Skip to main content
ThreatOther

Punycode host in link — URL-level homograph attack (xn-- decodes to a spoofed brand)

href-punycode-host

What this tier means

High-confidence threat indicator — phishing, impersonation, BEC, or scam pattern. Strong contributor to the trash decision.

How Gorganizer detects this

An `<a href>` in the body points at a hostname containing an `xn--` label — the ASCII encoding of a non-ASCII internationalized domain name. A link to `https://xn--pple-43d.com/login` decodes to "ápple.com" which a sighted user glancing at a rendered button sees as "apple.com". Legitimate English-language brands register the plain ASCII form and link to that; local-script brands link to the decoded-Unicode form their audience renders correctly. Raw `xn--` in an email href is attack-shaped — the URL-level sibling of the sender-level `punycode-domain` signal.

False-positive guard

Every signal in Gorganizer feeds a multi-module score — never a sole verdict. This is a threat-tier signal — it adds a strong contribution to the trash score. The full pipeline still requires convergence across multiple modules + a margin over the safety floor before deletion happens, and Gmail's trash (30-day recovery) is always used — never permanent delete.

About the scoring engine

Gorganizer's scoring engine emits over 1,800 signals across six modules — headers, sender, subject, body, attachments, and structural metadata. Every email is scored by every module independently; the final verdict requires multiple modules to agree and the trash score to beat the safety floor by a margin.

Sacred safety guards — never delete starred emails, replies, calendar invites, receipts/invoices, or attachments — apply unconditionally regardless of any signal.

Ready to clean your inbox?

Gorganizer scans your Gmail with this signal and 1,800+ others, then cleans everything in one click. $4.99 one-time, no subscription.

Get started