Pilates Circles By Cult
App Quality Report
Powered by Testers.AI
B+87%
Quality Score
4
Pages
41
Issues
8.0
Avg Confidence
8.1
Avg Priority
17 Critical21 High3 Medium
Testers.AI
>_ Testers.AI AI Analysis

Pilates Circles By Cult was tested and 41 issues were detected across the site. The most critical finding was: Unconsented third-party data sharing with Sentry error reporting. Issues span Security, Performance, A11y, Other categories. Persona feedback rated Visual highest (8/10) and Accessibility lowest (6/10).

Qualitative Quality
Pilates Circles By Cult
Category Avg
Best in Category
Issue Count by Type
A11y
14
Content
10
UX
5
Security
2
Pages Tested · 4 screenshots
Detected Issues · 41 total
1
Unconsented third-party data sharing with Sentry error reporting
CRIT P9
Conf 9/10 Other
Prompt to Fix
In the frontend Sentry config, implement privacy-preserving telemetry: 1) Disable sending default PII by setting sendDefaultPii: false. 2) Add a beforeSend(event) function to redact or remove PII data from the payload (e.g., event.user, event.ip, event.request.headers, event.request.query_string). 3) Ensure no sensitive data (emails, names, addresses, or session identifiers) are included in error reports. 4) If possible, configure a self-hosted Sentry with strict data retention and explicit user consent disclosures in the privacy policy.
Why it's a bug
The application posts telemetry data to a third-party Sentry endpoint (ingest.us.sentry.io). This introduces potential exposure of user identifiers or personal data in error reports and analytics to a third party. Without explicit disclosure/consent and proper data minimization, this is a privacy risk and could violate data protection regulations.
Why it might not be a bug
Sentry is a common telemetry service; if the payload is strictly non-PII and adequately minimized, this is standard practice. However, given the logs show a direct third-party endpoint without explicit consent indicators, it warrants review.
Suggested Fix
Configure error tracking to scrub PII before sending to Sentry and disable default PII collection. Implement a beforeSend hook and set sendDefaultPii to false in the frontend Sentry initialization. Specifically remove or redacts fields such as event.user, event.ip, HTTP headers, and query parameters from events. Consider using a self-hosted Sentry instance with strict data retention and privacy controls.
Why Fix
Removing or redacting PII from error reports reduces the risk of exposing user identities or sensitive information to a third party, improving compliance with privacy regulations and user trust.
Route To
Frontend Engineer / Privacy Engineer
Page
Tester
Pete · Privacy Networking Analyzer
Technical Evidence
Network: POST https://o4506071217143808.ingest.us.sentry.io/api/4506071220944896/envelope/?sentry_version=7&sentry_key=58ff8fddcbe1303f19bc19fbfed46f0f&sentry_client=sentry.javascript.nextjs%2F10.28.0 - Status: N/A
2
AI endpoint detection log on page load leaks AI readiness
CRIT P9
Conf 9/10 SecurityOther
Prompt to Fix
In the frontend build, remove or guard any console logs that reveal AI endpoint presence. Ensure AI feature detection is not exposed to end users and that no AI endpoints are invoked on page load without explicit user action. If AI features are needed, implement a consent prompt and lazy-load the AI calls behind a feature flag.
Why it's a bug
The console shows a persistent debug-style message '⚠️ AI/LLM ENDPOINT DETECTED', which reveals internal AI integration details to the user or potential attacker. This is an indication of AI-related instrumentation or endpoints being detected on load, raising security/privacy concerns and indicating potential incomplete production hygiene for GenAI features.
Why it might not be a bug
If the message is strictly a development/logging artifact that should be disabled in production builds, it may not be a user-facing bug. However, the screenshot suggests it is present in the UI, which would be a leakage risk in production.
Suggested Fix
Remove the 'AI/LLM ENDPOINT DETECTED' log from production builds or guard it behind a strict DEBUG/LOG level check. Ensure AI-related calls are lazy-loaded behind explicit user consent and use proper feature flags to avoid exposing internal endpoints in the client.
Why Fix
Prevents leakage of internal AI integration details, reduces surface for potential abuse, and aligns with secure-by-default practices for GenAI features.
Route To
Frontend Security Engineer
Page
Tester
Jason · GenAI Code Analyzer
Technical Evidence
Console: ⚠️ AI/LLM ENDPOINT DETECTED
3
Third-Party Telemetry (Sentry) Transmitting Data Without Explicit User Consent
CRIT P9
Conf 9/10 Other
Prompt to Fix
In the frontend Sentry initialization, require explicit user consent before enabling telemetry. Add a beforeSend hook to scrub PII (delete event.user, event.ip, and other sensitive fields), disable sendDefaultPii, enable IP anonymization, and conditionally enable Sentry only if consent is granted. If consent is not granted, do not initialize Sentry or use a privacy-friendly mode. Example prompt for AI assistant: 'Modify nextjs/Sentry config to require user consent, implement beforeSend to remove PII, set sendDefaultPii: false, anonymizeIp: true, and wrap initialization in a consent-check mechanism with a clear opt-in flow.'
Why it's a bug
The network activity shows a client POST to a Sentry ingestion endpoint (o4506071217143808.ingest.us.sentry.io). This indicates third-party data sharing for error/telemetry reporting. Without visible consent indicators or privacy controls in the snippet, there is a risk of OPII exposure (e.g., IP addresses, user/session data) via telemetry payloads. Such data sharing can violate privacy expectations and regulatory requirements if not properly consented and minimized.
Why it might not be a bug
Sentry is a common error-tracking service; if properly configured to scrub PII and anonymize data, and if user consent is covered by the privacy policy, this may not be a privacy violation. The provided log does not reveal payload contents, so the exact exposure cannot be confirmed from the snippet alone.
Suggested Fix
Audit telemetry usage and enforce privacy controls: ensure user consent is obtained before enabling Sentry, enable IP anonymization, and scrub PII from events. In the frontend configuration, disable sending default PII (set sendDefaultPii to false), implement a beforeSend filter to strip user data and IPs, and conditionally enable Sentry only after explicit consent. Consider offering a privacy-friendly mode or opt-out per user segment.
Why Fix
Mitigating third-party data sharing and potential PII exposure reduces regulatory risk, protects user trust, and aligns with privacy-by-design principles. It also helps prevent inadvertent cross-site tracking through telemetry data.
Route To
Security/Privacy Engineer
Page
Tester
Pete · Privacy Networking Analyzer
Technical Evidence
Console: No explicit console logs showing data exposure in the provided snippet.
Network: https://o4506071217143808.ingest.us.sentry.io/api/4506071220944896/envelope/?sentry_version=7&sentry_key=58ff8fddcbe1303f19bc19fbfed46f0f&sentry_client=sentry.javascript.nextjs%2F10.28.0
+22
22 more issues detected  View all →
Sentry DSN public key exposed in URL parameters (sentry_key)...
Excessive number of network requests (175) on pricing page
Missing cache headers on critical assets (CSS/JS/fonts)
and 19 more...
Unlock All 41 Issues
You're viewing the top 3 issues for Pilates Circles By Cult.
Sign up at Testers.AI to access the full report with all 41 detected issues, detailed fixes, and continuous monitoring.
Sign Up at Testers.AI or let us run the tests for you