Grading Methodology
Every site is scored across 10 categories for a maximum of 110 base points. Our rubric is grounded in NIST Special Publication 800-63B — the U.S. government's definitive guidance on digital identity authentication.
Grade Scale
Formula: (total_score / 110) × 100 = percentage → letter grade
The 10 Categories
Password Length Policy
25 ptsMaximum password length is the single clearest signal of whether a company understands password security. Short maximums force weak passwords and break password managers.
NIST Reference: NIST 800-63B: "Verifiers SHOULD permit subscriber-chosen memorized secrets at least 64 characters in length."
Character & Composition Rules
15 ptsForced composition rules (must include uppercase, number, symbol) create predictable passwords while appearing secure. Restricting character sets reduces entropy.
NIST Reference: NIST 800-63B: "Verifiers SHOULD NOT impose other composition rules (e.g., requiring mixtures of different character types)."
Multi-Factor Authentication
20 ptsMFA is the most effective protection against credential theft. TOTP and hardware keys are significantly more secure than SMS-only options.
NIST Reference: NIST 800-63B recommends MFA for any system at AAL2 or above. Hardware-bound authenticators provide the strongest assurance.
Anti-Pattern Penalties
15 ptsThis category starts at full points and deducts for dangerous behaviors. A site with no anti-patterns keeps all 15 points.
NIST Reference: NIST 800-63B explicitly deprecates forced rotation, knowledge-based authentication, and composition rules. These practices actively harm security.
Password Manager Compatibility
10 ptsSites that break password managers force users toward weaker passwords. Paste blocking, broken autocomplete, and non-standard form fields are hostile to security.
NIST Reference: NIST 800-63B: "Verifiers SHOULD permit the use of ‘paste’ functionality." Password managers are the most effective tool for credential hygiene.
Breach Response & Credential Hygiene
10 ptsCompanies should check new passwords against known breach lists, notify users of compromises, and act on breach intelligence.
NIST Reference: NIST 800-63B: "Verifiers SHALL compare the prospective secrets against a list that contains values known to be commonly-used, expected, or compromised."
Transparency & Communication
5 ptsUsers deserve to know the rules before they create a password, not after they fail validation. Undocumented or contradictory requirements waste time and erode trust.
Username & Account Identity Policies
5 ptsEmail-based login with alias support is the most flexible and secure approach. Rejecting valid TLDs or treating email addresses as case-sensitive causes unnecessary friction.
Default & Initial Password Practices
5 ptsHow a service handles initial credentials matters. Self-registration is ideal. Shared or formulaic default passwords (e.g., "Welcome123!") are a common breach vector.
Email Privacy & Disposable Domains
penalty onlyBlocking privacy-focused email services (SimpleLogin, AnonAddy, Proton Mail aliases) penalizes security-conscious users. This is a penalty-only category.
Evidence Requirements
All submissions must include:
- →Screenshots with URL bar visible
- →Date tested
- →Tester notes explaining observations
- →Grades are valid for 6 months, then marked "needs re-verification"
Ready to grade a site?
Walk through our guided rubric and submit evidence-backed grades.