HEAD → GET fallback Ā· redirect tracking (max 5)

Comprehensive Check of 6 Core Security Headers

Enable browser security features via HTTP response headers to protect your application from common attacks.

Tooling: custom Node.js script (axios HTTP client)
Goal: evaluate defenses against XSS, clickjacking, MIME sniffing, and data leakage

Headers evaluated:
• Content-Security-Policy (CSP) — restricts resource sources; mitigates XSS/third‑party script abuse
• X-Frame-Options / frame-ancestors — blocks framing; prevents clickjacking/phishing overlays
• X-Content-Type-Options — prevents MIME sniffing; mitigates incorrect execution
• Referrer-Policy — minimizes referrer data; prevents sensitive URL exposure
• Permissions-Policy — limits browser features (location, mic, camera) to protect privacy
• Strict-Transport-Security (HSTS) — forces HTTPS; prevents MITM/downgrade attacks

Where to configure: CDN (Cloudflare), web server (Nginx/Apache), application (e.g., Laravel)
Applying headers together yields the strongest protection.
Grade Score Criteria
A+ 95–100 Strong CSP (nonce/hash/strict-dynamic; no unsafe-*)
XFO: DENY/SAMEORIGIN or limited frame-ancestors
X-Content-Type: nosniff
Referrer-Policy: strict-origin-when-cross-origin or better
Permissions-Policy: unneeded features blocked
HSTS: ≄ 6 months + include subdomains
A 85–94 CSP present (weaker allowed) or 5 non‑CSP items strong
XFO applied (or frame‑ancestors limited)
X-Content-Type: nosniff
Referrer‑Policy: recommended value
Permissions‑Policy: basic restrictions
HSTS: ≄ 6 months
B 70–84 CSP none/weak
XFO applied
X-Content-Type: present (nosniff)
Referrer‑Policy: okay/average
Permissions‑Policy: partially restricted
HSTS: short or no subdomains
C 55–69 Some headers present
CSP none/weak
Referrer‑Policy weak
X-Content-Type missing
HSTS absent or very short
D 40–54 Only 1–2 key headers present
No CSP
Referrer weak/absent
Many other headers missing
F 0–39 Security headers virtually absent
No CSP/XFO/X-Content
No Referrer‑Policy
No HSTS
Grading policy: A+ requires a strong CSP. If CSP is absent, an A can still be awarded when the five non‑CSP headers (XFO, X‑Content‑Type‑Options, Referrer‑Policy, Permissions‑Policy, HSTS) are all strong.
No results yet

Run a test to view the security headers analysis.

No data yet

Run a test to view the raw JSON data.

Sign in to view test history.

Sign in to manage domains.