Skip to main content

Is innoagh.pl a Scam? Security Check Results - INNOAGH sp. z o.o. spółka celowa AGH w Krakowie Reviews

innoagh.pl favicon

Is innoagh.pl Safe? Security Analysis for INNOAGH sp. z o.o. spółka celowa AGH w Krakowie

Check if innoagh.pl is a scam or legitimate. Free security scan and reviews.

TechnologyPolandsmall
WordPress 6.5Yoast SEO pluginjQuery 3.7.1BootstrapSlick slider+3 more
Analyzed 8/4/2025Completed 8:23:59 AM
49
Security Score
HIGH RISK

AI Summary

INNOAGH sp. z o.o. is a technology-focused company operating as a special purpose vehicle of AGH University of Science and Technology in Krakow, Poland. The company supports the development of innovative businesses, spin-offs, and technology start-ups by providing pre-incubation, capital cooperation, research and development services, and training. The website positions INNOAGH as a key player in the innovation ecosystem linked to a reputable technical university, targeting entrepreneurs and scientific-business collaborations. Technically, the website is built on WordPress with modern frameworks like Bootstrap and uses common libraries such as jQuery and FontAwesome. It employs Google Tag Manager and complies with GDPR through a cookie consent mechanism. Security posture is good with HTTPS enforced, though some security headers are missing and no explicit security or incident response policies are published. The website is professional, well-branded, and trustworthy with active social media presence. WHOIS data is unavailable, likely due to privacy protection, but the domain and website content appear legitimate and consistent with the business claims.

Detected Technologies

WordPress 6.5Yoast SEO pluginjQuery 3.7.1BootstrapSlick sliderStellarNavFontAwesome 5.15.4Google Tag Manager

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

INNOAGH operates in the technology sector, focusing on innovation incubation and commercialization linked to AGH University. Its business model revolves around supporting start-ups and spin-offs through services like pre-incubation, capital investment facilitation, R&D, expert opinions, and training programs. The company targets new business creators and technological entrepreneurs, leveraging its university affiliation as a competitive advantage. The website content and social media activity indicate active engagement in events, hackathons, and educational initiatives, suggesting a growth-oriented and collaborative ecosystem. Revenue streams likely include service fees, training, and investment returns. The lack of explicit contact details on the homepage may limit direct customer engagement but is supplemented by social media channels.

Security Posture Analysis

Comprehensive Security Assessment

The website demonstrates a moderate to good security posture with HTTPS enabled and GDPR cookie compliance implemented. However, no security headers such as Content-Security-Policy or X-Frame-Options were detected in the provided data, which could improve protection against common web attacks. There is no visible security policy or incident response information, nor a vulnerability disclosure program or security.txt file. No exposed sensitive data or vulnerable libraries were identified. The site uses up-to-date WordPress and plugins, reducing risk of known vulnerabilities. Overall, the security maturity is adequate for the business type but could be enhanced by publishing explicit security policies and implementing additional HTTP security headers.

Strategic Recommendations

Priority Actions for Security Improvement

1

Implement HTTP security headers including Content-Security-Policy, X-Frame-Options, and X-Content-Type-Options to enhance protection.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

INNOAGH sp. z o.o. spółka celowa AGH w Krakowie

Description:

Spółka działające na rzecz przedsiębiorczości, innowacji i współpracy nauka - biznes w ramach ekosystemu innowacji renomowanej uczelni technicznej - AGH w Krakowie.

Key Services:
Pre-incubation of ideasCreation of spin-off companiesCapital inputs and cooperation with investorsB+R+I research and development workExpertise and opinions on innovationPro-innovation servicesTraining, workshops and consultingTECH START-UP school
Content Quality:

good

Branding:

consistent

Technical Stack

Technologies:
WordPress 6.5Yoast SEO pluginjQuery 3.7.1BootstrapSlick sliderStellarNavFontAwesome 5.15.4Google Tag Manager
Frameworks:
Bootstrap
Platforms:
WordPress
Performance:

moderate

Mobile:

good

Accessibility:

basic

SEO:

good

Security Assessment

Security Score:
85/100
Best Practices:
  • HTTPS enforced
  • Use of GDPR cookie compliance plugin with consent mechanism
  • No exposed sensitive data in HTML

Analytics & Tracking

Services:
Google Analytics
Tracking Level:moderate
Privacy Compliance:good

Advertising & Marketing

Transparency Level:basic

Website Quality Assessment

Design Quality:good
User Experience:good
Content Relevance:good
Navigation Clarity:good
Professionalism:good
Trustworthiness:high

Key Observations

1

Website is fully accessible with rich content and professional design

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

15/100
Score

Missing Strict-Transport-Security header

HIGH

Forces HTTPS connections

Missing X-Frame-Options header

HIGH

Prevents clickjacking attacks

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

40/100
Score

No Privacy Policy found

HIGH

GDPR requires a clear and accessible privacy policy

EU business without adequate privacy measures

CRITICAL

EU businesses are subject to strict GDPR requirements

Third-party services without privacy policy

HIGH

Detected services: Google Analytics, Facebook, LinkedIn, YouTube, Google APIs

GDPR Compliance Analysis

Privacy Policy0% confidence
Cookie Policy85% confidence
Contact Information Found90% confidence
phone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

17/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

70/100
Score

No DKIM record found

MEDIUM

DKIM adds cryptographic signatures to emails

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 mx a ptr include:spf.protection.outlook.com ~all
DNS Lookups:4/10
Policy:~all

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

72/100
Score

Weak Protocols Supported

HIGH

Server supports weak protocols: TLSv1.1

OCSP Stapling Not Enabled

LOW

OCSP stapling improves performance and privacy

Certificate Transparency Not Implemented

LOW

Certificate is not logged in Certificate Transparency logs

SSL Certificate Expires Within 90 Days

MEDIUM

SSL certificate expires in 34 days

Partial SSL/TLS Assessment

LOW

Completed 3 of 4 security checks due to time constraints

Protocol Support

TLSv1.3TLSv1.2TLSv1.1

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

75/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

No DMARC Record

MEDIUM

DMARC policy not configured

Domain Registration Details

Domain Age
13 years(mature)
Expiry Risk
low(76 days)

DNS Records

A Records:94.152.164.250
Name Servers:
dns.home.plDNS only
dns2.home.plDNS only
dns3.home.plDNS only
MX Records:
0: innoagh-pl.mail.protection.outlook.com
SOA:Serial: 1562312106, TTL: 3600s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:253ms

SPF Analysis

SPF Record:
v=spf1 mx a ptr include:spf.protection.outlook.com ~all

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

20/100
Score

High-Risk Service Exposed: FTP

HIGH

Port 21 (FTP) is publicly accessible - FTP - Often unencrypted file transfer

Service Exposed: SSH

MEDIUM

Port 22 (SSH) is publicly accessible - SSH - Secure but can be brute-forced

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website is built on WordPress 6.5 with a modern tech stack including Bootstrap for responsive design, jQuery for scripting, and Slick slider for UI components. It uses FontAwesome for icons and integrates Google Tag Manager for analytics and marketing. The site loads external resources from reputable CDNs and uses a GDPR cookie compliance plugin to manage user consent. Performance is moderate with some optimization opportunities. Mobile optimization is good, and SEO is supported by Yoast SEO plugin and proper meta tags including Open Graph and JSON-LD structured data. No hosting provider information was found. The site is well-structured with clear navigation and consistent branding. Technical risks are low but could be further reduced by improving security headers and accessibility.
Analyze Another Website