Automated triage vs manual review. A 200-line Apache config or a 400-line nginx.conf is a great candidate for automated linting: most hardening errors are pattern matching (a missing directive, a clearly wrong value like ssl_protocols TLSv1). The linter catches 70-80% of typical cyber audit findings in seconds, leaving complex cases to manual review (Apache <Location> redundancies, nginx add_header overrides, multi-VirtualHost interactions).
What this linter actually checks. 25 specific checks across 5 families: SSL/TLS (enabled protocols, ciphers, HSTS, OCSP stapling), information disclosure (server tokens, server signature, X-Powered-By, autoindex), access control (location root, exposed admin pages, exposed status), security headers (X-Frame-Options, X-Content-Type-Options, CSP, Permissions-Policy emitted via add_header/Header), availability (rate limiting with limit_req nginx, listen 80 without HTTPS redirect).
Limits of linting. The tool doesn't recursively resolve include /etc/nginx/snippets/*.conf directives, so the config it sees is the one you paste, not the effective runtime composed of the includes. It doesn't evaluate interactions between compiled modules like mod_security, nor filesystem posture (permissions and ownership of /etc/nginx/sites-enabled/). For complete audits a server-side agent that inspects the runtime system (lynis and similar) or a consultant analyzing the system as a whole is needed.
Operational privacy. The config you paste is processed directly in the browser: useful for auditing internal systems, staging environments not exposed externally, and avoiding sending potentially sensitive configs (internal paths, plain credentials in misconfigured directives) to third parties.