The official Shoptet logo.

What is Shoptet

Shoptet is an e-commerce platform used by more than 40,000 active online stores across the Czech Republic, Slovakia, and Hungary. It provides everything merchants need to launch, manage, and grow their online businesses, with a strong focus on ease of use and features tailored to local market needs.

Founded in 2009, Shoptet has grown into a team of over 300 people. The platform includes built-in tools for store management, marketing, and customer support, along with integrated services like Shoptet Pay for payments. For businesses with more complex requirements, Shoptet Premium offers customization options and access to an open API.

Shoptet’s mission is to make online entrepreneurship accessible and scalable. Learn more at www.shoptet.cz or follow us on LinkedIn.

PCI DSS Compliance

Achieving compliance with the latest PCI DSS v4.0 standard is required of all sites by March 31st 2025. The new standard incorporates several new requirements, many of which Report URI can assist with.

Requirement 6.4.3 requires that "a method is implemented to confirm that each script is authorized" on Payment Pages, and Content Security Policy is both the obvious, and suggested, solution. We can also assist further with requirement 6.4.3 to ensure that "an inventory of all scripts is maintained" with our Script Watch product.

Further to this, requirement 11.6.1 states that a "change and tamper-detection mechanism is deployed" that is able to "alert personnel to unauthorized modification (including indicators of compromise, changes, additions, and deletions) to ... the contents of payment pages as received by the consumer browser". Again, our Script Watch product can provide change and tamper-detection with its ongoing monitoring of dependencies, and, our Threat Intelligence product will monitor for Indicators of Compromise, helping you comply with significant portions of requirement 11.6.1 easily.

We have a selection of features and tools that will help you get started with meeting these new PCI DSS v4.0 requirements, but please reach out to pci@report-uri.com if you need more information or visit our PCI DSS Compliance solutions page.

I've been a personal user of Report URI for over ten years and recently rolled it out across the organization to process DMARC reports and meet our PCI DSS requirements. When considering building an in-house solution, it quickly became clear we'd essentially be reinventing the wheel – while spending more time, money, and effort, but still lacking the deep reporting expertise that the Report URI team bring. With Report URI's continuous innovation and rock-solid reliability, choosing their platform was a no-brainer!

- Michal Špaček, Head of Security, Shoptet

How we can help

Getting started with Report URI is easy, and we can quickly audit all of your existing JavaScript Dependencies and Data Exfiltration endpoints to see if they are all expected. Once a baseline is established, our Script Watch and Data Watch products will monitor and alert you to any changes for you to investigate quickly.

If you need any assistance when starting your PCI DSS Compliance journey, please reach out to pci@report-uri.com and we'll be happy to help.

Script Watch

Script Watch will monitor all JavaScript dependencies across your entire site and immediately notify you of any changes. A new JavaScript dependency could be the start of a Magecart attack.

Because Script Watch leverages the browser native Content Security Policy, there is no code or agent to deploy and running in the browser means we analyse your site in real-time as your users are browsing. We don't have the same limitations as external scanning services such as authentication or pay walls, geo-sensitive content or an attacker potentially serving safe content to the crawler.

Read More

Data Watch

Data Watch will monitor all of the locations that your webpages are sending data to. If your website starts sending data to a new location, it could be the start of a Magecart attack.

With Script Watch and Data Watch combined, you can monitor for clear indicators that your site has been compromised. Attackers will always want to inject their hostile JavaScript, and they'll always want to exfiltrate their stolen data.

Read More

The CSP Wizard

We often find that creating a CSP is the first difficult step that organisations face. Having a complete list of all resource dependencies across your entire site like images, scripts or styles, from both 1st-party and 3rd-party locations, is tough to achieve.

The CSP Wizard was created to solve this problem, and in seven days or less, it can you give a complete list of all resources used across your entire site.

With the list of all resources you use on your site, and our easy to use tool, creating a viable Content Security Policy is easier than ever with just a few clicks.

Documentation

The CSP Builder

All Content Security Policies will need to be tweaked at some point. New resources may be added to the site or old resources removed, and the policy needs to be updated to reflect those changes and kept up to date.

You can import your existing policy into the CSP Builder and use our fully featured tool to make any changes that you require right there in the UI. When you're done, hit Generate, and the CSP Builder will provide you with your new, updated policy.

CSP Builder

Content Security Policy

Script Watch and Data Watch will allow you to rapidly detect and respond to a Magecart attack and combined, that capability puts you ahead of the field. If you want to take it a step further, Content Security Policy can mitigate a Magecart attack and stop it from even happening.

Deploying an effective Content Security Policy can be difficult, but our CSP Reporting allows you to gather feedback and safely test a policy before deployment. Once deployed, an effective Content Security Policy will block a Magecart attack and stop the hostile JavaScript from even running.

Read More

Threat Intelligence

We subscribe to various feeds of Threat Intelligence data, along with managing our own internally generated feeds, to keep apprised of the latest threats that exist online.

Using this Threat Intelligence Data, we can better analyse the sources of JavaScript on your website and detect malicious activity sooner.

Read More