Apache Project Website Checks

Checking Project Websites for required and disallowed content

This script periodically crawls all Apache project and podling websites to check them for a few specific links or text blocks that all projects are expected to have. The checks include verifying that all required links appear on a project homepage, along with an "image" check if project logo files are in apache.org/img

The script also checks for 3rd party resource references that might be in conflict with our privacy policy.

The Content-Security-Policy (Csp) check is a work in progress: it only checks that the default settings have not been over-ridden. It does not check if the host exceptions have been approved.

View the crawler code, website display code, validation checks details, and raw JSON data.
Last crawl time: Fri, 12 Dec 2025 10:11:44 GMT over 221 websites.

Site Check For Project - Pulsar

Results for Project Pulsar .
Check Results column is the actual text or URL found on the homepage for this check (when applicable).
Check Type Check Results Check Description
Uri https://pulsar.apache.org/
Foundation Foundation
Events https://www.apache.org/events/current-event.html
License https://www.apache.org/licenses/
Thanks https://www.apache.org/foundation/thanks
Security https://pulsar.apache.org/security/
Sponsorship https://www.apache.org/foundation/sponsorship
Trademarks All Rights Reserved. Apache, Pulsar, Apache Pulsar, and the Apache feather logo are trademarks or registered trademarks of The Apache Software Foundation.
Copyright Copyright © 2025 The Apache Software Foundation.
Privacy https://www.apache.org/foundation/policies/privacy.html
Resources Found 5 external resources: {"ERROR Failed to load resource: the server responded with a status of 404 ()"=>1, "ERROR Refused to load the script 'https://analytics.apache.org/matomo.js' because it violates the following Content Security Policy directive: \"script-src 'self' widget.kapa.ai www.google.com https://hcaptcha.com https://*.hcaptcha.com https://www.gstatic.com 'unsafe-inline' 'unsafe-eval'\". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback."=>1, ""=>1, "widget.kapa.ai"=>1, "ERROR Failed to load resource: net::ERR_FAILED"=>1} Text of a link expected to match regular expression: Found \d+ external resources
Websites must not link to externally hosted resources
Image pulsar.svg
Csp_check Invalid: script-src 'self' widget.kapa.ai www.google.com https://hcaptcha.com https://*.hcaptcha.com https://www.gstatic.com 'unsafe-inline' 'unsafe-eval'; connect-src 'self' proxy.kapa.ai kapa-widget-proxy-la7dkmplpq-uc.a.run.app metrics.kapa.ai https://hcaptcha.com https://*.hcaptcha.com www.google.com; frame-src 'self' www.google.com https://hcaptcha.com https://*.hcaptcha.com; style-src 'self' 'unsafe-inline' https://hcaptcha.com https://*.hcaptcha.com; Text of a link expected to match regular expression: ^OK
Websites must not replace the default Content-Security-Policy