Serious Gmail self-check with clear guidance, local scoring, and no fake claims.
This page does not ask for a password, token, or inbox access. It helps people review real warning signs, understand risk, and move into official Google security steps with better clarity.
Local-only compromise signal review
Tick only the signs that are actually true. This score is calculated only in your browser and is meant to guide the next steps, not replace Google's own account security tools.
No strong compromise pattern was selected, but this is still only a self-check. Official Google account checks remain the source of truth.
Clear links, no fake diagnostics
A real security checker should push people toward official recovery and account audit tools, not ask for passwords or pretend it can read Gmail without consent.
Review sign-ins, recovery options, devices, and suspicious changes using Google's official account security panel.
Check whether Google already detected unusual sign-ins or security-sensitive account changes.
Open Gmail Settings and review forwarding, filters, delegates, and connected apps before trusting the inbox again.
Use the official recovery flow if you think the account was hijacked or key settings were changed.
Safer advanced version
If we want to take this further, the serious path is an opt-in Google OAuth flow that reads only authorized account metadata, device/session signals, and app access state, never passwords.
View platform trust rules