The Decryption Blast Radius score answers a quantum-specific question. ASM completeness signals answer the other question every visitor asks: "are these guys also checking the obvious stuff?" This page documents the email-auth, security-header, and DNS-takeover checks layered onto every Cipherwake report — what they measure, how they score, what they don't claim.
Three independent surfaces, each contributing a findings stream — they do not alter the Decryption Blast Radius score itself, to keep the quantum signal isolated. They appear as their own grouped findings on every report.
v=spf1 at the apex; checks for missing record, overly permissive (+all), ~all vs. -all posture, and the 10-DNS-lookup limit._dmarc.<domain>; checks for missing record, p=none (monitor-only), p=quarantine, p=reject, and presence of rua/ruf reporting addresses.default, google, k1, selector1, s1, mandrill, etc.); presence indicates DKIM signing is configured but cannot prove signing for any specific message.HTTPS HEAD/GET to the apex + www; we record the presence and basic posture of:
Strict-Transport-Security (HSTS) — presence, max-age, includeSubDomains, preload.Content-Security-Policy — presence (we do not deeply parse).X-Content-Type-Options: nosniff.Referrer-Policy.X-Frame-Options or equivalent frame-ancestors directive in CSP.Permissions-Policy (presence only).For each subdomain observed in CT logs we check:
CNAME targets pointing to known-takeover-prone services (GitHub Pages, Heroku, AWS S3, Azure App Service, Fastly, etc.) where the target endpoint returns a "no such app" / "bucket not found" / 404-with-takeover-marker response.SPF and DMARC are pure DNS lookups and execute in milliseconds. DKIM is a best-effort selector probe and never fully proves signing — its absence at common selectors is suggestive, not conclusive.
Header checks fetch the apex + www; we honor robots.txt for the surface scan and use a 10-second timeout. We record HTTP status, response time, and the header set; we do not render JavaScript, follow client-side redirects, or fetch any subresources.
Takeover checks query each candidate target, look for the well-known takeover-fingerprint response from the cloud provider, and flag matches. We follow well-published heuristics (Detectify's takeover dictionary as a reference set) and refresh the rules quarterly.
Each surface contributes findings (severity-tagged) but does not modify the DBR score. The findings appear in their own grouping with severity:
| Signal | Severity if missing/weak |
|---|---|
SPF missing or +all | High |
| DMARC missing | High |
DMARC p=none | Medium |
| HSTS missing | Medium |
| HSTS < 6 months | Low |
| CSP missing | Low (informational) |
| X-Content-Type-Options missing | Low |
| Subdomain takeover detected | Critical |
| Dangling DNS suggestive of takeover | High |
default-src *) and a hardened CSP both show as "present." Deep CSP analysis is on our roadmap, not shipped today.npx pqcheck <domain>/api/scan?domain=<domain> returns the full findings stream including ASM.