Samsung
App Quality Report
Powered by Testers.AI
C+79%
Quality Score
7
Pages
132
Issues
8.1
Avg Confidence
8.1
Avg Priority
69 Critical48 High15 Medium
Testers.AI
>_ Testers.AI AI Analysis

Samsung was tested and 132 issues were detected across the site. The most critical finding was: API key exposed in URL query parameter to external service (ipfind). Issues span Security, A11y, Performance, Other categories. Persona feedback rated Content highest (7/10) and Accessibility lowest (4/10).

Qualitative Quality
Samsung
Category Avg
Best in Category
Issue Count by Type
Content
33
Security
24
A11y
18
UX
16
Pages Tested · 7 screenshots
Detected Issues · 132 total
1
API key exposed in URL query parameter to external service (ipfind)
CRIT P9
Conf 9/10 SecurityOther
Prompt to Fix
Implement a server-side proxy for IP information lookups. Create an API endpoint on our domain (e.g., /api/ipinfo) that reads IPFIND_API_KEY from environment variables and calls https://api.ipfind.com/me from the server side with the API key supplied in a secure header (e.g., Authorization: Bearer <IPFIND_API_KEY>) or X-Api-Key: <IPFIND_API_KEY>. Remove client-side usage of the external URL and the 'auth' query parameter. Ensure CORS allows only trusted origins, implement rate limiting, and document the new endpoint. Rotate the API key regularly and monitor for leaks.
Why it's a bug
The network activity includes a request to an external service with an API key passed in the URL query parameter: GET https://api.ipfind.com/me?auth=7fe9ffcc-b476-4e4f-a363-d3a659a31f44. Exposing credentials or tokens in URL query strings is insecure because they can leak through browser history, server logs, referer headers, and analytics tooling, enabling unauthorized access or misuse. This pattern indicates potential credential leakage across multiple requests and through third-party services.
Why it might not be a bug
If the 'auth' parameter is an ephemeral or publicly documented public key with strict IP/domain restrictions, the risk is reduced; however, exposing even scoped keys in URLs is contrary to best practices and can still be logged or leaked in various ways. Treat as a high-priority security concern.
Suggested Fix
Move to a server-side proxy call. Do not expose API keys in client-side URLs. Implement a backend endpoint (for example, /api/ipinfo) that reads the IPFIND_API_KEY from a secure environment variable and calls https://api.ipfind.com/me from the server, using a header-based authentication (e.g., Authorization: Bearer <key> or X-Api-Key: <key>). Return only the necessary data to the client. Eliminate the auth parameter from client-side requests. Implement TLS, proper CORS, and rate-limiting on the proxy.
Why Fix
Preventing API keys from being exposed in URLs mitigates risk of credential leakage, session hijacking, and abuse of the external service. A server-side proxy centralizes key management, enables key rotation, and reduces exposure in logs and analytics.
Route To
Security Engineer / Backend API Engineer
Page
Tester
Sharon · Security Networking Analyzer
Technical Evidence
Console: Network log shows API key in URL query parameter 'auth' for ipfind.com/me.
Network: GET https://api.ipfind.com/me?auth=7fe9ffcc-b476-4e4f-a363-d3a659a31f44 - Status: N/A
2
Pre-consent third-party tracking loaded via Sprinklr before explicit user consent
CRIT P9
Conf 9/10 Other
Prompt to Fix
In the frontend, modify the initialization flow to ensure Sprinklr tracking/live-chat scripts are blocked until explicit consent is granted. Integrate with TrustArc to gate all requests to Sprinklr endpoints (api2.sprinklr.com, prod-samsung-live-chat.sprinklr.com) behind the consent decision for category ID 4 (marketing/tracking). Remove or defer any pre-consent data-sharing calls and ensure console logs do not reveal consent state or pre-consent identifiers. Update CSP to reflect strict gating and ensure no third-party resources load pre-consent.
Why it's a bug
Console logs indicate a TrustArc opt-out consent model with no explicit consent decision found, yet third-party integrations (including Sprinklr) are initialized and used. This suggests potential data collection or transmission to Sprinklr before explicit user consent, risking privacy violations and regulatory non-compliance.
Why it might not be a bug
If the system is designed to use an opt-out model with implied consent, pre-consent activity could be intentional. However, reliance on implied consent increases privacy risk and is generally not acceptable without explicit user opt-in for tracking.
Suggested Fix
Gate Sprinklr-related tracking and live-chat scripts behind an explicit consent decision. Delay initialization and data transmission to Sprinklr endpoints (e.g., api2.sprinklr.com, prod-samsung-live-chat.sprinklr.com) until the user has granted the appropriate marketing/tracking consent. Ensure TrustArc flow blocks pre-consent data sharing and tighten CSP so third-party resources do not load before consent is captured.
Why Fix
Prevent unauthorized or unconsented data collection and sharing with third-party trackers, reducing privacy risk and helping meet regulatory requirements (e.g., GDPR/CCPA) and user trust expectations.
Route To
Privacy Engineer / Frontend Security Engineer
Page
Tester
Pete · Privacy Console Log Analyzer
Technical Evidence
Console: [LOG] [e] Getting consent for category ID: 4 with notice behavior: opt-out [LOG] [e] Using TrustArc consent model. Checking consent model: opt-out [LOG] [e] Is implied location: true [LOG] [e] Checking consent status for ID: 4, isImpliedLocation: true and prefCookie: JSHandle@object [LOG] [e] No consent decision found, using implied location: true
Network: https://api2.sprinklr.com/api/v2/deflect https://prod-samsung-live-chat.sprinklr.com
3
Invalid CSP sources for Sprinklr domains (https:*.sprinklr.com)
CRIT P9
Conf 9/10 SecurityOther
Prompt to Fix
Update the server-side CSP header values to valid syntax. Replace every occurrence of 'https:*.sprinklr.com' with 'https://*.sprinklr.com' (and similarly for other directives). Re-deploy and verify with a CSP validator and in-browser checks.
Why it's a bug
The Content Security Policy includes invalid sources like 'https:*.sprinklr.com', which browsers will ignore. This misconfiguration can lead to improper resource loading behavior and weak security posture, and it indicates a broken generation/insertion of security headers.
Why it might not be a bug
If Sprinklr resources are not essential, the incorrect directive might not impact functionality, but it still represents a misconfig and could cause inconsistencies across environments.
Suggested Fix
Correct the CSP values to valid syntax, e.g., replace 'https:*.sprinklr.com' with 'https://*.sprinklr.com' (and ensure the scheme and wildcard are properly formatted). Validate using a CSP validator and test across assets (scripts, styles, fonts, images).
Why Fix
Restores correct policy enforcement, prevents resource loading issues, and improves security posture and consistency across environments.
Route To
Security/Web Platform Engineer
Page
Tester
Jason · GenAI Code Analyzer
Technical Evidence
Console: [ERROR] The source list for the Content Security Policy directive 'default-src' contains an invalid source: 'https:*.sprinklr.com'. It will be ignored.
+45
45 more issues detected  View all →
AI/LLM endpoint calls detected on page load without clear us...
Cross-site third-party analytics and live chat tracking dete...
CSP misconfiguration: invalid Sprinklr source
and 42 more...
Unlock All 132 Issues
You're viewing the top 3 issues for Samsung.
Sign up at Testers.AI to access the full report with all 132 detected issues, detailed fixes, and continuous monitoring.
Sign Up at Testers.AI or let us run the tests for you