Softgen
App Quality Report
Powered by Testers.AI
B85%
Quality Score
7
Pages
97
Issues
7.9
Avg Confidence
7.8
Avg Priority
42 Critical38 High17 Medium
Testers.AI
>_ Testers.AI AI Analysis

Softgen was tested and 97 issues were detected across the site. The most critical finding was: Unconsented external AI endpoint calls on page load. Issues span Security, A11y, Performance, Other categories. Persona feedback rated Visual highest (7/10) and Accessibility lowest (6/10).

Qualitative Quality
Softgen
Category Avg
Best in Category
Issue Count by Type
Content
22
UX
10
Security
7
A11y
4
Pages Tested · 7 screenshots
Detected Issues · 97 total
1
Unconsented external AI endpoint calls on page load
CRIT P9
Conf 9/10 Other
Prompt to Fix
Move all LLM/AI calls behind explicit user consent or settings. Implement a consent banner, use a server-side proxy to minimize data exposure, and ensure data minimization. Do not trigger LLM calls on page load without user action.
Why it's a bug
Console shows repeated AI/LLM endpoint activity (AI/LLM ENDPOINT DETECTED) and numerous external requests to softgen.ai. Automatic calls to LLM endpoints on load can expose user data or app state to a third party without explicit user consent.
Why it might not be a bug
If such calls are essential and properly consented/handled, this may be legitimate; however the logs imply lack of explicit consent gating and visibility.
Suggested Fix
Gate LLM/AI calls behind explicit user consent, provide a clear privacy policy, and consider moving calls behind a server-side proxy or implement data minimization. Add retry/backoff and proper error handling instead of unconditional calls.
Why Fix
Enhances user privacy, aligns with data protection expectations, and reduces risk of unintended data exposure.
Route To
Security/Privacy Engineer / Frontend Architect
Page
Tester
Jason · GenAI Code Analyzer
Technical Evidence
Console: [⚠️] AI/LLM ENDPOINT DETECTED
Network: GET https://softgen.ai/ - Status: 200
2
PII in image URL exposing internal user IDs
CRIT P9
Conf 9/10 Other
Prompt to Fix
Remove user IDs from image URLs. Implement an opaque asset identifier or server-side proxy that references assets without exposing /users/ID in the URL. Ensure image endpoints require authentication and do not disclose internal IDs in logs or browser bar.
Why it's a bug
The image URL exposes an internal user identifier (e.g., /users/4.jpg) directly in the request path and in the _next/image URL parameter. This can enable user identification or correlation across requests and layers, constituting unnecessary exposure of user identifiers in URLs.
Why it might not be a bug
Some apps use numeric user IDs in internal paths; if those IDs are not publicly linked to real-world identities and are not exposed beyond authenticated contexts, risk is lower. However, URLs are often cached and logged, increasing exposure risk.
Suggested Fix
Replace direct user IDs in URLs with opaque tokens or asset IDs that do not reveal the user. Serve user-specific assets via server-side mediation that requires authentication and does not leak IDs in the URL. If exposing IDs is required, redact or map to non-identifying tokens before sending in URLs.
Why Fix
Prevents leakage of potentially identifying user IDs in client-facing URLs, reducing risk of correlation and profiling across sessions and services.
Route To
Frontend Engineer
Page
Tester
Pete · Privacy Networking Analyzer
Technical Evidence
Network: GET https://softgen.ai/_next/image?url=%2Fusers%2F4.jpg&w=32&q=75
3
Sentry error telemetry may leak PII; privacy controls not clearly visible
CRIT P9
Conf 9/10 Other
Prompt to Fix
Configure Sentry to scrub PII from all error payloads. Enable IP anonymization, disable or filter default PII collection, and integrate a before_send privacy hook to redact user IDs, emails, and other identifiers. Add a user-consent gate for error reporting where feasible.
Why it's a bug
A POST request is sent to Sentry's ingest endpoint (third-party error tracking). Error payloads can include stack traces, environment data, and potentially user identifiers or IP addresses. Without explicit privacy safeguards or user opt-in, this risks exposing personal data to a third party.
Why it might not be a bug
Sentry usage is common for error monitoring; if the implementation redacts PII, obfuscates IPs, and user data is not included, this would be acceptable. The provided data does not reveal the payload, so assume privacy controls may be absent or insufficient.
Suggested Fix
Enable PII redaction in Sentry payloads, anonymize IP addresses, and disable default collection of user-identifying data. Add a clear privacy notice and/or user consent for error telemetry. Consider using a privacy-friendly alternative or self-hosted error collection. Implement a before_send hook to scrub sensitive fields.
Why Fix
Protects user privacy by preventing leakage of personal data through error reporting and aligns with data minimization principles and regulations.
Route To
Security/Privacy Engineer
Page
Tester
Pete · Privacy Networking Analyzer
Technical Evidence
Network: POST https://o4509211776778241.ingest.us.sentry.io/api/4509367348428800/envelope/?sentry_version=7&sentry_key=9cc26e7791393f165a62919869e2efa9&sentry_client=sentry.javascript.nextjs%2F9.47.1
+35
35 more issues detected  View all →
Credentials exposed in Sentry ingestion URL via query parame...
Unconsented third-party analytics/tracking (PostHog) loaded ...
Exposure of internal user identifiers in image URLs via Next...
and 32 more...
Unlock All 97 Issues
You're viewing the top 3 issues for Softgen.
Sign up at Testers.AI to access the full report with all 97 detected issues, detailed fixes, and continuous monitoring.
Sign Up at Testers.AI or let us run the tests for you