Analyze your website's HTTP security headers instantly. Get a security score, detailed explanations, and code snippets to fix vulnerabilities.
Checking your website for security vulnerabilities
0% Complete
HTTP security headers are special directives sent by your web server to browsers. They instruct browsers on how to behave when handling your site's content, providing crucial protection against common web attacks.
Security headers add an extra layer of protection even if your application has vulnerabilities.
Adding security headers requires no code changes - just server configuration.
Protect against XSS, clickjacking, MIME sniffing, and man-in-the-middle attacks.
HTTP/1.1 200 OK
Content-Security-Policy: default-src 'self'
Strict-Transport-Security: max-age=31536000
X-Frame-Options: DENY
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin
Quickly verify security headers are properly configured after deployment. Get ready-to-use code snippets for your stack.
Perform rapid security assessments of client websites. Export PDF reports for documentation and compliance.
Check security headers on client sites before handoff. Demonstrate security improvements to stakeholders.
Understand web security concepts with clear explanations and real-world attack examples for each header.
Security headers are HTTP response headers that your web server sends to browsers. They provide instructions on how to handle your site's content securely, preventing attacks like XSS, clickjacking, and data theft.
A low score indicates your site is missing important security protections. While it doesn't mean you've been hacked, your site is more vulnerable to common web attacks. We recommend implementing the missing headers as soon as possible.
Security headers are configured at the server level. Click on any missing header in your results to see code snippets for Apache, Nginx, Vercel, Cloudflare, Node.js, and Laravel. Simply copy the snippet and add it to your server configuration.
Security headers are an important layer of defense but not a complete solution. They work best alongside secure coding practices, regular updates, HTTPS, and other security measures. Think of them as a safety net that catches attacks your application might miss.
X-XSS-Protection was removed from modern browsers because the filter itself had security issues. However, it still provides protection for older browsers like Internet Explorer. We recommend implementing it alongside a strong Content-Security-Policy.
Love this free tool? Share it with your network!