Security Headers

Audit your HTTP security headers. HSTS, CSP, X-Frame-Options, Permissions-Policy, cookie flags — find missing protections in 5 seconds.

16+ headersCSP analyzerCookie security~5 seconds
This tool analyzes the single URL you enter, not your entire website.
Inspecting headers…Fetching HTTP response, parsing security directives.

What We Check

Every check comes with a pass/fail result and specific fix instructions.

HSTS

Strict-Transport-Security tells browsers to always use HTTPS. Without it, a man-in-the-middle attacker can downgrade ...

Hsts Year

HSTS max-age should be at least 31,536,000 seconds (1 year). Shorter values weaken the protection.

Hsts Subdomains

includeSubDomains extends HSTS to all subdomains. Critical if you have api.example.com, app.example.com, etc.

Content Security Policy

Content-Security-Policy is the single most powerful XSS defense. Restricts where scripts/styles/images can load from.

Csp No Unsafe Inline

Csp No Unsafe Eval

Xfo

X-Frame-Options prevents clickjacking. DENY (no framing) or SAMEORIGIN (only own site can frame).

Xcto

X-Content-Type-Options: nosniff prevents browsers from MIME-sniffing — blocks certain XSS attacks.

Referrer-Policy

Referrer-Policy controls what URL info is sent in Referer header. strict-origin-when-cross-origin is the modern default.

Permissions-Policy

Permissions-Policy controls browser features (camera, mic, geolocation). Disable what you don

Coop

Cross-Origin-Opener-Policy isolates your top-level browsing context — protects against tabnabbing and Spectre.

Corp

Cross-Origin-Resource-Policy controls which sites can embed your resources. Prevents resource-based attacks.

Server Header

Server header revealing exact version (e.g., Apache/2.4.41) helps attackers find known vulnerabilities. Hide it.

X-Powered-By

X-Powered-By header reveals tech stack (PHP version, framework). Provides attackers with reconnaissance data.

Cookie Secure

Secure flag ensures cookies only sent over HTTPS. Without it, cookies leak on first HTTP request.

Cookie HttpOnly

HttpOnly flag prevents JavaScript from reading session cookies. Critical XSS mitigation.

Cookie SameSite

SameSite=Lax (or Strict) prevents cookies being sent on cross-site requests — main CSRF defense.

Why It Matters

Numbers that make a difference for your website.

16+

Headers

Complete security scan

A+

Grade

Aim for the highest score

OWASP

Aligned

Industry best practices

Copy

Paste

Ready-to-use header values

Frequently Asked Questions

Common questions about this tool and how to use the results.

Why do security headers matter?
Security headers are your first line of defense against common web attacks like XSS, clickjacking, and MIME sniffing. They cost nothing to implement.
What is the most important header?
Content-Security-Policy (CSP) is the most powerful, preventing XSS by controlling which resources can load. Start with a report-only policy.
Will adding headers break my site?
Most headers are safe to add. CSP is the exception. Start with Content-Security-Policy-Report-Only to test before enforcing.
How do I add these headers?
Add them in your web server config (Apache .htaccess, Nginx server block) or through your CDN dashboard (Cloudflare, etc).

Ready to audit your site?

Enter your URL above and get results in seconds. Completely free.

Start Audit