This script periodically crawls all Apache project and podling websites to check them for a few specific links or text blocks that all projects are expected to have. The checks include verifying that all required links appear on a project homepage, along with an "image" check if project logo files are in apache.org/img
The script also checks for 3rd party resource references that might be in conflict with our privacy policy.
The Content-Security-Policy (Csp) check is a work in progress: it only checks that the default settings have not been over-ridden. It does not check if the host exceptions have been approved.
View the crawler code, website display code, validation checks details, and raw JSON data.
Last crawl time: Sat, 01 Nov 2025 16:11:02 GMT over 219 websites.
| Check Type | Check Results | Check Description |
|---|---|---|
| Uri | https://xerces.apache.org/ | |
| Foundation | Apache Software Foundation | |
| Events | http://www.apache.org/events/current-event.html | |
| License | http://www.apache.org/licenses/ | |
| Thanks | http://www.apache.org/foundation/thanks.html | |
| Security | http://www.apache.org/security/ | |
| Sponsorship | http://www.apache.org/foundation/sponsorship.html | |
| Trademarks | Apache Xerces, Xerces, Apache, the Apache feather logo, and the Apache Xerces logo are trademarks of The Apache Software Foundation. | |
| Copyright | Copyright © 1999-2022 The Apache Software Foundation. | |
| Privacy |
URL expected to match regular expression:
\Ahttps://privacy\.apache\.org/policies/privacy-policy-public\.html\z
|
\Ahttps?://(?:www\.)?apache\.org/foundation/policies/privacy\.html\z
All websites must link to the Privacy Policy. |
|
| Resources | Found 12 external resources: {"WARN Mixed Content: The page at 'https://xerces.apache.org/' was loaded over HTTPS, but requested an insecure element 'http://www.apache.org/events/current-event-125x125.png'. This request was automatically upgraded to HTTPS, For more information see https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html"=>2, "WARN Mixed Content: The page at 'https://xerces.apache.org/' was loaded over HTTPS, but requested an insecure element 'http://www.apache.org/images/10yearsASF_170x101.jpg'. This request was automatically upgraded to HTTPS, For more information see https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html"=>2, "WARN Mixed Content: The page at 'https://xerces.apache.org/' was loaded over a secure connection, but contains a form that targets an insecure endpoint 'http://www.google.com/search'. This endpoint should be made available over a secure connection."=>1, "ERROR Refused to load the script 'http://www.ohloh.net/p/3465/widgets/project_users_logo.js' because it violates the following Content Security Policy directive: \"script-src 'self' data: blob: 'unsafe-inline' 'unsafe-eval' https://www.apachecon.com/ https://www.communityovercode.org/ https://*.apache.org/ https://apache.org/ https://*.scarf.sh/\". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback."=>1, ""=>3, "ERROR Refused to load the script 'http://www.ohloh.net/p/3466/widgets/project_users_logo.js' because it violates the following Content Security Policy directive: \"script-src 'self' data: blob: 'unsafe-inline' 'unsafe-eval' https://www.apachecon.com/ https://www.communityovercode.org/ https://*.apache.org/ https://apache.org/ https://*.scarf.sh/\". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback."=>1, "ERROR Refused to load the script 'http://www.ohloh.net/p/12649/widgets/project_users_logo.js' because it violates the following Content Security Policy directive: \"script-src 'self' data: blob: 'unsafe-inline' 'unsafe-eval' https://www.apachecon.com/ https://www.communityovercode.org/ https://*.apache.org/ https://apache.org/ https://*.scarf.sh/\". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback."=>1, "ERROR Refused to load the script 'http://www.ohloh.net/p/5471/widgets/project_users_logo.js' because it violates the following Content Security Policy directive: \"script-src 'self' data: blob: 'unsafe-inline' 'unsafe-eval' https://www.apachecon.com/ https://www.communityovercode.org/ https://*.apache.org/ https://apache.org/ https://*.scarf.sh/\". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback."=>1} |
Text of a link expected to match regular expression:
Found \d+ external resources
Websites must not link to externally hosted resources |
| Image | xerces.svg | |
| Csp_check | OK |