{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"legitsecurity.com","crawled_at":"2026-03-20T20:57:52.156938Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":123307,"rendered_text_length":129797,"ghost_ratio":0.05000000074505806,"rendering_type":"SSR","word_count":3944,"li_count":30,"tr_count":0,"th_count":0,"structure_score":0.7599999904632568,"has_org_schema":true,"has_product_schema":false,"schema_count":2,"tech_stack":"proprietary","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":592,"total_html_bytes":382844,"useful_text_bytes":123307,"token_bloat_ratio":3.0999999046325684,"images_total":180,"images_with_alt":178,"multimodal_pct":99,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":10535,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"ASPM, AI Remediation \u0026 Secrets Scanning: AI-Native Application Security","meta_description":"Legit Security is the AI-native ASPM platform to detect, fix and prevent AppSec risk from AI-generated code, secrets, and critical vulnerabilities.","logo_url":"https://www.legitsecurity.com/hubfs/raw_assets/public/legit_security_refresh/images/icon/favicon-16x16.png","crawl_blocked":false,"ai_readiness_score":70,"sub_bot_access":100,"sub_rendering":99,"sub_structure":16,"sub_schema":44,"sub_tech_stack":50,"extractability_score":61,"crawl_cost_score":50,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":48,"acri_extractability":89,"acri_semantic_structure":33,"acri_content_integrity":72,"acri_retrieval_robustness":17,"acri_grade":"D","h1_text":"Secure AI-Generated Code Before it Ships","h2_texts":"Legit AI-Native AppSec | Benefits of AI-Native ASPM \u0026 AppSec | What are Legit’s key features and capabilities? | The Most Legit Platform to Secure the Modern Software Factory | Full SDLC Visibility | Business Risk Prioritization | Continuous Compliance | AI Platform-Wide-Powered Accuracy | Recent Blog Posts | A Foundation You Can Trust","tranco_rank":530288,"category":"developer","title_length":71,"meta_desc_length":147,"has_canonical":true,"canonical_url":"https://www.legitsecurity.com","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":7,"h2_count":12,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"ASPM, AI Remediation \u0026 Secrets Scanning: AI-Native Application Security","og_description":"Legit Security is the AI-native ASPM platform to detect, fix and prevent AppSec risk from AI-generated code, secrets, and critical vulnerabilities.","twitter_card":"summary","ttfb_ms":592,"dom_node_count":2142,"html_payload_kb":373.9,"has_hsts":true,"has_csp":true,"cache_control":"no-store, no-cache, must-revalidate","sitemap_declared":true,"sitemap_url":"https://www.legitsecurity.com/sitemap.xml","internal_links":254,"external_links":10,"tracker_scripts":3,"tracker_domains":"googletagmanager.com","tracker_token_pct":0,"global_score":66,"seo_pillar":48,"geo_pillar":71,"perf_pillar":52,"arch_pillar":99,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-25T04:30:30.447749Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Legit Security provides a comprehensive application security platform that helps organizations manage and remediate software vulnerabilities across their entire development","target_audience":"CISOs, Security Architects, DevOps Engineers, Application Security Professionals, Software Developers, and IT Managers","pricing_model":"Subscription-based, with tiered pricing based on features and usage (details not explicitly stated).","integration_partners":["GitHub","GitLab","SharePoint"],"compliance_standards":["EU Cyber Resilience Act"],"competitive_moat":"AI-powered vulnerability detection and remediation, combined with a focus on policy enforcement and business-driven insights, providing a more proactive and efficient approach to application security than traditional methods.","content_depth_score":8,"programmatic_seo_signals":["Integration directory pages","Template comparison pages"],"key_pain_points":["No structured FAQ schema","Thin landing pages for features"]}},"percentile":67,"similar_domains":[{"domain":"saulaie.com","acri_score":73,"ai_readiness_score":84,"tech_stack":"proprietary","category":"developer","token_bloat_ratio":4.900000095367432,"schema_count":1,"distance":4.790000057220459,"page_title":"Fauteuil, chaise, art de la table, décoration et meubles de qualité\n     | Maison Saulaie","h1_text":""},{"domain":"inveniordm.docs.cern.ch","acri_score":73,"ai_readiness_score":80,"tech_stack":"proprietary","category":"developer","token_bloat_ratio":2.0999999046325684,"schema_count":0,"distance":5.05,"page_title":"Turn-key research data management repository","h1_text":""},{"domain":"gujaratimidday.com","acri_score":73,"ai_readiness_score":85,"tech_stack":"proprietary","category":"developer","token_bloat_ratio":6.199999809265137,"schema_count":3,"distance":5.179999971389771,"page_title":"Gujarati News | Latest News in Gujarati - Gujarati Mid-day","h1_text":"ફોકસ"},{"domain":"toyota.sk","acri_score":73,"ai_readiness_score":84,"tech_stack":"nextjs","category":"developer","token_bloat_ratio":4.599999904632568,"schema_count":2,"distance":12.2,"page_title":"Osobné a úžitkové vozidlá | Predaj a Servis | Toyota","h1_text":"Vitajte v Toyote"},{"domain":"eddiebauer.com","acri_score":73,"ai_readiness_score":89,"tech_stack":"shopify","category":"developer","token_bloat_ratio":4.699999809265137,"schema_count":2,"distance":12.22999997138977,"page_title":"Eddie Bauer: Outdoor Apparel, Outerwear \u0026 Gear | Free Shipping $99+","h1_text":""}]}
