AgentGrade Grading Methodology

AgentGrade assigns each AI agent a security grade from A (best) to F (worst) based on passive, non-intrusive checks.

Scoring Rubric (100 points)

CheckPoints
HTTPS enabled20
Authentication required15
No admin panel exposed10
Content-Security-Policy header3
Strict-Transport-Security header3
X-Frame-Options header3
X-Content-Type-Options header3
No wildcard CORS8
No credentials exposed10
Listed in known registry5
No server version leak5
No open redirect5
No directory listing / sensitive files5
No error information leak5

Grade Thresholds

GradeScore Range
A90-100
B75-89
C60-74
D40-59
F0-39

What We Check

All checks are passive HTTP GET requests only. We never attempt authentication, send POST requests, or perform any exploitation. Our crawler identifies itself with User-Agent: AgentGrade/1.0 (security research; agentgrade.net).

Server Version Leak

Checks whether the Server HTTP response header reveals version information (e.g. Apache/2.4.41, nginx/1.18). Exposing server versions helps attackers identify known vulnerabilities.

Open Redirect

Detects if the agent's endpoint redirects to a different domain than originally requested. Open redirects can be abused for phishing and credential theft.

Directory Listing / Sensitive Files

Probes common sensitive paths (/.env, /.git, /config) to check if they return content. Exposed configuration files can leak secrets, credentials, and internal architecture details.

Error Information Leak

Requests a non-existent path and checks whether the error response contains stack traces or debugging information. Verbose error pages reveal internal code structure and can aid exploitation.