HTTP websites are not supported by Front-End Scanning
Aikido Front-End Scanning is designed to evaluate real world web security conditions. For that reason, scanning websites served over plain HTTP is intentionally not supported.
Modern web security assumes HTTPS
Most front end security controls only make sense when HTTPS is in place. This includes:
Secure cookies and SameSite attributes
HSTS enforcement
TLS certificate validation
Protection against man in the middle attacks
Browser enforced security guarantees
Without HTTPS, these controls either cannot be applied or are irrelevant. Scanning an HTTP website would produce results that are misleading at best and meaningless at worst.
Browsers already treat HTTP as unsafe
Modern browsers actively warn users when visiting HTTP websites and block or restrict many security sensitive behaviors. Testing advanced front end security on top of an insecure transport layer is comparable to testing seatbelts in a car without brakes. The foundation is missing.
Front end scanners are built around TLS guarantees
Aikido Front-End Scanning validates correct usage of HTTPS related mechanisms. When a site does not use HTTPS, the scanner cannot reliably:
Assess cookie security settings
Validate transport level protections
Detect misconfigurations related to certificates or encryption
Supporting HTTP would require ignoring large parts of what the scanner is meant to verify, which goes against its purpose.
This is not a limitation of testing, but of usefulness
HTTP applications can still be tested using other approaches such as AI pentesting or controlled environments. However, a front end scanner that focuses on real browser behavior and modern security standards must assume HTTPS.
If HTTPS is required for testing, you can:
Connect a domain with TLS enabled
Use a reverse proxy or broker that terminates TLS
Test a staging or production like environment
Focus on real security outcomes
Aikido prioritizes accurate, actionable security findings over check the box scans. Enforcing HTTPS ensures that results reflect how applications are actually used and attacked in production today.
Scanning HTTP websites would not improve security posture and would only create noise. This is why it is intentionally not supported.
Last updated
Was this helpful?