Skip to main content

Is ruksi.lv a Scam? Security Check Results - ruksi.lv Reviews

R

Is ruksi.lv Safe? Security Analysis for Ruksi.lv

Check if ruksi.lv is a scam or legitimate. Free security scan and reviews.

E-commerceLatviasmall
HTML5CSS3JavaScriptBootstrapFont Awesome+2 more
Analyzed 7/30/2025Completed 10:45:56 PM
40
Security Score
HIGH RISK

AI Summary

Ruksi.lv is an e-commerce website likely operating in Latvia, offering retail products through an OpenCart platform with the Journal3 theme. The website presents a professional design with good mobile optimization and clear navigation, targeting general consumers. However, the lack of visible privacy, cookie, and terms of service policies, as well as absence of contact and incident response information, limits its compliance and trustworthiness. Technically, the site uses modern web technologies including Bootstrap, Font Awesome, and Google Fonts, but lacks security headers which are recommended for enhanced protection. The site is accessible without WAF or blocking mechanisms, and no adult or explicit content is present, making it safe for general audiences.

Detected Technologies

HTML5CSS3JavaScriptBootstrapFont AwesomeGoogle FontsMasterSlider

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

The business appears to be a small-scale e-commerce retailer focused on the Latvian market. The website's content and metadata suggest a retail business model, but no detailed company or legal information is provided. The absence of WHOIS data due to query limits restricts verification of domain age and registrant legitimacy. No partnerships or subsidiaries are identified. The site lacks marketing and analytics tools, indicating a potentially limited digital marketing strategy. Overall, the business shows moderate professionalism but would benefit from enhanced transparency and compliance documentation.

Extracted Contact Information

Marketing Intelligence Data

Email Addresses (1)

i*****@ruksi.lv

Security Posture Analysis

Comprehensive Security Assessment

The website enforces HTTPS, which is a fundamental security measure. However, it lacks important security headers such as Content-Security-Policy, X-Frame-Options, and Strict-Transport-Security, which are best practices to mitigate common web vulnerabilities. No evidence of vulnerable libraries or exposed sensitive data was found in the provided content. The absence of privacy and cookie policies and incident response contacts indicates gaps in compliance and security readiness. The security posture is moderate but can be significantly improved by implementing recommended headers and compliance documentation.

Strategic Recommendations

Priority Actions for Security Improvement

1

Implement comprehensive privacy and cookie policies with clear user consent mechanisms to improve GDPR compliance.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Description:

Ruksi.lv

Content Quality:

good

Branding:

consistent

Technical Stack

Technologies:
HTML5CSS3JavaScriptBootstrapFont AwesomeGoogle FontsMasterSlider
Frameworks:
Journal3 Theme
Performance:

moderate

Mobile:

good

Accessibility:

basic

SEO:

basic

Security Assessment

Security Score:
65/100
Best Practices:
  • HTTPS enabled

Analytics & Tracking

Tracking Level:minimal
Privacy Compliance:poor

Advertising & Marketing

Transparency Level:poor

Website Quality Assessment

Design Quality:good
User Experience:good
Content Relevance:basic
Navigation Clarity:good
Professionalism:good
Trustworthiness:moderate

Key Observations

1

Website is an e-commerce platform likely based in Latvia.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

15/100
Score

Missing Strict-Transport-Security header

HIGH

Forces HTTPS connections

Missing X-Frame-Options header

HIGH

Prevents clickjacking attacks

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

10/100
Score

No Privacy Policy found

HIGH

GDPR requires a clear and accessible privacy policy

No Cookie Policy found

HIGH

GDPR requires clear information about cookie usage

No Cookie Consent Banner found

HIGH

GDPR requires explicit consent for non-essential cookies

EU business without adequate privacy measures

CRITICAL

EU businesses are subject to strict GDPR requirements

Third-party services without privacy policy

HIGH

Detected services: Facebook, Cloudflare, Google APIs

GDPR Compliance Analysis

Privacy Policy0% confidence
Cookie Policy0% confidence
Contact Information Found90% confidence
emailphone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

2/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

Critical sector without clear security compliance

HIGH

Detected sectors: energy, transport, banking, digital

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

70/100
Score

DMARC not enforcing

MEDIUM

DMARC policy is set to "none"

No DMARC reporting

LOW

DMARC aggregate reports not configured

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 include:_spf.inbox.eu ~all
DNS Lookups:1/10
Policy:~all
DKIM Selectors Found
Selector:default(1296-bit rsa)
DMARC Details
Policy:none

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

62/100
Score

Weak Protocols Supported

HIGH

Server supports weak protocols: TLSv1.1

OCSP Stapling Not Enabled

LOW

OCSP stapling improves performance and privacy

Certificate Transparency Not Implemented

LOW

Certificate is not logged in Certificate Transparency logs

SSL Certificate Expires Within 90 Days

MEDIUM

SSL certificate expires in 36 days

Mixed Content Detected

MEDIUM

2 resources loaded over insecure HTTP

Partial SSL/TLS Assessment

LOW

Completed 3 of 4 security checks due to time constraints

Protocol Support

TLSv1.3TLSv1.2TLSv1.1

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

80/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

DMARC Policy Set to None

LOW

DMARC is configured but not enforcing any policy

DNS Records

A Records:176.223.139.57
Name Servers:
ns1.dns.lvDNS only
ns2.dns.lvDNS only
MX Records:
50: mx.inbox.eu
SOA:Serial: 1738756853, TTL: 900s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:155ms

SPF Analysis

SPF Record:
v=spf1 include:_spf.inbox.eu ~all

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

20/100
Score

High-Risk Service Exposed: FTP

HIGH

Port 21 (FTP) is publicly accessible - FTP - Often unencrypted file transfer

Service Exposed: SSH

MEDIUM

Port 22 (SSH) is publicly accessible - SSH - Secure but can be brute-forced

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website is built on OpenCart CMS using the Journal3 theme, leveraging Bootstrap for responsive design and Font Awesome for icons. Google Fonts are used for typography, and MasterSlider is included for interactive sliders. The HTML structure is valid and includes appropriate meta tags for SEO and social media sharing (Open Graph and Twitter cards). Performance appears moderate with some optimization potential. Accessibility features are basic, with room for improvement in ARIA roles and keyboard navigation. The site is mobile optimized and uses HTTPS, but lacks advanced security headers. No analytics or tracking scripts were detected, indicating minimal user tracking.
Analyze Another Website