{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"research.orca.security","crawled_at":"2026-03-17T23:44:22.940766Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":4576,"rendered_text_length":4817,"ghost_ratio":0.05000000074505806,"rendering_type":"SSR","word_count":650,"li_count":74,"tr_count":0,"th_count":0,"structure_score":11.380000114440918,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"nextjs","server_header":"Vercel","cdn":"vercel","http_status":200,"load_time_ms":1569,"total_html_bytes":168156,"useful_text_bytes":4576,"token_bloat_ratio":36.70000076293945,"images_total":20,"images_with_alt":20,"multimodal_pct":100,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":62179,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"The Leader in Cloud Security Research | Orca Security","meta_description":"Discover the Orca Research Pod - a trusted source for in-depth examination of cloud security risks and vulnerabilities, driving best practices in the industry.","logo_url":"https://research.orca.security/favicon.ico?favicon.d15beb8d.ico","crawl_blocked":false,"ai_readiness_score":74,"sub_bot_access":100,"sub_rendering":99,"sub_structure":62,"sub_schema":0,"sub_tech_stack":70,"extractability_score":46,"crawl_cost_score":55,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":50,"acri_extractability":72,"acri_semantic_structure":56,"acri_content_integrity":32,"acri_retrieval_robustness":36,"acri_grade":"D","h1_text":"Orca Research Pod","h2_texts":"Featured | Latest | Explore | In the News | 2025 State of Cloud Security Report: Hunting threats in the age of relentless risk","category":"developer","title_length":53,"meta_desc_length":159,"has_canonical":true,"canonical_url":"https://research.orca.security","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":5,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"The Leader in Cloud Security Research | Orca Security","og_description":"Discover the Orca Research Pod - a trusted source for in-depth examination of cloud security risks and vulnerabilities, driving best practices in the industry.","og_image":"https://research.orca.security/opengraph-image.png?opengraph-image.203a64e3.png","twitter_card":"summary_large_image","ttfb_ms":1569,"dom_node_count":506,"html_payload_kb":164.2,"has_hsts":true,"has_csp":false,"cache_control":"private, no-cache, no-store, max-age=0, must-revalidate","sitemap_declared":false,"internal_links":0,"external_links":47,"tracker_scripts":0,"tracker_token_pct":0,"global_score":58,"seo_pillar":50,"geo_pillar":62,"perf_pillar":56,"arch_pillar":65,"data_tier":0,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":false},"percentile":78,"similar_domains":[{"domain":"kadokawa.com.tw","acri_score":75,"ai_readiness_score":81,"tech_stack":"nextjs","category":"developer","token_bloat_ratio":4.900000095367432,"schema_count":1,"distance":9.25,"page_title":"台灣角川","h1_text":""},{"domain":"dalbe.fr","acri_score":75,"ai_readiness_score":82,"tech_stack":"nextjs","category":"developer","token_bloat_ratio":9.199999809265137,"schema_count":2,"distance":9.75,"page_title":"Dalbe L'Art de la création","h1_text":"Dalbe"},{"domain":"cpaddict.com","acri_score":75,"ai_readiness_score":88,"tech_stack":"nextjs","category":"developer","token_bloat_ratio":9.100000381469727,"schema_count":2,"distance":9.75,"page_title":"Complete Performance","h1_text":"SHOP BY BUILD"},{"domain":"docs.modx.com","acri_score":75,"ai_readiness_score":80,"tech_stack":"proprietary","category":"developer","token_bloat_ratio":3.5999999046325684,"schema_count":0,"distance":16.75,"page_title":"MODX Documentation | MODX Documentation","h1_text":"MODX Documentation"},{"domain":"w3cschool.cn","acri_score":75,"ai_readiness_score":80,"tech_stack":"express","category":"developer","token_bloat_ratio":3.9000000953674316,"schema_count":0,"distance":16.75,"page_title":"w3cschool官网 - 1000多本编程教程免费学","h1_text":"w3cschool - 编程狮，随时随地学编程"}]}
