{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"binarly.io","crawled_at":"2026-03-18T23:50:19.413252Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":6180,"rendered_text_length":6867,"ghost_ratio":0.10000000149011612,"rendering_type":"Hybrid","word_count":824,"li_count":74,"tr_count":0,"th_count":0,"structure_score":8.979999542236328,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"hubspot","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":585,"total_html_bytes":59239,"useful_text_bytes":6180,"token_bloat_ratio":9.600000381469727,"images_total":47,"images_with_alt":43,"multimodal_pct":91,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":6634,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Firmware Security  |  Supply Chain Risk Management  |  BINARLY","meta_description":"Binarly’s Transparency Platform offers firmware security for supply chain risk management. Gain visibility into threats and recommendations on remediation.","logo_url":"https://cdn.prod.website-files.com/65d392ca924b59f0fcd873eb/660196452b0cde006a5aae30_favicon-binarly-2.png","crawl_blocked":false,"ai_readiness_score":72,"sub_bot_access":100,"sub_rendering":97,"sub_structure":55,"sub_schema":0,"sub_tech_stack":70,"extractability_score":51,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":54,"acri_extractability":78,"acri_semantic_structure":52,"acri_content_integrity":49,"acri_retrieval_robustness":32,"acri_grade":"D","h1_text":"Software Transparency, Finally Solved","h2_texts":"Advanced Binary Risk Intelligence | How does Binarly work? | A research driven product | How to get started with Binarly | Our latest | News | Advisories | Articles","tranco_rank":54853,"category":"developer","title_length":62,"meta_desc_length":157,"has_canonical":true,"canonical_url":"https://www.binarly.io","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":8,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Firmware Security  |  Supply Chain Risk Management  |  BINARLY","og_description":"Binarly’s Transparency Platform offers firmware security for supply chain risk management. Gain visibility into threats and recommendations on remediation.","og_image":"https://cdn.prod.website-files.com/65d392ca924b59f0fcd873eb/660ebede3f89b76dc492e736_Binarly-X-cover-v2.png","twitter_card":"summary_large_image","ttfb_ms":585,"dom_node_count":640,"html_payload_kb":57.9,"has_hsts":true,"has_csp":true,"cf_cache_status":"HIT","sitemap_declared":true,"sitemap_url":"https://binarly.io/sitemap.xml","internal_links":75,"external_links":9,"tracker_scripts":3,"tracker_domains":"googletagmanager.com | js.hs-scripts.com","tracker_token_pct":0,"global_score":74,"seo_pillar":50,"geo_pillar":79,"perf_pillar":74,"arch_pillar":98,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-03T03:42:35.896713Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Binarly provides a binary risk intelligence platform that shifts the focus to proactive detection and response of vulnerabilities within the","target_audience":"Security analysts, software developers, firmware engineers, cybersecurity professionals, and DevOps teams involved in software supply chain security.","pricing_model":"SEMANTIC VOID","integration_partners":["NVIDIA","Intel","Cisco","Google"],"compliance_standards":[],"competitive_moat":"Combining modern static analysis with machine learning and deep industry expertise to decode the software supply chain puzzle, offering a patented Reachability Analysis Transparency Platform.","content_depth_score":8,"programmatic_seo_signals":["Software Supply Chain Security"],"key_pain_points":["Fatigue from excessive alerts","Unmanageable demand for security teams","Outdated tools and open-source feeds","Challenges with AI-generated code"]}},"percentile":73,"similar_domains":[{"domain":"fbschedules.com","acri_score":79,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":6,"schema_count":1,"distance":13.330000114440917,"page_title":"FBSchedules.com | College and Pro Football Schedules","h1_text":""},{"domain":"zentao.net","acri_score":79,"ai_readiness_score":91,"tech_stack":"proprietary","category":"developer","token_bloat_ratio":4.5,"schema_count":1,"distance":13.780000114440918,"page_title":"禅道项目管理软件 - 开源、免费的项目研发测试管理工具","h1_text":"年倾全力打造开源项目管理软件 助力100万+团队构建研发管理平台"},{"domain":"babycity.co.za","acri_score":79,"ai_readiness_score":87,"tech_stack":"express","category":"developer","token_bloat_ratio":6.099999904632568,"schema_count":2,"distance":13.800000143051147,"page_title":"Baby City | Top Baby Products \u0026 Essential Brands in South Africa","h1_text":""},{"domain":"psylos1.com","acri_score":79,"ai_readiness_score":88,"tech_stack":"nextjs","category":"developer","token_bloat_ratio":5.900000095367432,"schema_count":2,"distance":13.860000085830688,"page_title":"PSYLOS1 - Designer Clothing and Sneakers | Shop for Fashion","h1_text":"PSYLOS1"},{"domain":"coxandcox.co.uk","acri_score":79,"ai_readiness_score":87,"tech_stack":"express","category":"developer","token_bloat_ratio":5.900000095367432,"schema_count":2,"distance":13.860000085830688,"page_title":"Furniture, Home Décor, Lighting \u0026 More | Cox \u0026 Cox","h1_text":"Spend more, save more"}]}
