·web
HTTP Header Analyzer
Paste response headers, get a security score. CSP / HSTS / Permissions-Policy / X-Frame-Options parsed, missing headers flagged, directives explained in plain language.
http · security · csp · headers
Paste response headers, get a security score. CSP / HSTS / Permissions-Policy / X-Frame-Options parsed, missing headers flagged, directives explained in plain language.
http · security · csp · headers
Paste your curl -I https://example.com output → out comes a security score, which header is missing or misconfigured, what each CSP directive actually does — at a glance.
unsafe-inline / unsafe-eval warnings, default-src 'self' baselinemax-age minimum 6 months, includeSubDomains, preloadframe-ancestors is the modern alternative)strict-origin-when-cross-origin baselineRun curl -I https://your-site.com, paste the header block above the body. The lab categorises each header, drops missing ones into a "missing" list, and flags very weak CSPs with a red banner.
A 0-100 score similar to mozilla.observatory.dev, based on header coverage + strictness. 90+ is "production-ready", 70-89 "could improve", below 70 "work to do".