This script periodically crawls all Apache project and podling websites to check them for a few specific links or text blocks that all projects are expected to have. The checks include verifying that all required links appear on a project homepage, along with an "image" check if project logo files are in apache.org/img
The script also checks for 3rd party resource references that might be in conflict with our privacy policy.
The Content-Security-Policy (Csp) check is a work in progress: it only checks that the default settings have not been over-ridden. It does not check if the host exceptions have been approved.
View the crawler code, website display code, validation checks details, and raw JSON data.
Last crawl time: Fri, 31 Oct 2025 06:10:46 GMT over 219 websites.
| Check Type | Check Results | Check Description | 
|---|---|---|
| Uri | https://iotdb.apache.org | |
| Foundation | Foundation | |
| Events | https://www.apache.org/events/current-event | |
| License | https://www.apache.org/licenses/ | |
| Thanks | https://www.apache.org/foundation/thanks.html | |
| Security | https://www.apache.org/security/ | |
| Sponsorship | https://www.apache.org/foundation/sponsorship.html | |
| Trademarks | Apache IoTDB, IoTDB, Apache, the Apache feather logo, and the Apache IoTDB project logo are either registered trademarks or trademarks of The Apache Software Foundation in all countries | |
| Copyright | Copyright © 2025 The Apache Software Foundation. | |
| Privacy | https://privacy.apache.org/policies/privacy-policy-public.html | |
| Resources | Found 0 external resources: {} | |
| Image | iotdb-1.svg | |
| Csp_check | Invalid: default-src data: blob: 'self' *.apache.org *.githubusercontent.com *.github.com *.algolia.net *.algolianet.com *.apachecon.com *.communityovercode.org 'unsafe-inline' 'unsafe-eval'; frame-src 'self' data: blob:; frame-ancestors 'self'; worker-src 'self' data: blob:; img-src 'self' blob: data: https: *.apache.org www.apachecon.com; style-src 'self' 'unsafe-inline' data:; | Msg: Non-default CSPWebsites must not replace the default Content-Security-Policy |