Enter a URL above and click Check Headers to analyze HTTP response headers.
Checks: CSP Β· HSTS Β· X-Frame-Options Β· X-Content-Type-Options Β· Referrer-Policy Β· Permissions-Policy Β· COOP Β· CORP Β· Cookie Flags
Analyze HTTP response headers and security posture for any URL. Check CSP, HSTS, X-Frame-Options and more with a scored security grade and fix recommendations.
Enter a URL above and click Check Headers to analyze HTTP response headers.
Checks: CSP Β· HSTS Β· X-Frame-Options Β· X-Content-Type-Options Β· Referrer-Policy Β· Permissions-Policy Β· COOP Β· CORP Β· Cookie Flags
IndexCraft's HTTP Header Checker fetches and displays all HTTP response headers for any URL, then runs a full security audit across 8 critical headers:
CSP and HSTS carry 15 points each; the other six headers carry 10 points each (base total: 90 points). Bonus points (up to 5 per header) reward best-practice values β for example, HSTS with
includeSubDomains
or a CSP without
unsafe-inline
. Missing headers show specific recommended values to add.
CSP restricts which scripts, styles, images, and iframes may load β the primary XSS defence. A minimal starting policy is
default-src 'self'
. Avoid
'unsafe-inline'
in script-src as it permits arbitrary inline JavaScript and largely defeats CSP's protection against script injection.
HSTS forces browsers to always use HTTPS for the
max-age
duration (seconds). The recommended value is
max-age=31536000; includeSubDomains; preload
β one year, all subdomains, and eligible for browser preload lists so protection applies even on a user's first-ever visit to the domain.
strict-origin-when-cross-origin
sends the full URL only for same-origin requests and just the origin for cross-origin, preventing path and query-string leakage. Permissions-Policy should explicitly deny APIs not in use:
camera=(), microphone=(), geolocation=()
to limit browser API exposure in embedded content.
Cross-Origin-Opener-Policy: same-origin
prevents cross-origin pages accessing your window via
window.opener
.
Cross-Origin-Resource-Policy: same-origin
blocks other origins loading your assets, mitigating Spectre attacks. For session cookies always set:
Secure
(HTTPS only),
HttpOnly
(no JS access),
SameSite=Strict
(no cross-site transmission).
default-src 'self'; script-src 'self'
and avoids
'unsafe-inline'
, which permits arbitrary inline scripts and largely defeats CSP's XSS protection.
max-age=31536000
enforces this for one year. Adding
includeSubDomains
extends the protection to all subdomains. HSTS prevents protocol downgrade attacks and cookie hijacking over unencrypted HTTP connections.
frame-ancestors
directive offers more granular control in modern browsers.
includeSubDomains
on HSTS or a CSP without
unsafe-inline
. Grades: A+ β₯ 95, A β₯ 85, B β₯ 70, C β₯ 50, D β₯ 30, F < 30.
strict-origin-when-cross-origin
sends only the origin for cross-origin requests and nothing on HTTPS-to-HTTP downgrades.
X-Content-Type-Options: nosniff
prevents browsers from guessing (MIME-sniffing) a response's content type. Without it, a browser might execute a file declared as
text/plain
as JavaScript if it detects script content. This header forces the browser to honour the declared
Content-Type
strictly, preventing content-injection attacks.