
Is zkm.io Safe? Security Analysis for ZKM
Check if zkm.io is a scam or legitimate. Free security scan and reviews.
AI Summary
ZKM is a small US-based technology company founded in 2023, specializing in open-source zero-knowledge proof infrastructure and blockchain interoperability solutions. Their flagship product, the zkMIPS virtual machine, supports verifiable computing across multiple blockchain ecosystems and IoT devices, aiming to enable instant, secure transactions and unified native liquidity across blockchains. The company positions itself as an innovator in Layer 2 scaling and hybrid rollup technologies, targeting blockchain developers, zero-knowledge researchers, and IoT engineers worldwide. Technically, the website is built on modern web technologies including Webflow CMS, Google Tag Manager, and uses advanced multimedia content hosted on Dropbox. The site is mobile-optimized, fast-loading, and well-structured with comprehensive metadata and SEO practices. Security measures include HTTPS, Google reCAPTCHA, and controlled script loading, though some security headers and explicit security policies are absent. The security posture is solid but could be improved by publishing dedicated security and incident response policies, implementing security headers, and adding a vulnerability disclosure program. Privacy compliance is supported by a comprehensive privacy policy and terms of service, but lacks an explicit cookie consent mechanism. WHOIS data is unavailable due to privacy protections, which is common for tech startups, but the website content and business information support legitimacy. Overall, ZKM presents a professional, trustworthy, and technically mature web presence with a strong focus on cutting-edge blockchain technology. Strategic improvements in security transparency and privacy mechanisms would enhance trust and compliance further.
Detected Technologies
🧠AI Business Intelligence
Technology stack, business insights, and market analysis powered by AI.
Business Intelligence
Market & Strategic Analysis
ZKM operates in the blockchain technology sector with a focus on zero-knowledge proofs and Layer 2 scaling solutions. Their open-source business model offers free infrastructure tools and paid proving services, targeting developers and researchers in the blockchain ecosystem. The company has secured funding from notable investors such as OKX Ventures and Amber Group, indicating strong market confidence. Their active presence on multiple social and developer platforms fosters community engagement and ecosystem growth. The company’s innovative hybrid rollup technology and zkMIPS VM provide competitive advantages in interoperability and security, positioning ZKM as a promising player in the evolving blockchain infrastructure market.
Extracted Contact Information
Marketing Intelligence Data
Email Addresses (1)
Physical Addresses (1)
Security Posture Analysis
Comprehensive Security Assessment
ZKM demonstrates a good security maturity level with HTTPS enforcement and use of Google reCAPTCHA to protect forms. No sensitive data exposure or vulnerable libraries were detected in the website content. However, the absence of explicit security policies, incident response plans, and security headers like Content-Security-Policy and Strict-Transport-Security indicates room for improvement. No vulnerability disclosure or security.txt files were found, which could limit external security collaboration. Privacy policies are comprehensive and GDPR compliant, but cookie consent mechanisms are missing. Overall, the security posture is solid but would benefit from enhanced transparency and formalized security governance.
Strategic Recommendations
Priority Actions for Security Improvement
Publish a dedicated security policy and incident response plan on the website.
✨Observations
AI-powered comprehensive website and business analysis.
AI-Enhanced Website Analysis
Business Insights
ZKM
ZKM is an open-source infrastructure project building ZK-enabled Hybrid Rollup technology based on MIPS architecture. Their zkMIPS virtual machine enables verifiable computing for blockchain interoperability, IoT devices, and cloud computing with zero-knowledge proofs. They aim to enable instant transactions with maximum security and connect Layer 1 blockchains to the Ethereum ecosystem securely.
excellent
consistent
Technical Stack
fast
excellent
good
good
Security Assessment
- HTTPS enabled
- Google reCAPTCHA implemented
- No exposed sensitive data in HTML
- Use of Google Tag Manager for controlled script loading
Analytics & Tracking
Advertising & Marketing
Website Quality Assessment
Key Observations
Website is fully accessible with rich content and multimedia
🛡️Security Headers
HTTP security headers analysis and recommendations.
Security Headers
HTTP security headers analysis
Missing X-Frame-Options header
HIGHPrevents clickjacking attacks
Missing X-Content-Type-Options header
MEDIUMPrevents MIME type sniffing
Missing Content-Security-Policy header
HIGHControls resources the browser is allowed to load
Missing X-XSS-Protection header
MEDIUMLegacy XSS protection (deprecated but still recommended)
Missing Referrer-Policy header
LOWControls referrer information sent with requests
Missing Permissions-Policy header
MEDIUMControls browser features and APIs
Sensitive data may be cached
LOWCache-Control header should include "no-store" for sensitive pages
👤GDPR Compliance
Privacy and data protection assessment under GDPR regulations.
GDPR Compliance
Privacy and data protection assessment
No Cookie Policy found
HIGHGDPR requires clear information about cookie usage
No Cookie Consent Banner found
HIGHGDPR requires explicit consent for non-essential cookies
No Data Protection Officer mentioned
LOWLarge organizations may need to designate a DPO under GDPR
Privacy policy may not be GDPR compliant
MEDIUMPrivacy policy lacks explicit GDPR compliance elements
GDPR Compliance Analysis
🛡️NIS2 Compliance
Network & Information Security Directive compliance assessment.
NIS2 Compliance
Network & Information Security Directive
No information security framework found
HIGHNIS2 requires documented cybersecurity and information security measures
No vulnerability disclosure policy
MEDIUMNIS2 encourages coordinated vulnerability disclosure
No security policy documentation found
HIGHNIS2 requires documented cybersecurity governance and risk management
No incident response procedures found
HIGHNIS2 requires documented incident response and business continuity plans
No security contact information
HIGHNIS2 requires clear incident reporting channels
No vulnerability reporting mechanism
MEDIUMClear vulnerability reporting supports coordinated disclosure
No NIS2 reference found
LOWConsider explicitly mentioning NIS2 compliance efforts
📧Email Security
SPF, DKIM, and DMARC validation and email security assessment.
Email Security
SPF, DKIM, and DMARC validation
No BIMI Record
LOWBIMI displays brand logos in email clients
No MTA-STS Policy
MEDIUMMTA-STS enforces TLS for email delivery
No TLS-RPT Record
LOWTLS-RPT provides reporting for email TLS issues
SPF Details
DKIM Selectors Found
DMARC Details
🏆SSL/TLS Security
Certificate validity and encryption analysis.
SSL/TLS Security
Certificate validity and encryption analysis
Weak Protocols Supported
HIGHServer supports weak protocols: TLSv1.1
OCSP Stapling Not Enabled
LOWOCSP stapling improves performance and privacy
Certificate Transparency Not Implemented
LOWCertificate is not logged in Certificate Transparency logs
SSL Certificate Expires Within 90 Days
MEDIUMSSL certificate expires in 88 days
Partial SSL/TLS Assessment
LOWCompleted 3 of 4 security checks due to time constraints
Protocol Support
OCSP Status
📊DNS Health
DNS configuration and security assessment.
DNS Health
DNS configuration and security assessment
DNSSEC Not Enabled
MEDIUMDNSSEC is not configured for this domain
CAA Records Not Configured
LOWCertificate Authority Authorization (CAA) records not found
Domain Registration Details
- •Privacy/proxy registration detected
DNS Records
DNSSEC Status
DNS Performance
SPF Analysis
⚡Network Security
Port scanning and network exposure analysis.
Network Security
Port scanning and network exposure analysis
Good Network Security Posture
LOWNo unnecessary services detected on common risky ports
🔧Technical Analysis
Detailed technical findings and analysis from AI assessment.
Technical Analysis
Comprehensive security assessment findings