{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"anchore.com","crawled_at":"2026-03-16T15:42:03.374643Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":26696,"rendered_text_length":26696,"ghost_ratio":0,"rendering_type":"SSR","word_count":1680,"li_count":52,"tr_count":0,"th_count":0,"structure_score":3.0999999046325684,"has_org_schema":true,"has_product_schema":false,"schema_count":3,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":706,"total_html_bytes":256766,"useful_text_bytes":26696,"token_bloat_ratio":9.600000381469727,"images_total":92,"images_with_alt":23,"multimodal_pct":25,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":41278,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"SBOM-Powered Software Composition Analysis • Anchore","meta_description":"Anchore's software supply chain solutions automate vulnerability scanning, strengthen container security, and support compliance with NIST, FedRAMP \u0026 more.","logo_url":"https://cdn-dllid.nitrocdn.com/lfaFdmeTaONuMeYAvisIiEiZRrNJpVpd/assets/images/optimized/rev-954346f/anchore.com/wp-content/uploads/2021/12/Anchore_Mark_Blue-100-1.png","crawl_blocked":false,"ai_readiness_score":77,"sub_bot_access":100,"sub_rendering":100,"sub_structure":32,"sub_schema":46,"sub_tech_stack":85,"extractability_score":57,"crawl_cost_score":50,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":56,"acri_extractability":76,"acri_semantic_structure":46,"acri_content_integrity":68,"acri_retrieval_robustness":34,"acri_grade":"C","h1_text":"Control your supply chain risk. Stay compliant by default.","h2_texts":"Featured Resources | Additional Resources | Platform | Federal | Solutions | Resources | Learn | Connect | Company","tranco_rank":482556,"category":"government","title_length":54,"meta_desc_length":155,"has_canonical":true,"canonical_url":"https://anchore.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":9,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"SBOM-Powered Software Composition Analysis • Anchore","og_description":"Anchore's software supply chain solutions automate vulnerability scanning, strengthen container security, and support compliance with NIST, FedRAMP \u0026 more.","og_image":"https://anchore.com/wp-content/uploads/2021/12/Site-Image.jpg","twitter_card":"summary","ttfb_ms":706,"dom_node_count":1461,"html_payload_kb":250.7,"has_hsts":true,"has_csp":false,"cache_control":"max-age=600, must-revalidate","cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"https://anchore.com/sitemap_index.xml","internal_links":221,"external_links":4,"tracker_scripts":5,"tracker_domains":"googletagmanager.com | google-analytics.com | doubleclick.net","tracker_token_pct":0,"global_score":73,"seo_pillar":67,"geo_pillar":80,"perf_pillar":59,"arch_pillar":81,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":53752,"ai_trust_percentile":0,"inbound_ai_links":2,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-23T00:35:59.307907Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Anchore provides an API-based integration into DevOps toolchains for automated container security scanning and vulnerability management.","target_audience":"DevSecOps engineers, DevOps engineers, security engineers, developers, system administrators","pricing_model":"SEMANTIC VOID","integration_partners":["BitBucket","Bamboo","Amazon ECR","Azure DevOps","Azure ACR","Canonical","CircleCI","CloudBees Jenkins"],"compliance_standards":[],"competitive_moat":"100% API coverage for DevOps toolchains, enabling automated vulnerability scanning and integration.","content_depth_score":7,"programmatic_seo_signals":["integration with BitBucket Pipes","integration with Bamboo","integration with Azure DevOps","integration with GitHub Packages","integration with Jenkins-X","integration with CircleCI","integration with Red Hat Openshift","integration with Slack"],"key_pain_points":["Lack of structured FAQ schema","Thin landing pages for features"]}},"percentile":86,"similar_domains":[{"domain":"wwwilliams.com","acri_score":78,"ai_readiness_score":90,"tech_stack":"wordpress","category":"government","token_bloat_ratio":10.899999618530273,"schema_count":1,"distance":4.689999771118163,"page_title":"W.W. Williams | Equipment, Diesel \u0026 Truck Repair, Service \u0026 More","h1_text":"Expanding Our California Footprint"},{"domain":"bouldercounty.org","acri_score":80,"ai_readiness_score":90,"tech_stack":"wordpress","category":"government","token_bloat_ratio":11.600000381469727,"schema_count":5,"distance":5.199999999999999,"page_title":"Home - Boulder County","h1_text":"Boulder County"},{"domain":"bouldercounty.gov","acri_score":80,"ai_readiness_score":90,"tech_stack":"wordpress","category":"government","token_bloat_ratio":11.699999809265137,"schema_count":5,"distance":5.229999828338623,"page_title":"Home - Boulder County","h1_text":"Boulder County"},{"domain":"ardot.gov","acri_score":78,"ai_readiness_score":90,"tech_stack":"wordpress","category":"government","token_bloat_ratio":13.5,"schema_count":1,"distance":5.469999885559082,"page_title":"Arkansas Department of Transportation","h1_text":"ARDOT Launches New Adopt-A-Highway Interactive Map"},{"domain":"tullylegal.com","acri_score":79,"ai_readiness_score":91,"tech_stack":"wordpress","category":"government","token_bloat_ratio":14.800000190734863,"schema_count":4,"distance":5.50999994277954,"page_title":"Commercial and Personal Lawyers | Tully Rinckey PLLC","h1_text":"Experienced Lawyers Headquartered in New York, Serving the Nation"}]}
