Skip to main content

Is over-stimulated.com a Scam? Security Check Results - Over-Stimulated Reviews

O

Is over-stimulated.com Safe? Security Analysis for Over-Stimulated

Check if over-stimulated.com is a scam or legitimate. Free security scan and reviews.

TechnologyN/asmall
ReactNext.jsMux PlayerGoogle FontsFathom Analytics
Analyzed 8/3/2025Completed 5:53:15 AM
54
Security Score
MEDIUM RISK

AI Summary

Over-Stimulated is a small, independent design engineering studio specializing in bridging the gap between creative vision and technical execution for web projects. Led by founder Will Thomson, the studio partners with creative studios and founders to deliver precise and high-quality web solutions. The company emphasizes attention to detail, aesthetics, and performance, positioning itself as a niche player in the technology and design services sector. The website reflects a modern, professional digital presence built with Next.js and React, incorporating advanced media playback and minimal tracking via Fathom Analytics. Security posture is moderate with HTTPS implied but lacking explicit security headers and privacy policies. The absence of WHOIS data raises some concerns about domain registration transparency, though the site content and external partnerships suggest legitimate business operations. Strategic recommendations include enhancing privacy compliance, adding security policies, and verifying domain registration details to improve trust and compliance.

Detected Technologies

ReactNext.jsMux PlayerGoogle FontsFathom Analytics

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

The business operates in the technology sector, focusing on design engineering services for web projects. Its business model is service-oriented, targeting creative studios and founders who require technical execution support. The company leverages partnerships with other design and technology firms, as evidenced by multiple linked partner domains. Revenue streams likely come from project-based contracts and possibly product development such as the Ballpark tool. The company maintains a strong brand identity with consistent messaging and professional content. Growth indicators include active content updates and a public beta product launch planned. The partnership ecosystem is robust, involving specialized design and development studios, enhancing market reach and service offerings.

Extracted Contact Information

Marketing Intelligence Data

Email Addresses (1)

h*****@over-stimulated.com

Security Posture Analysis

Comprehensive Security Assessment

The website demonstrates a moderate security maturity level with HTTPS usage and no visible sensitive data exposure. However, it lacks comprehensive security headers such as Content Security Policy, HSTS, and X-Frame-Options, which are recommended to mitigate common web vulnerabilities. There is no evidence of a published security policy, incident response plan, or vulnerability disclosure program, which are important for compliance with GDPR and NIS2 regulations. The minimal use of tracking scripts and absence of third-party vulnerable libraries are positive indicators. Overall, the security culture appears basic but could be significantly improved by formalizing policies and enhancing technical controls.

Strategic Recommendations

Priority Actions for Security Improvement

1

Implement comprehensive security headers including CSP, HSTS, and X-Frame-Options.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

Over-Stimulated

Description:

An independent design engineering studio led by Will Thomson. Partnering with creative studios and founders who need precise technical execution. Small by design, focused by choice, and committed to building things right.

Key Services:
Motion and interaction designFull-Stack DevelopmentWebGLAPI IntegrationsHeadless CMSHeadless E-Commerce
Content Quality:

excellent

Branding:

consistent

Technical Stack

Technologies:
ReactNext.jsMux PlayerGoogle FontsFathom Analytics
Frameworks:
Next.js
Performance:

fast

Mobile:

excellent

Accessibility:

good

SEO:

good

Security Assessment

Security Score:
70/100
Best Practices:
  • HTTPS enforced (implied by URL)
  • No exposed sensitive data in HTML

Analytics & Tracking

Services:
Fathom Analytics
Tracking Level:minimal
Privacy Compliance:basic

Advertising & Marketing

Tracking Pixels:
Fathom Analytics
Marketing Tools:
Beehiiv (newsletter platform)
Transparency Level:basic

Website Quality Assessment

Design Quality:excellent
User Experience:excellent
Content Relevance:excellent
Navigation Clarity:good
Professionalism:excellent
Trustworthiness:high

Key Observations

1

Website is a professional design engineering studio site with rich content and clear business focus.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

30/100
Score

Missing X-Frame-Options header

HIGH

Prevents clickjacking attacks

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

35/100
Score

No Privacy Policy found

HIGH

GDPR requires a clear and accessible privacy policy

No Cookie Policy found

HIGH

GDPR requires clear information about cookie usage

No Cookie Consent Banner found

HIGH

GDPR requires explicit consent for non-essential cookies

Third-party services without privacy policy

HIGH

Detected services: Google APIs

GDPR Compliance Analysis

Privacy Policy0% confidence
Cookie Policy0% confidence
Contact Information Found90% confidence
phone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

17/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

35/100
Score

No SPF record found

HIGH

SPF helps prevent email spoofing

DMARC not enforcing

MEDIUM

DMARC policy is set to "none"

No DMARC reporting

LOW

DMARC aggregate reports not configured

No DKIM record found

MEDIUM

DKIM adds cryptographic signatures to emails

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
DMARC Details
Policy:none

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

72/100
Score

Weak Protocols Supported

HIGH

Server supports weak protocols: TLSv1.1

OCSP Stapling Not Enabled

LOW

OCSP stapling improves performance and privacy

Certificate Transparency Not Implemented

LOW

Certificate is not logged in Certificate Transparency logs

SSL Certificate Expires Within 90 Days

MEDIUM

SSL certificate expires in 70 days

Partial SSL/TLS Assessment

LOW

Completed 3 of 4 security checks due to time constraints

Protocol Support

TLSv1.3TLSv1.2TLSv1.1

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

70/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

Domain Transfer Lock Not Enabled

MEDIUM

Domain can be transferred without authorization

Domain Delete Lock Not Enabled

LOW

Domain can be deleted without additional verification

DMARC Policy Set to None

LOW

DMARC is configured but not enforcing any policy

Domain Registration Details

Domain Age
0 years(young)
Expiry Risk
low(75 days)
Protection Level
noneDNSSEC OFF
Suspicious Indicators Detected
  • No domain protection locks enabled

DNS Records

A Records:216.150.1.193, 216.150.16.193
Name Servers:
ns1.vercel-dns.com
ns2.vercel-dns.com
MX Records:
1: smtp.google.com
SOA:Serial: 1730584430, TTL: 600s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:127ms

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

100/100
Score

Good Network Security Posture

LOW

No unnecessary services detected on common risky ports

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website is built using modern web technologies including React and Next.js, ensuring good performance and mobile optimization. It uses Mux Player for video content and Google Fonts for typography, indicating a focus on user experience and design quality. Analytics are handled by Fathom, a privacy-focused service, which aligns with minimal user tracking. The site is well-structured with proper meta tags for SEO and social sharing (Open Graph and Twitter cards). However, there is no detected CMS, suggesting a custom or static site approach. Hosting provider details are not evident. The site loads quickly and is responsive, but accessibility could be further enhanced with ARIA attributes and keyboard navigation improvements. Overall, the technical infrastructure supports a professional and performant web presence with room for security and compliance enhancements.
Analyze Another Website