-established UK-based online food delivery platform founded in 2012, offering a wide range of services including food, groceries, pharmacy, and gift deliveries. The company operates a sophisticated digital platform that connects customers with local restaurants and shops, supported by a large network of delivery riders. The website demonstrates a high level of digital maturity, utilizing modern web technologies such as React and Next.js, and incorporates strong performance, mobile optimization, and accessibility features. Security posture is robust with HTTPS enforcement, security headers, and bot protection mechanisms, although explicit security policy and incident response information are not publicly detailed. Privacy compliance is well addressed with comprehensive privacy and cookie policies and consent mechanisms. Overall, Deliveroo presents a professional, trustworthy, and user-friendly online presence aligned with its market leadership in the food delivery sector.

Detected Technologies

ReactNext.jsGoogle Tag ManagerOneTrust Cookie ConsentPolyfill.ioPerimeterX (bot protection)

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

Deliveroo holds a leading position in the UK food delivery market, leveraging a platform business model that intermediates between consumers, restaurants, and delivery riders. Its revenue streams include delivery fees, commissions from restaurant partners, and value-added services such as gift cards and workplace meal programs. The company targets urban consumers seeking convenience and quick delivery, supported by a strong brand and extensive partnership ecosystem. Deliveroo's strategic focus on technology and customer experience drives competitive advantage, with continuous innovation evident in its app and web platforms. The presence of multiple related domains for corporate, engineering, design, and student programs reflects a diversified and mature operational structure.

Extracted Contact Information

Marketing Intelligence Data

Email Addresses (1)

h*****@deliveroo.fr

Security Posture Analysis

Comprehensive Security Assessment

The website exhibits a mature security posture with enforced HTTPS, comprehensive security headers, and bot mitigation via PerimeterX. Privacy and cookie compliance are actively managed through OneTrust, ensuring GDPR adherence. However, the absence of a publicly accessible security policy, incident response details, and vulnerability disclosure mechanisms indicates areas for improvement in transparency and readiness. No vulnerabilities or exposed sensitive data were detected in the analysis. The security score is strong but could be enhanced by publishing dedicated security documentation and contact channels for security incidents.

Strategic Recommendations

Priority Actions for Security Improvement

1

Publish a dedicated security policy page outlining security practices and commitments.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

Deliveroo

Description:

Deliveroo is an online food delivery service that connects customers with local restaurants, takeaways, supermarkets, and shops, offering delivery in as little as 30 minutes.

Key Services:
Food deliveryGrocery deliveryPharmacy deliveryGift cardsPartnering with restaurantsRider recruitment
Content Quality:

excellent

Branding:

consistent

Technical Stack

Technologies:
ReactNext.jsGoogle Tag ManagerOneTrust Cookie ConsentPolyfill.ioPerimeterX (bot protection)
Frameworks:
Next.js
Platforms:
Web
Performance:

fast

Mobile:

excellent

Accessibility:

good

SEO:

good

Security Assessment

Security Score:
85/100
Best Practices:
  • HTTPS enforced
  • Use of security headers
  • Bot protection via PerimeterX
  • Cookie consent management

Analytics & Tracking

Services:
Google Analytics (via Google Tag Manager)
Tracking Level:moderate
Privacy Compliance:good

Advertising & Marketing

Tracking Pixels:
PerimeterX
Marketing Tools:
OneTrust Cookie Consent
Transparency Level:good

Website Quality Assessment

Design Quality:excellent
User Experience:excellent
Content Relevance:excellent
Navigation Clarity:excellent
Professionalism:excellent
Trustworthiness:high

Key Observations

1

Website is fully accessible with rich content and interactive features.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

60/100
Score

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

100/100
Score
No issues found

GDPR Compliance Analysis

Privacy Policy85% confidence
Cookie Policy85% confidence
Contact Information Found90% confidence
emailphone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

25/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

67/100
Score

Complex SPF record

LOW

Too many include statements can cause lookup limits

No DKIM record found

MEDIUM

DKIM adds cryptographic signatures to emails

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 include:_netblocks.google.com include:_netblocks2.google.com include:_netblocks3.google.com include:_spf.salesforce.com include:mail.zendesk.com include:mailsenders.netsuite.com include:servers.mcsv.net include:spf.mandrillapp.com ip4:23.227.32.0/1 9 ip4:35.184.170.228 ip4:35.190.163.94 ip4:35.203.3.51 ip4:35.203.94.235 ip4:35.224.21.218 ip4:35.231.245.77 ~all
DNS Lookups:8/10
Policy:~all
DMARC Details
Policy:reject
Aggregate Reports:db3b2d31@inbox.ondmarc.com
Forensic Reports:db3b2d31@inbox.ondmarc.com

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

75/100
Score

SSL Certificate Expires Within 90 Days

MEDIUM

SSL certificate expires in 39 days

Weak SSL Key Length

HIGH

SSL certificate uses 256-bit key, which is considered weak

Partial SSL/TLS Assessment

LOW

Completed 2 of 4 security checks due to time constraints

Certificate Details

Subject:deliveroo.co.uk
Issuer:WE1
Valid Until:9/10/2025 (39 days)
SANs:deliveroo.co.uk, *.deliveroo.co.uk, *.sandbox.deliveroo.co.uk +1 more

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

85/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

DNS Records

A Records:104.18.36.59, 172.64.151.197
AAAA Records:2606:4700:4400::ac40:97c5, 2606:4700:4400::6812:243b
Name Servers:
mona.ns.cloudflare.comDNS only
phil.ns.cloudflare.comDNS only
MX Records:
1: aspmx.l.google.com
5: alt1.aspmx.l.google.com
10: aspmx3.googlemail.com
5: alt2.aspmx.l.google.com
10: aspmx2.googlemail.com
SOA:Serial: 2379530806, TTL: 1800s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:126ms

SPF Analysis

SPF Record:
v=spf1 include:_netblocks.google.com include:_netblocks2.google.com include:_netblocks3.google.com include:_spf.salesforce.com include:mail.zendesk.com include:mailsenders.netsuite.com include:servers.mcsv.net include:spf.mandrillapp.com ip4:23.227.32.0/1 9 ip4:35.184.170.228 ip4:35.190.163.94 ip4:35.203.3.51 ip4:35.203.94.235 ip4:35.224.21.218 ip4:35.231.245.77 ~all

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

100/100
Score

Good Network Security Posture

LOW

No unnecessary services detected on common risky ports

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

Deliveroo's website is built on a modern React and Next.js framework, ensuring server-side rendering and fast performance. The use of Google Tag Manager and OneTrust indicates mature analytics and privacy management. The site is mobile-optimized with responsive design and accessibility considerations. Hosting appears to be on a scalable cloud infrastructure, although the exact provider is not identified. The technical implementation supports a seamless user experience with efficient content delivery and security best practices. Opportunities exist to further document security and compliance aspects to align with industry standards.
Analyze Another Website