Score
0/100
Free Online Tool
Free online HTTP security headers scanner for CSP, HSTS, X-Frame-Options, X-Content-Type-Options, and Referrer-Policy.
0/100
2
4
0
Missing CSP leaves pages exposed to script injection vectors.
Fix: Start with `default-src 'self'` and tighten directives by resource type.
HTTPS site without HSTS can be downgraded by first-visit attacks.
Fix: Add HSTS with at least `max-age=31536000; includeSubDomains`.
Missing clickjacking protection can allow hostile iframe embedding.
Fix: Set `DENY` or `SAMEORIGIN` unless framing is intentionally required.
`nosniff` is missing, increasing MIME confusion risk.
Fix: Set `X-Content-Type-Options: nosniff`.
No policy means browser defaults may leak more referrer data than intended.
Fix: Use `strict-origin-when-cross-origin` or a stricter policy.
Browser features are not explicitly restricted.
Fix: Set least-privilege feature directives (camera=(), microphone=(), etc.).
Security headers are often missing or inconsistent across environments, leaving avoidable browser-level attack surface.
Browser-enforced policies reduce clickjacking, MIME confusion, and some injection attack paths.
Yes. A quick header pass catches common misconfigurations before launch.
No. Header checks are one layer and should complement broader security reviews.