The following findings were identified:
- No evidence of credential leakage — no passwords, tokens, or secrets found.
- Some user emails were exposed in the website’s public-facing pages (e.g.,
jonty@travelgay.com
,luke@travelgay.com
). - TLS configuration still supports older protocols (TLS 1.0/1.1) and weak ciphers, although modern secure ciphers are also enabled.
- Missing security headers (HSTS, CSP, X-Frame-Options, etc.) that reduce browser-level protections.
- Minor information disclosures such as robots.txt content and internal path references.