Home/Tools/Security/Security Headers Analyzer

Security Headers Analyzer

Analyze HTTP security headers for any website. Check Content-Security-Policy, HSTS, X-Frame-Options, and more. Get a security score and actionable recommendations to improve your web security.

Analyze URL
Paste Headers
Quick test:GitHubGoogleMozilla

Ready to take this to the next level?

Our team can help implement enterprise-grade solutions. Get personalized recommendations in a free 30-minute consultation.

Understanding HTTP Security Headers

HTTP security headers are response headers that web servers send to browsers to enable security features and prevent common web vulnerabilities. Properly configured headers can protect against XSS, clickjacking, MIME-type sniffing, and other attacks.

Essential Security Headers

HeaderPurposePriority
Content-Security-PolicyPrevents XSS and code injectionCritical
Strict-Transport-SecurityEnforces HTTPS connectionsCritical
X-Frame-OptionsPrevents clickjackingHigh
X-Content-Type-OptionsPrevents MIME sniffingHigh
Referrer-PolicyControls referrer informationMedium

Content Security Policy (CSP)

CSP is the most powerful security header, allowing you to control which resources can be loaded on your page. A well-configured CSP can prevent most XSS attacks by blocking inline scripts and limiting script sources.

Example CSP Header:

Content-Security-Policy: default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'

HSTS Configuration

HSTS should be configured with a max-age of at least 31536000 (1 year) and include the includeSubDomains directive. For additional security, consider adding your domain to the HSTS preload list.

Recommended HSTS Header:

Strict-Transport-Security: max-age=31536000; includeSubDomains; preload

Cross-Origin Headers (COOP, COEP, CORP)

The newer cross-origin headers enable cross-origin isolation, which is required for some browser features like SharedArrayBuffer. However, they can break third-party integrations, so test carefully before deploying.

COOP

Cross-Origin-Opener-Policy isolates your browsing context from cross-origin windows.

COEP

Cross-Origin-Embedder-Policy requires all resources to opt-in to being loaded.

CORP

Cross-Origin-Resource-Policy controls who can load your resources.

Frequently Asked Questions

Common questions about the Security Headers Analyzer

This tool analyzes 13 key security headers: Content-Security-Policy (CSP), Strict-Transport-Security (HSTS), X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy, Cross-Origin-Opener-Policy (COOP), Cross-Origin-Embedder-Policy (COEP), Cross-Origin-Resource-Policy (CORP), Expect-CT, X-XSS-Protection, X-Permitted-Cross-Domain-Policies, and X-DNS-Prefetch-Control.

ℹ️ Disclaimer

This tool is provided for informational and educational purposes only. All processing happens entirely in your browser - no data is sent to or stored on our servers. While we strive for accuracy, we make no warranties about the completeness or reliability of results. Use at your own discretion.

Security Headers Analyzer - Check HTTP Security Headers | Free Tool | Inventive HQ