Is womprotocol.io Safe? Security Analysis for WOM Protocol Pte. Ltd.
http://womprotocol.ioCheck if womprotocol.io is a scam or legitimate. Free security scan and reviews.
Below Technology avg (72)

10,000+
Domains scanned
500+
Security teams trust us
EveryPay
Secure checkout
Instant
Reports delivered
Get the professional PDF report for womprotocol.io
Export this security analysis as a professional PDF document, receive it via email, and access marketing intelligence data including contact emails and phone numbers. One-time purchase for lifetime access.
PDF Report & Export
PDF download, email delivery, unlock code
Marketing Intelligence
Contact emails, phone numbers & warm leads
Plan Comparison
| Feature | PDF Report | Marketing+ |
|---|---|---|
| Full security analysis | ||
| Professional PDF export | ||
| Email delivery | ||
| Lifetime access + unlock code | ||
| Contact emails & phones | — | |
| Marketing outreach data | — |
Already purchased?
Order summary
Digital reports are delivered immediately after payment. By continuing you acknowledge the withdrawal waiver described in our Returns & Refunds policy.
Secure payments processed via EveryPay. Prices in EUR; Incl. 21% VAT.
SEQ SIA
Lastadijas 12 k-3, Riga, Latvia, LV-1050
Reg. No. 40203410806 • VAT LV40203410806
Support: guard@offseq.com • +371 2256 5353
AI Summary
WOM Protocol Pte. Ltd. operates a decentralized advertising platform that leverages user-generated content and peer-reviewed videos to replace traditional advertising with authentic word-of-mouth marketing. The company targets content creators, authenticators, brands, publishers, and e-commerce platforms, providing a suite of Web3-based marketing tools including Campaign Manager, Web Recorder, and Authenticator App. The platform positions itself as an innovative disruptor in the advertising industry, emphasizing quality and authenticity over intrusive ads. Technically, the website is built on Squarespace CMS with integrations of Google Analytics and Tag Manager for tracking, alongside custom JavaScript for Web3 functionalities. The site demonstrates good design quality, mobile optimization, and accessibility, with a moderate performance profile. Security measures include HTTPS with HSTS enabled, secure forms, and no visible vulnerabilities or exposed sensitive data. While the site includes privacy and terms of service policies, it lacks a cookie consent mechanism and explicit security or incident response policies, which are areas for improvement. The domain registration data aligns well with the business claims, indicating legitimacy and consistent registration details. Overall, the website presents a professional and trustworthy front for a medium-sized technology company in the decentralized advertising space.
Detected Technologies
11 urgent findings need attention
3 critical · 8 high
- + 3 more findings in the full report below
Keep womprotocol.io under constant watch
Guard tracks your live infrastructure daily: certificate expiry, DNS & mail authentication drift, uptime changes, subdomain inventory, and unexpected tracker or content shifts. A full timeline captures every diff so you can prove remediation and spot regressions instantly.
Security drift alerts
Risk score drops, new high-severity issues, and header hardening gaps
Compliance watch
GDPR / NIS2 posture changes with governance evidence snapshots
Infrastructure surface
Unexpected open services, SSL expiry, DNS & email authentication changes
Content & tracker intelligence
Marketing tech shifts, analytics drift, and AI recommendation updates
Cancel anytime. Alerts sent to the contacts you choose. Unlock the full report to view historical timelines and alerts.
Security Headers
6 findings
50/100
GDPR Compliance
5 findings
28/100
NIS2 Compliance
9 findings
0/100
Email Security
3 findings
87/100
🧠AI Business Intelligence
Technology stack, business insights, and market analysis powered by AI.
Business Intelligence
Market & Strategic Analysis
WOM Protocol is positioned as a key player in decentralized advertising, leveraging blockchain and Web3 technologies to incentivize authentic user-generated content. Its business model focuses on rewarding content creators and authenticators through a dedicated value creation fund, fostering a new marketing ecosystem. The company has established partnerships with multiple blockchain and marketing firms, enhancing its credibility and reach. The target market includes brands seeking effective social proof, content creators looking for rewards, and publishers aiming to replace invasive ads with user-friendly revenue streams. The presence of multiple specialized apps and tools indicates a comprehensive approach to market needs and growth potential.
Security Posture Analysis
Comprehensive Security Assessment
The website exhibits a good security posture with HTTPS enforced and HSTS enabled, ensuring encrypted communications and protection against protocol downgrade attacks. No sensitive data is exposed in the HTML content, and forms appear to be securely implemented. However, the absence of a dedicated security policy or incident response contact reduces transparency and preparedness for security incidents. No known vulnerable libraries or scripts were detected. The site would benefit from adding a vulnerability disclosure policy or security.txt file to enhance trust and facilitate responsible reporting.
Strategic Recommendations
Priority Actions for Security Improvement
Implement a cookie consent banner to comply with privacy regulations and enhance user trust.
✨Observations
AI-powered comprehensive website and business analysis.
AI-Enhanced Website Analysis
Business Insights
WOM Protocol Pte. Ltd.
WOM Protocol is a decentralized advertising protocol leveraging user-generated content and peer-reviewed videos to replace traditional ads with authentic word-of-mouth marketing. It offers Web3-based marketing tools for content creators, authenticators, brands, publishers, and e-commerce platforms.
good
consistent
Technical Stack
moderate
good
good
good
Security Assessment
- HTTPS enforced
- HSTS enabled
- No exposed sensitive data in HTML
- Use of secure forms
Analytics & Tracking
Advertising & Marketing
Website Quality Assessment
Key Observations
Website is built on Squarespace with custom Web3 integrations
Get this report delivered to your inbox
Receive a summary of the womprotocol.io security findings by email. Quick and easy to share with decision makers.
🛡️Security Headers
HTTP security headers analysis and recommendations.
Security Headers
HTTP security headers analysis
Weak Strict-Transport-Security configuration
LOWCurrent value: "max-age=15552000"
Missing Content-Security-Policy header
HIGHControls resources the browser is allowed to load
Missing X-XSS-Protection header
MEDIUMLegacy XSS protection (deprecated but still recommended)
Missing Referrer-Policy header
LOWControls referrer information sent with requests
Missing Permissions-Policy header
MEDIUMControls browser features and APIs
Sensitive data may be cached
LOWCache-Control header should include "no-store" for sensitive pages
👤GDPR Compliance
Privacy and data protection assessment under GDPR regulations.
GDPR Compliance
Privacy and data protection assessment
No Cookie Policy found
HIGHGDPR requires clear information about cookie usage
No Cookie Consent Banner found
HIGHGDPR requires explicit consent for non-essential cookies
No Data Protection Officer mentioned
LOWLarge organizations may need to designate a DPO under GDPR
Privacy policy may not be GDPR compliant
MEDIUMPrivacy policy lacks explicit GDPR compliance elements
No HTTPS encryption
CRITICALGDPR requires appropriate security measures for personal data
GDPR Compliance Analysis
🛡️NIS2 Compliance
Network & Information Security Directive compliance assessment.
NIS2 Compliance
Network & Information Security Directive
No HTTPS encryption
CRITICALNIS2 requires appropriate technical measures including encryption
No information security framework found
HIGHNIS2 requires documented cybersecurity and information security measures
No vulnerability disclosure policy
MEDIUMNIS2 encourages coordinated vulnerability disclosure
No security policy documentation found
HIGHNIS2 requires documented cybersecurity governance and risk management
No incident response procedures found
HIGHNIS2 requires documented incident response and business continuity plans
No business continuity planning found
MEDIUMNIS2 emphasizes operational resilience and business continuity
No security contact information
HIGHNIS2 requires clear incident reporting channels
No NIS2 reference found
LOWConsider explicitly mentioning NIS2 compliance efforts
Critical sector without clear security compliance
HIGHDetected sectors: energy, transport, banking, digital
Need this report as a PDF?
Download the complete womprotocol.io security analysis as a professional PDF. Share it with your team, clients, or stakeholders.
📧Email Security
SPF, DKIM, and DMARC validation and email security assessment.
Email Security
SPF, DKIM, and DMARC validation
Strict DMARC Alignment
LOWStrict alignment may cause legitimate emails to fail
No MTA-STS Policy
MEDIUMMTA-STS enforces TLS for email delivery
No TLS-RPT Record
LOWTLS-RPT provides reporting for email TLS issues
SPF Details
DKIM Selectors Found
DMARC Details
🏆SSL/TLS Security
Certificate validity and encryption analysis.
SSL/TLS Security
Certificate validity and encryption analysis
No HTTPS Encryption
CRITICALWebsite does not use HTTPS encryption, making all data transmission vulnerable to interception
OCSP Status
📊DNS Health
DNS configuration and security assessment.
DNS Health
DNS configuration and security assessment
DNSSEC Not Enabled
MEDIUMDNSSEC is not configured for this domain
CAA Records Not Configured
LOWCertificate Authority Authorization (CAA) records not found
Domain Registration Details
- •Privacy/proxy registration detected
DNS Records
DNSSEC Status
DNS Performance
SPF Analysis
⚡Network Security
Port scanning and network exposure analysis.
Network Security
Port scanning and network exposure analysis
Good Network Security Posture
LOWNo unnecessary services detected on common risky ports
How does womprotocol.io compare?
See how womprotocol.io stacks up against similar websites in the same industry.
🔧Technical Analysis
Detailed technical findings and analysis from AI assessment.
Technical Analysis
Comprehensive security assessment findings
Additional Findings
Download the womprotocol.io report as PDF
Get the complete analysis in a shareable PDF format, delivered instantly to your email with lifetime access.
PDF Report & Export
PDF download, email delivery, unlock code
Marketing Intelligence
Contact emails, phone numbers & warm leads
Plan Comparison
| Feature | PDF Report | Marketing+ |
|---|---|---|
| Full security analysis | ||
| Professional PDF export | ||
| Email delivery | ||
| Lifetime access + unlock code | ||
| Contact emails & phones | — | |
| Marketing outreach data | — |
Already purchased?
Order summary
Digital reports are delivered immediately after payment. By continuing you acknowledge the withdrawal waiver described in our Returns & Refunds policy.
Secure payments processed via EveryPay. Prices in EUR; Incl. 21% VAT.
SEQ SIA
Lastadijas 12 k-3, Riga, Latvia, LV-1050
Reg. No. 40203410806 • VAT LV40203410806
Support: guard@offseq.com • +371 2256 5353
Scan your own website
Liked the womprotocol.io report? Run the same comprehensive security analysis on your domain — free, instant, and no sign-up required.
Or browse our directory of >10,000 scanned websites.
How did we do?
Your feedback directly shapes our roadmap. Rate the quality of this report, leave an optional comment, and let us know if you want our security specialists to follow up.
What others say about womprotocol.io
Share your experience to help others make informed decisions. We verify every review by email and publish it once our moderation team approves it.
Community rating
—out of 5
0 reviews published