Skip to main content

Is reshot.com a Scam? Security Check Results - Reshot Reviews

reshot.com favicon

Is reshot.com Safe? Security Analysis for Reshot

https://reshot.com

Check if reshot.com is a scam or legitimate. Free security scan and reviews.

TechnologyAustraliamedium
JavaScriptRollbarCookiebotGoogle AnalyticsGoogle Tag Manager
Analyzed 10/4/2025Completed 2:43:39 AM
71
Security Score
MEDIUM RISK

AI Summary

Reshot is a professionally designed online platform offering free icons and vector illustrations with commercial licenses and no attribution required. It targets designers and creatives seeking high-quality design assets for personal and commercial projects. The site is linked to Envato, a well-known creative subscription company, which enhances its market credibility. Technically, the website uses modern JavaScript frameworks, error monitoring via Rollbar, and cookie consent management through Cookiebot, indicating a mature digital infrastructure. The site is fast, mobile-optimized, and SEO-friendly, providing an excellent user experience. Security-wise, HTTPS is enforced and error monitoring is active, but there is a lack of visible security headers and no published security or incident response policies. The absence of WHOIS data is a concern but is mitigated by the professional presentation and Envato affiliation. Overall, the site is trustworthy and well-maintained, with room for improvement in explicit security disclosures and contact transparency.

Detected Technologies

JavaScriptRollbarCookiebotGoogle AnalyticsGoogle Tag Manager

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

Reshot occupies a niche in the digital design asset market by providing free, high-quality icons and illustrations with commercial licenses, differentiating itself by requiring no attribution. Its business model leverages Envato's ecosystem, likely benefiting from cross-promotion and shared resources. The target audience includes freelance designers, agencies, and creative professionals. The platform's growth potential is supported by its extensive asset library and seamless user experience. Partnerships with Envato enhance its market position and credibility. The absence of direct contact information may limit some user trust but aligns with a streamlined digital service approach.

Extracted Contact Information

Marketing Intelligence Data

Security Posture Analysis

Comprehensive Security Assessment

The website demonstrates a moderate to strong security posture with enforced HTTPS, use of Rollbar for error monitoring, and cookie consent management compliant with GDPR. However, the lack of visible security headers such as Content-Security-Policy and Strict-Transport-Security reduces its defense-in-depth. No vulnerability disclosure or incident response information is provided, which could hinder timely security issue reporting and resolution. The absence of WHOIS data raises questions about domain registration transparency but does not directly impact site security. Overall, the security posture is adequate for the business type but could be enhanced by adopting additional best practices and transparency measures.

Strategic Recommendations

Priority Actions for Security Improvement

1

Implement and publish security headers including Content-Security-Policy, X-Frame-Options, and Strict-Transport-Security to strengthen browser security.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

Reshot

Description:

Reshot is a free resource offering over 40,000 icons and 1,500 vector illustrations, all available for instant download in formats like SVG and PNG. Designed by and for creatives, Reshot provides assets with a commercial license and no attribution required, making it ideal for both personal and professional projects.

Key Services:
Free SVG iconsFree vector illustrationsInstant downloadsCommercial licensing
Content Quality:

excellent

Branding:

consistent

Technical Stack

Technologies:
JavaScriptRollbarCookiebotGoogle AnalyticsGoogle Tag Manager
Frameworks:
Turbo (Hotwire)
Performance:

fast

Mobile:

excellent

Accessibility:

good

SEO:

good

Security Assessment

Security Score:
85/100
Best Practices:
  • HTTPS enforced
  • Rollbar error monitoring
  • Cookie consent via Cookiebot

Analytics & Tracking

Services:
Google AnalyticsGoogle Tag ManagerRollbar
Tracking Level:moderate
Privacy Compliance:good

Advertising & Marketing

Tracking Pixels:
Rollbar
Transparency Level:good

Website Quality Assessment

Design Quality:excellent
User Experience:excellent
Content Relevance:excellent
Navigation Clarity:excellent
Professionalism:excellent
Trustworthiness:high

Key Observations

1

Website is fully accessible with rich content and professional design

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

60/100
Score

Weak Strict-Transport-Security configuration

LOW

Current value: "max-age=15552000; includeSubDomains; preload"

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Weak X-XSS-Protection configuration

LOW

Current value: "0"

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

83/100
Score

No Data Protection Officer mentioned

LOW

Large organizations may need to designate a DPO under GDPR

Privacy policy may not be GDPR compliant

MEDIUM

Privacy policy lacks explicit GDPR compliance elements

GDPR Compliance Analysis

Privacy Policy85% confidence
Cookie Policy85% confidence
Contact Information Found90% confidence
phone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

2/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

Critical sector without clear security compliance

HIGH

Detected sectors: transport, banking, digital

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

100/100
Score
No issues found
SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 -all
DNS Lookups:0/10
Policy:-all
DKIM Selectors Found
Selector:default0
Selector:google0
Selector:k10
Selector:k20
Selector:selector10
Selector:selector20
Selector:mail0
Selector:email0
Selector:dkim0
Selector:s10
DMARC Details
Policy:reject
Aggregate Reports:y9an51hu@ag.dmarcian.com
Forensic Reports:y9an51hu@fr.dmarcian.com
MTA-STS Details

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

57/100
Score

Weak Protocols Supported

HIGH

Server supports weak protocols: TLSv1.1

Certificate Transparency Not Implemented

LOW

Certificate is not logged in Certificate Transparency logs

SSL Certificate Expires Within 90 Days

MEDIUM

SSL certificate expires in 85 days

Weak SSL Key Length

HIGH

SSL certificate uses 256-bit key, which is considered weak

Partial SSL/TLS Assessment

LOW

Completed 3 of 4 security checks due to time constraints

Protocol Support

TLSv1.3TLSv1.2TLSv1.1

OCSP Status

OCSP Stapling Enabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

85/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

DNS Records

A Records:104.18.4.234, 104.18.5.234
Name Servers:
eleanor.ns.cloudflare.comDNS only
karl.ns.cloudflare.comDNS only

DNSSEC Status

DNSSEC Not Enabled

SPF Analysis

SPF Record:
v=spf1 -all

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

100/100
Score

Good Network Security Posture

LOW

No unnecessary services detected on common risky ports

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website is built using modern JavaScript technologies with Turbo (Hotwire) framework for fast page transitions and dynamic content loading. It integrates third-party services such as Rollbar for error tracking, Cookiebot for cookie consent management, and Google Analytics for user behavior analysis. The site is well-optimized for performance and mobile responsiveness, with proper meta tags and SEO configurations. No CMS or hosting provider details are explicitly detected. The technical implementation reflects a mature and modern web infrastructure suitable for a digital content platform.
⭐ Verified Community Reviews

What others say about reshot.com

Share your experience to help others make informed decisions. We verify every review by email and publish it once our moderation team approves it.

Overall rating
Select a rating
4000 characters remaining

We’ll email you to confirm your review and keep your details private.

Community rating

out of 5

0 reviews published

Loading reviews…

How did we do?

Your feedback directly shapes our roadmap. Rate the quality of this report, leave an optional comment, and let us know if you want our security specialists to follow up.

Overall report quality
Select a rating
2000 characters remaining

We only use your feedback to improve Guard reports. Contact details are never shared.

Analyze Another Website