Skip to main content
This website was roasted. Roast yours →
GoNoGo|Roast
Roast Yours

Scroll to explore

https://my-aura.app/

Roast Complete

0/3
Would Sign Up
0/3
Would Pay
7.4/10
Clarity
47/100
RAW
Dmitri Yamamoto
Dmitri Yamamoto
Head of Product

Aura addresses a genuine pain point for infrastructure managers, but the execution is currently blocked by a fragile, mandatory OAuth-only login flow. While the technical depth of the Digitizer Site Worker is impressive, the inability to access the dashboard makes it impossible to validate the 'unified' promise.

Verdict:
No
Would pay:
No

Biggest friction: Mandatory Google OAuth that fails with browser security errors, preventing any access to the product.

Best thing: The technical transparency and open-source nature of the Digitizer Site Worker plugin.

Confidence over time

6
7
8
9
9
10
8

Idea Assessment

A unified management dashboard for infrastructure providers like Cloudways, Cloudflare, and Bunny CDN, paired with an open-source WordPress management plugin.

Problem
10
Solution
9
Uniqueness
7

I still don't know if the 'unified' dashboard actually simplifies workflows or just adds another layer of abstraction over existing APIs.

Landing Page

Clean, professional, and clearly targeted at technical users who are tired of console-hopping.

Headline9/10
Designclean minimal
Design ↔ MessageMatch
Clicks to value1

Missing: Interactive dashboard preview or video walkthrough • Standard email/password authentication • Clearer documentation on API integration limits

Journey7 steps

100% coverage \u2022 139 sections
Step 1intrigued

The value proposition hits home—I'm tired of context-switching between provider consoles. The focus on API-driven management and security (AES-256-GCM) is promising, but I need to see if the 'unified' aspect actually reduces complexity or just adds another layer. I'm skeptical about the 'early access' gate, but the feature set looks relevant to my pain points.

Step 2impressed

This is exactly the kind of technical depth I look for. The fact that it's open-source and has a clear security model (IP whitelisting + tokens) makes me feel much better about connecting my infrastructure. It addresses my frustration with manual updates across multiple sites. I'm impressed by the 'zero frontend impact' claim—that's a critical requirement for my production environments.

Step 3impressed

The 'About' page confirms my suspicion that this is built by practitioners, not just marketers. The focus on 'Security First' and 'Open & Transparent' aligns with my need for technical depth. Seeing real companies like Deci and Reposify as users adds significant credibility. I have enough information to move to the signup phase to see if the dashboard lives up to the promise.

Step 4skeptical

I'm a bit annoyed that I can't use my work email directly, as I prefer to keep my professional tools separate from my personal Google account. However, the security mention of AES-256-GCM encryption for credentials on the previous pages gives me enough confidence to proceed with the OAuth flow to see the dashboard.

Lack of email/password registration option forces reliance on third-party OAuth
Step 5neutral

This is a standard OAuth flow. While I'm still slightly annoyed about the lack of native email/password login, I need to proceed to actually see the dashboard and evaluate the product's core value proposition.

Step 6neutral

Standard Google OAuth flow. I'm ready to move past this and finally see the actual dashboard to evaluate if the 'unified management' claim holds up or if it's just another layer of complexity.

Step 7frustrated

This is incredibly frustrating. I've already expressed my annoyance at the lack of a native email/password login, and now the mandatory OAuth flow is failing entirely. It's a major barrier to entry for a product that claims to simplify infrastructure management. If I can't even get into the dashboard, I can't evaluate the actual value proposition.

Mandatory OAuth login is failing due to browser security restrictionsNo alternative authentication method (email/password) provided

Diagnosis

The primary barrier to conversion is a broken and restrictive authentication flow that prevents users from accessing the platform. Because the login process relies exclusively on a failing OAuth implementation, potential users are unable to bypass the 'early access' wall to evaluate the product.

What costs you conversions

-1.065%CTA below the fold gets 75% fewer conversions than above fold
-0.711%No HTTPS triggers browser 'Not Secure' warning, -50% conversion
-0.483%Pages with testimonials convert 34% better than without (VWO A/B test)
-0.285%Missing contact information reduces conversion by ~20%
-0.142%Small touch targets (<48px) reduce mobile conversion by ~10%

Deal Breakers

The OAuth authentication loop is failing to redirect users to the application, effectively preventing all new signups.

What Works

Detailed security documentation
Mentions AES-256-GCM encryption for credentials
Case study link provided
Clear 'Security First' philosophy
Clear documentation of features
Open source focus
Clear feature list
Standard Google OAuth flow

Action Plan

1

Implement a standard email/password authentication registration form

Now

Only 'Sign in with Google' button present

Should be

Email input field, password input field, and 'Create Account' button added below the OAuth button

Users are currently blocked by the fragile OAuth flow; this provides a reliable fallback.

Effort: highImpact: high
2

Fix server-side routing for 404 error pages

Now

Broken routing causing improper status codes

Should be

Server returns a proper 404 HTTP status code for non-existent routes

Technical recommendation to improve site reliability and SEO indexing.

Effort: mediumImpact: medium
3

Add Open Graph meta tags to all primary pages

Now

Missing social sharing metadata

Should be

Include og:title, og:description, and og:image tags in the <head> of the landing page

Increases professional credibility when links are shared by potential users.

Effort: lowImpact: low
4

Increase padding on all primary Call-to-Action buttons

Now

Buttons are cramped and fail accessibility standards

Should be

Increase padding to 16px vertical and 32px horizontal

Ensures accessibility and improves usability for infrastructure managers on various devices.

Effort: lowImpact: low
5

Add a dedicated 'Compliance' section to the landing page footer

Now

Compliance status is not explicitly stated in a clear, reassuring way

Should be

Add a 'Compliance' link in the footer that leads to a page detailing GDPR and SOC2 roadmap status

Arjun Müller noted the need for concrete data to reassure enterprise-level users.

Effort: mediumImpact: medium

Quick Wins

Update the landing page copy to explicitly mention the current GDPR and SOC2 compliance status in the hero section.
Add a 'Contact Support' link directly on the login page to assist users experiencing OAuth loops.
Add a clear text disclaimer under the OAuth button stating: 'Having trouble? Contact support for manual account setup.'

Growth Potential

3.8%
Industry avg
conversion rate
~3.5%
After fixes
conversion rate

Based on b2b_saas benchmarks (Unbounce, Portent, Google)

potential revenue

$45,000/mo

Based on MainWP ($4M ARR)

currently realized

47%

$21,150/mo

uplift

-8%

more conversions

The market for WordPress and infrastructure management is highly fragmented but has a high willingness to pay among agencies, allowing for a sustainable mid-market revenue stream through tiered subscription models.

Fix the site?

Or validate the idea first.

my-aura.app — Roast Score 47/100 | GoNoGo