Gap
App Quality Report
Powered by Testers.AI
B-80%
Quality Score
6
Pages
171
Issues
7.4
Avg Confidence
7.6
Avg Priority
38 Critical103 High28 Medium2 Low
Testers.AI
>_ Testers.AI AI Analysis

Gap scored B- (80%) with 171 issues across 7 tested pages, ranking #14 of 14 US retail sites. That's 66 more than the 105.1 category average (0th percentile).

Top issues to fix immediately: "Widespread DNS Resolution Failures (ERR_NAME_NOT_RESOLVED)" β€” Audit all third-party service URLs in the application configuration; "Widespread DNS Resolution Failures (ERR_NAME_NOT_RESOLVED)" β€” Audit all external domain references in the application (analytics, tracking pixels, third-party APIs); "Massive number of render-blocking JavaScript chunks loading sequential" β€” 1) Implement proper code-splitting with dynamic imports only for below-fold content.

Weakest area β€” accessibility (5/10): Multiple overlapping dialogs without clear focus management create accessibility barriers.

Quick wins: Consolidate or eliminate one of the two modal dialogs (privacy banner vs. signup popup) to reduce cognitive load and.... Implement proper focus trapping and keyboard navigation for modal interactions to support screen reader users.

Qualitative Quality
Gap
Category Avg
Best in Category
Issue Count by Type
A11y
40
Content
25
Security
9
UX
7
Visual
2
Pages Tested Β· 6 screenshots
Detected Issues Β· 171 total
1
Tracking Cookie Values Logged to Console
CRIT P9
Conf 8/10 Other
Prompt to Fix
Remove all console.log() and console.debug() statements that output the utag_main tracking cookie value or any user tracking identifiers. Search the codebase for 'console.log' statements that reference 'cookie', 'utag_main', or tracking-related variables. Replace these with server-side logging or implement a development-only logging gate using environment variables (e.g., if (process.env.NODE_ENV === 'development')). Ensure no tracking identifiers, cookies, or user profiling data are logged to the browser console in production builds.
Why it's a bug
The console logs explicitly expose tracking cookie values (utag_main=019cf9f3a9580019f1d22f08621d0506f001406700590) multiple times. These are persistent tracking identifiers that can be used to profile users across sessions and websites. Logging tracking identifiers to the browser console creates a security risk where this sensitive data could be exposed through browser history, logs, or developer tools access. This violates privacy best practices and potentially GDPR/CCPA regulations by not adequately protecting user tracking data.
Why it might not be a bug
The cookie may be a legitimately required tracking ID for analytics purposes, and logging it might be intentional for debugging. However, even if required for functionality, PII and tracking identifiers should never be logged to console in production environments.
Suggested Fix
Remove all console.log statements that output cookie values, tracking identifiers, or any user tracking data. Implement conditional logging that only outputs tracking data in development mode with explicit feature flags. Use server-side logging instead of client-side console logging for sensitive tracking data.
Why Fix
Protecting tracking identifiers from console exposure prevents unauthorized access to user profiling data, maintains compliance with data protection regulations, and protects user privacy by ensuring tracking data is not unnecessarily exposed in client-side logs.
Route To
Privacy Engineer / Security Engineer
Page
Tester
Pete Β· Privacy Console Log Analyzer
Technical Evidence
Console: [LOG] Updated cookie: utag_main=019cf9f3a9580019f1d22f08621d0506f001406700590
Network: Tealium tracking service (utag_main cookie)
2
Tracking Cookie Exposed in Console Logs
CRIT P9
Conf 8/10 OtherSecurity
Prompt to Fix
A security vulnerability has been identified where session tracking cookies (utag_main) are being logged to the browser console with their full values. This exposes sensitive session material and violates security logging standards. Audit your codebase for all console.log(), console.info(), or console.debug() statements that output cookie values or any Set-Cookie headers. Remove these logging statements immediately. For debugging purposes, implement server-side secure logging instead of client-side console output. Add code review checks to prevent future cookie logging to console.
Why it's a bug
Session/tracking cookies (utag_main) are being logged to console multiple times with their full values. These cookies can be used to track user sessions, and exposure in console logs means they could be captured by malicious scripts, browser extensions, or developers with console access. This violates privacy principles and security best practices for sensitive session material.
Why it might not be a bug
Cookies are technically accessible via document.cookie regardless, but intentional logging to console creates an additional attack surface and auditable evidence trail of exposure.
Suggested Fix
Remove all console.log() statements that output cookie values. If debugging is needed, use secure server-side logging instead. Implement Content Security Policy to prevent unauthorized script execution that could access console logs.
Why Fix
Preventing cookie exposure in console logs reduces the attack surface for session hijacking and protects user privacy. It also ensures compliance with security logging standards that prohibit sensitive data in client-side output.
Route To
Security Engineer / Full Stack Engineer
Page
Tester
Sharon Β· Security Console Log Analyzer
Technical Evidence
Network: Cookie transmission in Set-Cookie headers
3
Tracking Cookie IDs Logged to Console
CRIT P9
Conf 8/10 Other
Prompt to Fix
Remove all console.log, console.warn, and console.error statements that output cookie values, tracking identifiers, or other PII. Specifically, prevent logging of 'utag_main' cookie values and similar tracking identifiers. Create a sanitized logging utility that masks sensitive data before any console output. Implement an environment-based flag to completely disable console logging of cookies in production environments. Add a pre-commit hook to catch any future attempts to log tracking identifiers to console.
Why it's a bug
User tracking identifiers (utag_main cookie values) are being logged to console multiple times. These unique identifiers (019cf9f3a9580019f1d22f08621d0506f001406700590) can be used for cross-site tracking, user profiling, and behavioral analysis. Exposing these in console logs creates a security and privacy risk, as they could be captured by third-party scripts, browser extensions, or developers with console access. This violates privacy best practices and potentially GDPR/CCPA regulations.
Why it might not be a bug
The logs may be intentional for debugging purposes during development, though they should not appear in production environments.
Suggested Fix
Remove console.log statements that output cookie values. Implement a development-only logging flag that disables sensitive data logging in production. Use environment variables to control verbose logging output. Sanitize any logging that must occur by masking or hashing tracking identifiers.
Why Fix
Prevents exposure of tracking identifiers that could enable unauthorized user profiling, cross-site tracking, and violates user privacy expectations. Compliance with GDPR, CCPA, and other privacy regulations requires preventing unnecessary exposure of tracking data.
Route To
Privacy Engineer / Data Protection Officer / Frontend Lead
Page
Tester
Pete Β· Privacy Console Log Analyzer
Technical Evidence
Console: [LOG] Updated cookie: utag_main=019cf9f3a9580019f1d22f08621d0506f001406700590 (appears 3 times)
Network: Analytics and tracking endpoints attempting to load but failing with net::ERR_NAME_NOT_RESOLVED
+168
168 more issues detected  View all →
Sensitive Tracking Cookie Exposed in Console Logs
Tracking Cookie ID Exposed in Console Logs
Sensitive Cookie Data Logged to Console
and 165 more...
Unlock All 171 Issues
You're viewing the top 3 issues for Gap.
Sign up at Testers.AI to access the full report with all 171 detected issues, detailed fixes, and continuous monitoring.
Sign Up at Testers.AI or let us run the tests for you