{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"straiker.ai","crawled_at":"2026-03-19T02:30:00.112981Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":5485,"rendered_text_length":6094,"ghost_ratio":0.10000000149011612,"rendering_type":"Hybrid","word_count":775,"li_count":0,"tr_count":0,"th_count":0,"structure_score":0,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"cloudflare-pages","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":575,"total_html_bytes":127196,"useful_text_bytes":5485,"token_bloat_ratio":23.200000762939453,"images_total":37,"images_with_alt":7,"multimodal_pct":19,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":5639,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Straiker | The Agentic AI Security Company","meta_description":"The agentic AI security company. Straiker detects prompt injection, tool misuse, and runtime attacks across every AI agent you build or deploy, with 98.1% threat detection accuracy.","logo_url":"https://cdn.prod.website-files.com/67e35850d44d18d58bb2404c/68b8b3a96ebe9a65942fa233_favicon.ico","crawl_blocked":false,"ai_readiness_score":68,"sub_bot_access":100,"sub_rendering":97,"sub_structure":0,"sub_schema":42,"sub_tech_stack":75,"extractability_score":39,"crawl_cost_score":40,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":32,"acri_extractability":64,"acri_semantic_structure":23,"acri_content_integrity":45,"acri_retrieval_robustness":10,"acri_grade":"F","h1_text":"Agentic AI Security for Every Agent","h2_texts":"When AI agents Emerge, Threats Follow | AI Agents: Autonomous Power \u0026 Chaos | Security FOR THE AGENTIC AI ERA | Built for AI agents | WE Beat ALL frontier models | Meet YOur Agents | Adversarial testing | AI Runtime Security | Join the Frontlines of Agentic Security | Security for \u2028Agentic AI Apps","tranco_rank":411110,"category":"infrastructure","title_length":42,"meta_desc_length":181,"has_canonical":true,"canonical_url":"https://www.straiker.ai/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":10,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Straiker | The Agentic AI Security Company","og_description":"The agentic AI security company. Straiker detects prompt injection, tool misuse, and runtime attacks across every AI agent you build or deploy, with 98.1% threat detection accuracy.","og_image":"https://cdn.prod.website-files.com/67e35850d44d18d58bb2404c/69b2bd81bf5e99aec69bf97d_str-og-home-2-v2.png","twitter_card":"summary_large_image","ttfb_ms":575,"dom_node_count":1086,"html_payload_kb":124.2,"has_hsts":true,"has_csp":false,"cf_cache_status":"HIT","sitemap_declared":true,"sitemap_url":"https://www.straiker.ai/sitemap.xml","internal_links":54,"external_links":0,"tracker_scripts":1,"tracker_domains":"googletagmanager.com","tracker_token_pct":0,"global_score":59,"seo_pillar":57,"geo_pillar":51,"perf_pillar":65,"arch_pillar":74,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":false},"percentile":62,"similar_domains":[{"domain":"mevlitevi.com","acri_score":57,"ai_readiness_score":70,"tech_stack":"cloudflare-pages","category":"infrastructure","token_bloat_ratio":7.800000190734863,"schema_count":2,"distance":8.870000171661378,"page_title":"Mevlüt Hediyelikleri - Yasin Kitabı - Mevlit Evi","h1_text":"Mevlit Evi - Mevlüt Hediyelikleri"},{"domain":"attconnects.com","acri_score":57,"ai_readiness_score":81,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":16,"schema_count":1,"distance":13.910000228881836,"page_title":"AT\u0026T Connects | Invested in Connecting More Americans","h1_text":"Home"},{"domain":"fynkus.com","acri_score":57,"ai_readiness_score":77,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":15.300000190734863,"schema_count":1,"distance":14.120000171661378,"page_title":"Programa administración fincas. Software gestión comunidades","h1_text":"Administrar nunca fue tan fácil y rápido"},{"domain":"lefty.io","acri_score":57,"ai_readiness_score":76,"tech_stack":"nextjs","category":"infrastructure","token_bloat_ratio":16.899999618530273,"schema_count":2,"distance":14.140000343322754,"page_title":"Grow the impact of your influencer community","h1_text":"Grow the impact of your influencer community"},{"domain":"stcs.com.sa","acri_score":57,"ai_readiness_score":82,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":16.100000381469727,"schema_count":0,"distance":14.380000114440918,"page_title":"solutions by stc","h1_text":"IT Services Provider to Saudi Arabia’s leading companies"}]}
