
Is tezos.foundation Safe? Security Analysis for Tezos Foundation
Check if tezos.foundation is a scam or legitimate. Free security scan and reviews.

AI Summary
The Tezos Foundation is a non-profit organization supporting the Tezos blockchain protocol and ecosystem. It provides funding, security programs, and community support to ensure the long-term success of the Tezos platform. The foundation targets blockchain developers, researchers, validators, and the broader crypto community. The website reflects a professional and consistent brand with clear navigation and relevant content. Technically, it is built on WordPress, uses common plugins like Yoast SEO and Simply Static Pro, and is hosted on AWS infrastructure. Security posture is good with HTTPS enforced and domain transfer protections, though DNSSEC is not enabled. Privacy and cookie policies are comprehensive and GDPR compliant, with consent mechanisms in place. No direct company emails or phone numbers are published, with contact primarily via web forms. Social media presence is active on Twitter and LinkedIn. Overall, the website is trustworthy, secure, and well-maintained.
Detected Technologies
🧠AI Business Intelligence
Technology stack, business insights, and market analysis powered by AI.
Business Intelligence
Market & Strategic Analysis
The Tezos Foundation occupies a strong position in the blockchain ecosystem as a key supporter of the Tezos protocol. Its business model is centered on ecosystem development through grants, bounty programs, and security initiatives. The foundation benefits from a global community and partnerships, including the official Tezos domain. Revenue streams are likely from donations and ecosystem funding. The foundation's operations are transparent with published reports and security policies. Growth indicators include active funding programs and community engagement. The partnership ecosystem includes the main Tezos technology site and social media channels. Strategic observations highlight the foundation's role as an essential entity in blockchain innovation and governance.
Security Posture Analysis
Comprehensive Security Assessment
The foundation demonstrates a mature security posture with HTTPS enforced, domain transfer and update protections, and a public bug bounty program. The presence of a known scams page indicates proactive user protection. However, the lack of DNSSEC and security.txt file are areas for improvement. No exposed sensitive data or vulnerable libraries were detected. Incident response contact channels are not explicitly published, which could be enhanced. Overall, the security culture appears strong but could benefit from additional transparency and technical hardening.
Strategic Recommendations
Priority Actions for Security Improvement
Enable DNSSEC on the domain to improve DNS security and prevent spoofing.
✨Observations
AI-powered comprehensive website and business analysis.
AI-Enhanced Website Analysis
Business Insights
Tezos Foundation
The Tezos Foundation supports the Tezos protocol and ecosystem by deploying resources to entities and initiatives to ensure long-term success. Tezos is an open-source, self-upgradable, energy-efficient Proof of Stake blockchain protocol for assets and applications backed by a global community.
good
consistent
Technical Stack
moderate
good
basic
good
Security Assessment
- HTTPS enforced
- Client transfer and update prohibited domain status
- Bug bounty program presence
- Known scams page for user awareness
Analytics & Tracking
Advertising & Marketing
Website Quality Assessment
Key Observations
Website is fully accessible with no blocking or WAF challenges.
🛡️Security Headers
HTTP security headers analysis and recommendations.
Security Headers
HTTP security headers analysis
Weak X-XSS-Protection configuration
LOWCurrent value: "1"
Missing Permissions-Policy header
MEDIUMControls browser features and APIs
Sensitive data may be cached
LOWCache-Control header should include "no-store" for sensitive pages
👤GDPR Compliance
Privacy and data protection assessment under GDPR regulations.
GDPR Compliance
Privacy and data protection assessment
No Cookie Consent Banner found
HIGHGDPR requires explicit consent for non-essential cookies
No Data Protection Officer mentioned
LOWLarge organizations may need to designate a DPO under GDPR
Privacy policy may not be GDPR compliant
MEDIUMPrivacy policy lacks explicit GDPR compliance elements
GDPR Compliance Analysis
🛡️NIS2 Compliance
Network & Information Security Directive compliance assessment.
NIS2 Compliance
Network & Information Security Directive
No incident response procedures found
HIGHNIS2 requires documented incident response and business continuity plans
No business continuity planning found
MEDIUMNIS2 emphasizes operational resilience and business continuity
No security contact information
HIGHNIS2 requires clear incident reporting channels
No NIS2 reference found
LOWConsider explicitly mentioning NIS2 compliance efforts
📧Email Security
SPF, DKIM, and DMARC validation and email security assessment.
Email Security
SPF, DKIM, and DMARC validation
No DKIM record found
MEDIUMDKIM adds cryptographic signatures to emails
No BIMI Record
LOWBIMI displays brand logos in email clients
No MTA-STS Policy
MEDIUMMTA-STS enforces TLS for email delivery
No TLS-RPT Record
LOWTLS-RPT provides reporting for email TLS issues
SPF Details
DMARC Details
🏆SSL/TLS Security
Certificate validity and encryption analysis.
SSL/TLS Security
Certificate validity and encryption analysis
Unable to retrieve SSL certificate
CRITICALCould not establish secure connection to retrieve certificate information
OCSP Status
📊DNS Health
DNS configuration and security assessment.
DNS Health
DNS configuration and security assessment
DNSSEC Not Enabled
MEDIUMDNSSEC is not configured for this domain
DNS Records
DNSSEC Status
⚡Network Security
Port scanning and network exposure analysis.
Network Security
Port scanning and network exposure analysis
Good Network Security Posture
LOWNo unnecessary services detected on common risky ports
🔧Technical Analysis
Detailed technical findings and analysis from AI assessment.
Technical Analysis
Comprehensive security assessment findings