How does a tool know your site runs on Next.js, uses Cloudflare, and has Google Analytics installed — just from a URL? This article explains the detection techniques used by SiteReveal and what they reveal about your stack.

When you visit a website, the server does not send a header saying "This site is built with Next.js 14, hosted on Vercel, and uses Stripe for payments." That information is deliberately obscured — partly for security, partly because it is simply not part of the HTTP specification.
Yet technology detection tools can identify dozens of technologies on a page with high confidence. How?
The answer is signal triangulation — combining multiple weak signals into a high-confidence detection. SiteReveal's scanner uses a headless Chromium browser to load the target URL and then inspects six categories of signals simultaneously.
The server's response headers are the first place to look. Certain headers are technology-specific:
X-Powered-By: Express — reveals the Node.js frameworkServer: nginx/1.24.0 — reveals the web server and versionX-Shopify-Stage: production — reveals the e-commerce platformCF-Ray: abc123 — reveals Cloudflare CDN presenceHeaders are easy to spoof or suppress, so they are treated as supporting evidence rather than definitive proof.
The URLs of JavaScript and CSS files loaded by the page are highly revealing:
/_next/static/chunks/ — Next.js/wp-content/themes/ — WordPress/assets/application-abc123.js — Rails asset pipelinehttps://cdn.shopify.com/s/files/ — Shopify CDN_These URL patterns are difficult to change without breaking the application, making them reliable signals.
Modern JavaScript frameworks and analytics tools write identifiable variables to the browser's window object. SiteReveal's scanner evaluates these in the page context:
window.next — Next.jswindow.Shopify — Shopifywindow.ga or window.gtag — Google Analyticswindow.Stripe — Stripe.jswindow.__NUXT__ — Nuxt.jsThese variables are almost impossible to suppress without breaking the application's functionality, making them among the most reliable signals.
The HTML source contains technology fingerprints in meta tags and comments:
<!-- WordPress -->
<meta name="generator" content="WordPress 6.4.2">
<!-- Drupal -->
<meta name="Generator" content="Drupal 10">
<!-- Gatsby -->
<!-- This site is built with Gatsby -->
<!-- WordPress -->
<meta name="generator" content="WordPress 6.4.2">
<!-- Drupal -->
<meta name="Generator" content="Drupal 10">
<!-- Gatsby -->
<!-- This site is built with Gatsby -->
The generator meta tag is particularly useful for CMS detection, though security-conscious sites often remove it.
Session cookies often follow technology-specific naming conventions:
PHPSESSID — PHP sessionJSESSIONID — Java/Tomcat session_shopify_s — Shopify sessionwp-settings-* — WordPress user settings_ga — Google Analytics*Cookie names are set by the application and are difficult to change without breaking session management.
The rendered HTML structure reveals framework-specific patterns:
<div id="__next"> — Next.js root<div id="app"> — Vue.js or React app rootclass="wp-block-*" — WordPress Gutenberg blocksdata-reactroot — React (older versions)__*Each detected technology receives a confidence score from 0 to 1, based on how many independent signals corroborate the detection:
| Signals Present | Confidence |
|---|---|
| 1 signal (e.g., header only) | 0.3–0.5 |
| 2 signals (e.g., header + script URL) | 0.6–0.75 |
| 3+ signals (e.g., header + script + window variable) | 0.85–1.0 |
SiteReveal only reports technologies with a confidence score above 0.4. Technologies detected with a single weak signal are flagged as "possible" rather than "confirmed".
The Tech Modernity dimension of the WIS (weighted at 20%) uses technology detection to assess:
A site running WordPress 4.x on PHP 7.4 will score significantly lower on Tech Modernity than a site running Next.js 14 on Node.js 20 — even if both sites look identical to visitors.
Technology detection is entirely passive — the scanner makes a standard HTTP request, exactly as a browser would. No credentials are required, no authentication is bypassed, and no data is written to the target server. Everything detected is information that is publicly available to any visitor.
This is why technology detection is a legitimate part of security auditing: if a scanner can detect that your site is running an outdated version of a framework with known vulnerabilities, so can an attacker. Knowing what you are exposing is the first step to securing it.
Run a free technology scan on your site to see exactly what SiteReveal detects — and what that reveals about your security posture.
Get a free Website Intelligence Score™ covering security, performance, SEO, and technology stack.
Everything you need to know about migrating your website from HTTP to HTTPS without losing traffic, rankings, or functionality — including SSL certificate setup, redirect configuration, and post-migration verification.
A step-by-step guide to auditing your website's technical SEO — covering crawlability, indexability, structured data, Core Web Vitals, and how to use website intelligence tools to automate the process.
A comprehensive technical guide to making your website faster in 2025 — covering CDNs, image optimisation, Core Web Vitals, caching strategies, and how speed affects your WIS performance score.
The SiteReveal team builds tools that help developers, marketers, and founders understand what's really happening under the hood of any website — from security posture to performance bottlenecks and technology stack fingerprinting.