Skip to main content

Is edge.app a Scam? Security Check Results - Edge Reviews

edge.app favicon

Is edge.app Safe? Security Analysis for Edge

Check if edge.app is a scam or legitimate. Free security scan and reviews.

TechnologyN/amedium
WordPressElementorGoogle Tag ManagerGoogle AnalyticsGravity Forms+3 more
Analyzed 9/7/2025Completed 11:51:54 AM
57
Security Score
MEDIUM RISK

AI Summary

Edge is a technology company specializing in a blockchain wallet and security platform designed to provide users with a secure, private, and easy-to-use solution for buying, trading, and storing cryptocurrency assets. The website positions Edge as a trusted player in the crypto wallet market, emphasizing cutting-edge security and user privacy. The company targets crypto asset users and traders seeking control over their digital assets. Technically, the website is built on WordPress with Elementor, integrating modern analytics and marketing tools such as Google Analytics, Google Tag Manager, GetResponse Analytics, and Visual Website Optimizer. The site is mobile-optimized and demonstrates good SEO practices, though some accessibility features could be enhanced. Security posture is strong with HTTPS enforced and use of reCAPTCHA, but lacks explicit security headers and published security policies. Privacy compliance is limited due to missing privacy and cookie policies and absence of cookie consent mechanisms. Overall, the website is professional and trustworthy but could improve transparency and compliance disclosures.

Detected Technologies

WordPressElementorGoogle Tag ManagerGoogle AnalyticsGravity FormsVisual Website Optimizer (VWO)GetResponse AnalyticsreCAPTCHA

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

Edge operates in the competitive cryptocurrency wallet sector, focusing on security and privacy as its key differentiators. The business model revolves around providing a secure platform for crypto asset management, including buying, trading, and storage. The company leverages partnerships with major app stores for distribution and maintains an active social media presence. Revenue streams likely include transaction fees, premium services, or integrations with crypto exchanges. The website content and structured data indicate a medium-sized technology company with consistent branding and a clear market position. Growth indicators include integration of advanced analytics and marketing tools, suggesting a data-driven approach to customer acquisition and retention.

Extracted Contact Information

Marketing Intelligence Data

Phone Numbers (1)

+1619777****

Security Posture Analysis

Comprehensive Security Assessment

The website demonstrates a mature security posture with HTTPS enforced and use of Google reCAPTCHA to protect forms. However, it lacks visible security headers such as Content Security Policy (CSP), HTTP Strict Transport Security (HSTS), and X-Frame-Options, which are recommended to mitigate common web vulnerabilities. No security policy or incident response information is published, and no vulnerability disclosure or security.txt file is found, which limits transparency and user trust in security practices. No exposed sensitive data or vulnerable libraries are detected in the HTML content. Overall, the security posture is good but could be enhanced by publishing security policies and implementing additional HTTP security headers.

Strategic Recommendations

Priority Actions for Security Improvement

1

Publish a comprehensive privacy policy and cookie policy with GDPR compliance details.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

Edge

Description:

Edge offers cutting-edge security, privacy, and ease-of-use; making it the most secure way to buy, trade, and store your crypto assets.

Key Services:
buy cryptostore cryptotrade cryptocrypto asset management
Content Quality:

good

Branding:

consistent

Technical Stack

Technologies:
WordPressElementorGoogle Tag ManagerGoogle AnalyticsGravity FormsVisual Website Optimizer (VWO)GetResponse AnalyticsreCAPTCHA
Frameworks:
Elementor
Platforms:
WordPress
Performance:

moderate

Mobile:

good

Accessibility:

basic

SEO:

good

Security Assessment

Security Score:
85/100
Best Practices:
  • HTTPS enforced
  • Use of reCAPTCHA
  • No exposed sensitive data in HTML
  • No visible vulnerable libraries

Analytics & Tracking

Services:
Google AnalyticsGetResponse AnalyticsVisual Website Optimizer
Tracking Level:moderate
Privacy Compliance:basic

Advertising & Marketing

Tracking Pixels:
GetResponse AnalyticsVisual Website Optimizer
Marketing Tools:
GetResponse AnalyticsVisual Website Optimizer
Transparency Level:basic

Website Quality Assessment

Design Quality:good
User Experience:good
Content Relevance:good
Navigation Clarity:good
Professionalism:good
Trustworthiness:high

Key Observations

1

Website uses modern WordPress CMS with Elementor builder.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

30/100
Score

Missing Strict-Transport-Security header

HIGH

Forces HTTPS connections

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

53/100
Score

No Cookie Policy found

HIGH

GDPR requires clear information about cookie usage

No Cookie Consent Banner found

HIGH

GDPR requires explicit consent for non-essential cookies

No Data Protection Officer mentioned

LOW

Large organizations may need to designate a DPO under GDPR

Privacy policy may not be GDPR compliant

MEDIUM

Privacy policy lacks explicit GDPR compliance elements

GDPR Compliance Analysis

Privacy Policy85% confidence
Cookie Policy0% confidence
Contact Information Found90% confidence
emailphone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

10/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

Critical sector without clear security compliance

HIGH

Detected sectors: energy, transport, banking, digital

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

85/100
Score

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 include:_spf.google.com include:_spf.getresponse.com include:mail.zendesk.com ~all
DNS Lookups:3/10
Policy:~all
DKIM Selectors Found
Selector:google(1296-bit rsa)
Selector:s1(1440-bit rsa)
DMARC Details
Policy:quarantine
Aggregate Reports:cd5c05e5ad7f.a@dmarcinput.com
Forensic Reports:cd5c05e5ad7f.f@dmarcinput.com

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

72/100
Score

Weak Protocols Supported

HIGH

Server supports weak protocols: TLSv1.1

OCSP Stapling Not Enabled

LOW

OCSP stapling improves performance and privacy

Certificate Transparency Not Implemented

LOW

Certificate is not logged in Certificate Transparency logs

SSL Certificate Expires Within 90 Days

MEDIUM

SSL certificate expires in 83 days

Partial SSL/TLS Assessment

LOW

Completed 3 of 4 security checks due to time constraints

Protocol Support

TLSv1.3TLSv1.2TLSv1.1

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

85/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

DNS Records

A Records:64.23.221.121
Name Servers:
ns1.digitalocean.comDNS only
ns2.digitalocean.comDNS only
ns3.digitalocean.comDNS only
MX Records:
5: alt2.aspmx.l.google.com
1: aspmx.l.google.com
10: alt3.aspmx.l.google.com
10: alt4.aspmx.l.google.com
5: alt1.aspmx.l.google.com
SOA:Serial: 1757173667, TTL: 1800s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:98ms

SPF Analysis

SPF Record:
v=spf1 include:_spf.google.com include:_spf.getresponse.com include:mail.zendesk.com ~all

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

40/100
Score

Service Exposed: SSH

MEDIUM

Port 22 (SSH) is publicly accessible - SSH - Secure but can be brute-forced

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website is built on a modern WordPress CMS platform using the Elementor page builder, which provides flexibility and ease of content management. It integrates multiple analytics and marketing tools, including Google Analytics, Google Tag Manager, GetResponse Analytics, and Visual Website Optimizer, indicating a focus on performance monitoring and user engagement optimization. The site is mobile-optimized with responsive design and uses modern fonts and CSS techniques. Performance is moderate, with some potential for optimization. Accessibility is basic, with room for improvement in keyboard navigation and ARIA roles. No critical technical debt or outdated libraries are detected, but adding security headers and improving privacy compliance would enhance the technical maturity.
Analyze Another Website