{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"safebreach.com","crawled_at":"2026-03-16T16:27:10.745489Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":18700,"rendered_text_length":18700,"ghost_ratio":0,"rendering_type":"SSR","word_count":1228,"li_count":149,"tr_count":0,"th_count":0,"structure_score":12.130000114440918,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":672,"total_html_bytes":151125,"useful_text_bytes":18700,"token_bloat_ratio":8.100000381469727,"images_total":43,"images_with_alt":13,"multimodal_pct":30,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":16029,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"SafeBreach | Exposure Validation Platform","meta_description":"SafeBreach provides the leading exposure validation platform, combining breach and attack simulation with attack path validation.","logo_url":"https://www.safebreach.com/wp-content/uploads/2021/12/favicon.png","crawl_blocked":false,"ai_readiness_score":83,"sub_bot_access":100,"sub_rendering":100,"sub_structure":64,"sub_schema":42,"sub_tech_stack":85,"extractability_score":67,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":67,"acri_extractability":77,"acri_semantic_structure":65,"acri_content_integrity":70,"acri_retrieval_robustness":53,"acri_grade":"C","h1_text":"2026 State of the Breach Report","h2_texts":"Trusted by the World’s Largest Enterprises | Not all exposure validation platforms are created equal. | Frequently Asked Questions | Defend your cyber investment like you defend your business. | Efficiently manage complex ecosystems.","tranco_rank":254028,"category":"developer","title_length":41,"meta_desc_length":129,"has_canonical":true,"canonical_url":"https://www.safebreach.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":4,"h2_count":5,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"SafeBreach | Exposure Validation Platform","og_description":"SafeBreach provides the leading exposure validation platform, combining breach and attack simulation with attack path validation.","og_image":"https://www.safebreach.com/wp-content/uploads/2022/01/more_about_two.svg","twitter_card":"summary_large_image","ttfb_ms":672,"dom_node_count":1027,"html_payload_kb":147.6,"has_hsts":true,"has_csp":true,"cache_control":"max-age=600, must-revalidate","cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"https://www.safebreach.com/sitemap_index.xml","internal_links":130,"external_links":9,"tracker_scripts":0,"tracker_token_pct":0,"global_score":78,"seo_pillar":73,"geo_pillar":84,"perf_pillar":65,"arch_pillar":88,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":326553,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":9,"llm_analyzed":true,"llm_analyzed_at":"2026-03-12T10:08:12.784986Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"SafeBreach provides a breach and attack simulation (BAS) platform that continuously evaluates an organization’s security posture by mimicking real-world cyberattacks,","target_audience":"CISOs, Board Members, Executive Stakeholders, Red/Blue/Purple Team members, Detection Engineering Teams, Threat and Vulnerability Management Teams, Security Operations and Engineering","pricing_model":"SEMANTIC VOID","integration_partners":["SIEM systems","SOAR tools","Workflow management and collaboration systems","Threat intelligence systems","Vulnerability management tools","Advanced threat protection platforms","Anomali"],"compliance_standards":[],"competitive_moat":"Pioneer in BAS space with the industry’s largest and most up-to-date threat playbook (30,000 attack methods) and broadest MITRE ATT\u0026CK coverage (updated within 24 hours of US CERT/FBI alerts).","content_depth_score":9,"programmatic_seo_signals":["Technology Partners page","Integration directory pages","Template comparison pages"],"key_pain_points":["No structured FAQ schema","Thin landing pages for features"]}},"percentile":97,"similar_domains":[{"domain":"xn--80aefbvrodbz.xn--p1ai","acri_score":83,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":7.699999809265137,"schema_count":1,"distance":2.5200001716613767,"page_title":"Интернет-магазин саженцев в Москве - Мой Садовод","h1_text":""},{"domain":"jitterbit.net","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":2.700000047683716,"schema_count":1,"distance":3.870000100135803,"page_title":"AI-Powered Enterprise Automation \u0026 Integration | Jitterbit","h1_text":"Automation with AI accountability at its core."},{"domain":"fastpng.com","acri_score":84,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":3.9000000953674316,"schema_count":2,"distance":4.310000085830688,"page_title":"100% Free PNG Images to use [1,000,000+ PNGs]- FastPNG","h1_text":""},{"domain":"furunavi.jp","acri_score":82,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":3.9000000953674316,"schema_count":3,"distance":4.510000085830688,"page_title":"ふるさと納税サイト【ふるなび】｜初めての方でも安心・かんたん寄附！","h1_text":""},{"domain":"blastengine.jp","acri_score":82,"ai_readiness_score":95,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":2.700000047683716,"schema_count":3,"distance":4.870000100135803,"page_title":"【公式】ブラストエンジン（blastengine）｜API連携・SMTPリレー","h1_text":"99％以上の高いメール到達率を実現API連携・SMTPリレーで高速メール配信ブラストエンジン"}]}
