{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"skullsecurity.org","crawled_at":"2026-03-14T05:01:58.314377Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":16276,"rendered_text_length":17133,"ghost_ratio":0.05000000074505806,"rendering_type":"SSR","word_count":1971,"li_count":79,"tr_count":0,"th_count":0,"structure_score":4.010000228881836,"has_org_schema":false,"has_product_schema":false,"schema_count":1,"tech_stack":"proprietary","server_header":"GitHub.com","cdn":"","http_status":200,"load_time_ms":525,"total_html_bytes":39241,"useful_text_bytes":16276,"token_bloat_ratio":2.4000000953674316,"images_total":1,"images_with_alt":1,"multimodal_pct":100,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":581,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"SkullSecurity | SkullSecurity Blog","meta_description":"Adventures In Security","crawl_blocked":false,"ai_readiness_score":67,"sub_bot_access":100,"sub_rendering":99,"sub_structure":37,"sub_schema":2,"sub_tech_stack":50,"extractability_score":56,"crawl_cost_score":10,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":57,"acri_extractability":91,"acri_semantic_structure":44,"acri_content_integrity":72,"acri_retrieval_robustness":28,"acri_grade":"C","h2_texts":"BSidesSF 2025: Miscellaneous challenges | BSidesSF 2025: 101 Challenges | BSidesSF 2025: accan and drago-daction: pwn your own memory | BSidesSF 2025: bug-me (hard reversing challenge) | goto-zero: An extended intro to solving stack overflow CTF challenges | BSidesSF 2024 Writeups: Turing Complete (Reversing / exploitation) | BSidesSF 2024 Writeups: Slay the Spider (A hard heap-overflow) | BSidesSF 2024 Writeups: Safer Streets (Web / reversing) | BSidesSF 2024 Writeups: No Tools (A puzzling Bash challenge) | BSidesSF 2024 Writeups: Can't Give In (CGI exploitation)","tranco_rank":847426,"category":"developer","title_length":34,"meta_desc_length":22,"has_canonical":true,"canonical_url":"https://www.skullsecurity.org/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":0,"h2_count":20,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"SkullSecurity","og_description":"Adventures In Security","og_image":"https://www.skullsecurity.org/assets/skullsecurity.jpg","twitter_card":"summary_large_image","ttfb_ms":525,"dom_node_count":561,"html_payload_kb":38.3,"has_hsts":false,"has_csp":false,"cache_control":"max-age=600","sitemap_declared":true,"sitemap_url":"https://www.skullsecurity.org/sitemap.xml","internal_links":137,"external_links":38,"tracker_scripts":0,"tracker_token_pct":0,"global_score":68,"seo_pillar":31,"geo_pillar":80,"perf_pillar":80,"arch_pillar":83,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-04-08T10:58:39.674134Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"SkullSecurity is a personal blog and wiki focused on security research, reverse engineering, and the security community, primarily maintained by Ron Bowes.","target_audience":"Security researchers, penetration testers, reverse engineers, security enthusiasts, and students interested in cybersecurity.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Long-standing personal blog with a deep history in security research and a strong community following, focused on practical, hands-on experience.","content_depth_score":6,"programmatic_seo_signals":["Category tags (e.g., BSides San Francisco, Cryptography)"],"key_pain_points":["Limited content depth – primarily blog posts and writeups.","Lack of structured content – primarily a personal blog with a wiki.","Difficult to navigate – a single page with links to various posts and resources."]}},"percentile":59,"similar_domains":[{"domain":"nieuwnieuw.com","acri_score":82,"ai_readiness_score":86,"tech_stack":"proprietary","category":"developer","token_bloat_ratio":2.5,"schema_count":2,"distance":4.2799999713897705,"page_title":"Herenmode van topmerken | Nieuwnieuw.com Herenmode - Nieuwnieuw.com Herenmode","h1_text":""},{"domain":"emaaza.com.tr","acri_score":82,"ai_readiness_score":86,"tech_stack":"proprietary","category":"developer","token_bloat_ratio":2.700000047683716,"schema_count":2,"distance":4.339999985694885,"page_title":"Emaaza Taksitli Alışverişin Adresi!","h1_text":""},{"domain":"earlyamerica.com","acri_score":81,"ai_readiness_score":92,"tech_stack":"proprietary","category":"developer","token_bloat_ratio":4.300000190734863,"schema_count":2,"distance":4.670000028610229,"page_title":"Archiving Early America","h1_text":"Archiving Early America"},{"domain":"veiligheids-sloten.nl","acri_score":82,"ai_readiness_score":86,"tech_stack":"proprietary","category":"developer","token_bloat_ratio":2.9000000953674316,"schema_count":3,"distance":4.9,"page_title":"Veiligheids-sloten.nl - Veiligheids-sloten.nl B.V.","h1_text":""},{"domain":"narva.com.au","acri_score":82,"ai_readiness_score":94,"tech_stack":"proprietary","category":"developer","token_bloat_ratio":5.699999809265137,"schema_count":7,"distance":7.739999914169312,"page_title":"Narva | Home","h1_text":""}]}
