
Is stashli.st Safe? Security Analysis for stashli.st - Create & share lists
https://stashli.stCheck if stashli.st is a scam or legitimate. Free security scan and reviews.

Unlock the complete security report for stashli.st
Get full access to AI recommendations, compliance evidence, vulnerability remediation steps, and downloadable PDF reports. Upgrade once for lifetime access to this scan.
Full Report Access
All modules, AI insights, PDF download
Marketing Intelligence
Contact emails, phone numbers & warm leads
How it works
- Enter your email to receive the unlocked report.
- Complete the secure EveryPay checkout (cards & local methods supported).
- You’ll receive an email with your unique unlock code and the PDF export.
Already purchased?
Order summary
Digital reports are delivered immediately after payment. By continuing you acknowledge the withdrawal waiver described in our Returns & Refunds policy.
Secure payments processed via EveryPay. Prices in EUR; Incl. 21% VAT.
SEQ SIA
Lastadijas 12 k-3, Riga, Latvia, LV-1050
Reg. No. 40203410806 • VAT LV40203410806
Support: guard@offseq.com • +371 2256 5353
AI Summary
stashli.st is a newly launched online platform (established 2024) focused on enabling users to create and share curated lists of links quickly and easily. The service targets a general audience interested in organizing a… Unlock the full Guard report to read the complete analysis.
Detected Technologies
Security Headers
6 findings
35/100
GDPR Compliance
2 findings
70/100
NIS2 Compliance
9 findings
2/100
Email Security
4 findings
70/100
🧠AI Business Intelligence
Technology stack, business insights, and market analysis powered by AI.
Snapshot shown below. Unlock the full AI report for complete market insights, audience profiling, and step-by-step recommendations.
Business Intelligence
Market & Strategic Analysis
The business operates in the technology sector, providing a specialized service for curated link list creation and sharing. Its business model likely revolves around user engagement and possibly freemium or subscription features, as indicated by the 'Create a list — it's free' call to action. The platform's market position is niche but promising, targeting users who want to organize and share collections of links efficiently. The lack of visible contact or corporate information suggests a small startup or early-stage company. The presence of multiple curated categories and trending lists indicates active content curation and community involvement. The company leverages partnerships or references to various external domains related to technology and productivity tools, enhancing its ecosystem. Growth potential exists if privacy and security compliance are improved to build user trust.
Security Posture Analysis
Comprehensive Security Assessment
The website enforces HTTPS and uses domain status protections to prevent unauthorized transfers, indicating a baseline security awareness. However, the absence of visible security headers such as Content Security Policy (CSP), HTTP Strict Transport Security (HSTS), and X-Frame-Options reduces defense-in-depth. No explicit privacy policy, cookie consent, or incident response contacts are provided, which are critical for GDPR compliance and user trust. No known vulnerabilities or exposed sensitive data were detected in the provided content. The use of modern frameworks reduces risk from legacy vulnerabilities, but the lack of formal security disclosures and contact channels limits incident response readiness. Overall, the security posture is moderate but can be significantly improved by adding security headers, privacy documentation, and incident response information.
Strategic Recommendations
Priority Actions for Security Improvement
Upgrade to the full Guard report to access tailored remediation steps.
✨Observations
AI-powered comprehensive website and business analysis.
A preview of your strategic observations is visible. Upgrade to unlock the full competitive positioning, trust signals, and branding checklist.
AI-Enhanced Website Analysis
Business Insights
Curated lists of awesome links. Build pretty lists in seconds and share your best gems!
good
consistent
Technical Stack
fast
excellent
good
good
Security Assessment
- HTTPS enforced
- Domain status clientTransferProhibited
Analytics & Tracking
Advertising & Marketing
Website Quality Assessment
Key Observations
Website is a modern, well-designed platform for creating and sharing curated link lists.
🛡️Security Headers
HTTP security headers analysis and recommendations.
Some header findings are shown. Unlock to see the full checklist, impacted endpoints, and remediation guidance.
Security Headers
HTTP security headers analysis
Missing X-Frame-Options header
HIGHPrevents clickjacking attacks Unlock the full report to read the complete fix.
Missing X-Content-Type-Options header
MEDIUMPrevents MIME type sniffing Unlock the full report to read the complete fix.
Missing Content-Security-Policy header
HIGHControls resources the browser is allowed to load Unlock the full report to read the complete fix.
Missing X-XSS-Protection header
MEDIUMLegacy XSS protection (deprecated but still recommended) Unlock the full report to read the complete fix.
Missing Referrer-Policy header
LOWControls referrer information sent with requests Unlock the full report to read the complete fix.
Missing Permissions-Policy header
MEDIUMControls browser features and APIs Unlock the full report to read the complete fix.
👤GDPR Compliance
Privacy and data protection assessment under GDPR regulations.
Preview of GDPR checkpoints is visible. Unlock to reveal full evidence, policy excerpts, and DPIA guidance.
GDPR Compliance
Privacy and data protection assessment
No Cookie Policy found
HIGHGDPR requires clear information about cookie usage Unlock the full report to read the complete fix.
No Cookie Consent Banner found
HIGHGDPR requires explicit consent for non-essential cookies Unlock the full report to read the complete fix.
GDPR Compliance Analysis
🛡️NIS2 Compliance
Network & Information Security Directive compliance assessment.
You can see headline NIS2 checks. Upgrade to access the full control mapping, severity breakdown, and remediation plan.
NIS2 Compliance
Network & Information Security Directive
No information security framework found
HIGHNIS2 requires documented cybersecurity and information security measures Unlock the full report to read the complete fix.
No vulnerability disclosure policy
MEDIUMNIS2 encourages coordinated vulnerability disclosure Unlock the full report to read the complete fix.
No security policy documentation found
HIGHNIS2 requires documented cybersecurity governance and risk management Unlock the full report to read the complete fix.
No incident response procedures found
HIGHNIS2 requires documented incident response and business continuity plans Unlock the full report to read the complete fix.
No business continuity planning found
MEDIUMNIS2 emphasizes operational resilience and business continuity Unlock the full report to read the complete fix.
No security contact information
HIGHNIS2 requires clear incident reporting channels Unlock the full report to read the complete fix.
No vulnerability reporting mechanism
MEDIUMClear vulnerability reporting supports coordinated disclosure Unlock the full report to read the complete fix.
No NIS2 reference found
LOWConsider explicitly mentioning NIS2 compliance efforts Unlock the full report to read the complete fix.
Critical sector without clear security compliance
HIGHDetected sectors: energy, transport, banking, digital Unlock the full report to read the complete fix.
📧Email Security
SPF, DKIM, and DMARC validation and email security assessment.
Quick view of email authentication checks is provided. Unlock to uncover full DNS evidence, record diffs, and fix scripts.
Email Security
SPF, DKIM, and DMARC validation
No DKIM record found
MEDIUMDKIM adds cryptographic signatures to emails Unlock the full report to read the complete fix.
No BIMI Record
LOWBIMI displays brand logos in email clients Unlock the full report to read the complete fix.
No MTA-STS Policy
MEDIUMMTA-STS enforces TLS for email delivery Unlock the full report to read the complete fix.
No TLS-RPT Record
LOWTLS-RPT provides reporting for email TLS issues Unlock the full report to read the complete fix.
SPF Details
🏆SSL/TLS Security
Certificate validity and encryption analysis.
This is a teaser of the TLS audit. Unlock to view certificate chains, cipher support tables, and remediation steps.
SSL/TLS Security
Certificate validity and encryption analysis
Unable to retrieve SSL certificate
CRITICALCould not establish secure connection to retrieve certificate information Unlock the full report to read the complete fix.
OCSP Status
📊DNS Health
DNS configuration and security assessment.
Unlock the full DNS posture audit to reveal misconfigurations, zone records, and actionable fixes.
DNS Health
DNS configuration and security assessment
DNSSEC Not Enabled
MEDIUMDNSSEC is not configured for this domain Unlock the full report to read the complete fix.
CAA Records Not Configured
LOWCertificate Authority Authorization (CAA) records not found Unlock the full report to read the complete fix.
Domain Delete Lock Not Enabled
LOWDomain can be deleted without additional verification Unlock the full report to read the complete fix.
Weak SPF Policy
HIGHSPF record has permissive policy allowing any server to send email Unlock the full report to read the complete fix.
No DMARC Record
MEDIUMDMARC policy not configured Unlock the full report to read the complete fix.
Domain Registration Details
DNS Records
DNSSEC Status
DNS Performance
SPF Analysis
⚡Network Security
Port scanning and network exposure analysis.
See a glimpse of exposed services. Unlock to access full port inventories, CVE lookups, and mitigation priorities.
Network Security
Port scanning and network exposure analysis
Good Network Security Posture
LOWNo unnecessary services detected on common risky ports Unlock the full report to read the complete fix.
🔧Technical Analysis
Detailed technical findings and analysis from AI assessment.
Unlock to view the complete technical breakdown, stack fingerprinting, and hardening checklist.
Technical Analysis
Comprehensive security assessment findings
Additional Findings
How did we do?
Your feedback directly shapes our roadmap. Rate the quality of this report, leave an optional comment, and let us know if you want our security specialists to follow up.
What others say about stashli.st
Share your experience to help others make informed decisions. We verify every review by email and publish it once our moderation team approves it.
Community rating
—out of 5
0 reviews published