Security Headers Checker
Check a URL for missing or risky security headers (CSP, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy, COOP/COEP/CORP) and analyze cookie flags (Secure, HttpOnly, SameSite). Follow redirects to the final destination, export JSON/PDF reports, and get actionable hardening recommendations.
Features
- Follow redirects to audit the final HTTPS destination (recommended for real-world deployments).
- Checks required hardening headers: Content-Security-Policy, Strict-Transport-Security, X-Content-Type-Options, X-Frame-Options, Referrer-Policy, Permissions-Policy.
- Checks recommended modern headers: COOP, COEP, CORP, Origin-Agent-Cluster, and additional hardening signals when present.
- Cookie analysis for Set-Cookie flags: Secure, HttpOnly, SameSite; warns about SameSite=None without Secure.
- CSP analysis: highlights unsafe-inline, unsafe-eval, wildcard sources, missing defensive directives (default-src, object-src, base-uri, frame-ancestors), and report-only caveats.
- Flags deprecated or risky headers (e.g., X-XSS-Protection) and information leakage headers (e.g., Server, X-Powered-By).
- Copy/shareable findings for security reviews, pentest reports, or bug tickets.
- Download reports as JSON or PDF for audits, compliance evidence, and regression tracking.
🧭 How to use for security-headers-checker
Paste the URL you want to audit
Enter the full URL (preferably https://…). The tool evaluates the response headers returned by that endpoint.
Enable “Follow Redirects” (recommended)
Many sites redirect http→https and non-www→www (or vice versa). Following redirects audits the final destination users and bots actually reach.
Choose whether to show raw headers
Enable “Show Raw Headers” if you want the original header lines for debugging (great for CDNs, reverse proxies, and framework defaults).
Review findings and prioritize fixes
Focus first on transport security (HSTS), anti-XSS (CSP), clickjacking (frame protections), cookie flags, and cross-origin isolation (COOP/COEP/CORP) where applicable.
Export a report for tracking
Download JSON/PDF to attach to tickets, compare changes over time, or add checks to CI for regressions.
Technical specs
What this tool checks
The checker focuses on modern, high-impact response headers and cookie attributes used for browser-enforced security controls.
| Area | Signals checked | Why it matters |
|---|---|---|
| Transport security | Strict-Transport-Security (HSTS) | Forces HTTPS and helps prevent SSL stripping on subsequent visits. |
| XSS mitigation | Content-Security-Policy (CSP) + common pitfalls | Restricts script/style sources and reduces XSS impact when correctly configured. |
| Clickjacking | X-Frame-Options and/or CSP frame-ancestors | Prevents your pages from being framed by other origins. |
| MIME sniffing | X-Content-Type-Options: nosniff | Stops browsers from guessing content types in risky ways. |
| Referrer leakage | Referrer-Policy | Controls how much referrer info is sent to other sites. |
| Permissions control | Permissions-Policy | Restricts powerful features (camera, mic, geolocation, etc.) at the browser level. |
| Cross-origin isolation | COOP / COEP / CORP (and related) | Needed for advanced security isolation and some high-performance APIs. |
| Cookies | Set-Cookie flags: Secure, HttpOnly, SameSite | Reduces session theft risk and mitigates CSRF when correctly configured. |
| Risky/deprecated | X-XSS-Protection, Server, X-Powered-By (when present) | Deprecated controls or info leakage that can aid attackers. |
Request behavior and limits
The audit runs server-side and can follow redirects to match real navigation behavior.
| Setting | Behavior | Default |
|---|---|---|
| Follow Redirects | Follows up to a capped number of redirects | Enabled |
| Max Redirects | Maximum redirects when following is enabled | 10 |
| Timeout | Request timeout | 15000 ms |
| User-Agent | Request identification header | Encode64Bot/1.0 (+[https://encode64.com](https://encode64.com)) |
| Private networks | Blocks private-network targets | Not allowed |
Interpreting results correctly
A “passing” header scan is not the same as “secure.” Headers are one layer. The goal is to reduce the blast radius of common classes of issues and enforce safer browser defaults.
Command line
Use curl to replicate what the checker does and validate headers quickly during debugging or CI.
macOS / Linux
Fetch response headers
curl -I [https://example.com](https://example.com)Shows the top-level headers returned by the endpoint.
Follow redirects and show headers
curl -IL [https://example.com](https://example.com)Useful to confirm the final destination headers after redirects.
Inspect Set-Cookie lines
curl -sI [https://example.com](https://example.com) | grep -i '^set-cookie:'Helps verify Secure/HttpOnly/SameSite attributes.
Windows (PowerShell)
Fetch response headers
(Invoke-WebRequest -Uri [https://example.com](https://example.com) -Method Head).HeadersPrints the returned headers in PowerShell.
Use cases
Security hardening baseline for a web app
Establish a minimum header baseline and catch missing headers after deployments, proxy/CDN changes, or framework upgrades.
- Verify HSTS is present on production HTTPS
- Ensure clickjacking protections are enabled for authenticated pages
Cookie and session safety review
Validate that session cookies are sent with Secure/HttpOnly/SameSite and detect common misconfigurations.
- Catch SameSite=None without Secure
- Confirm HttpOnly is set on session tokens
CSP quality and XSS risk reduction
Identify high-risk CSP patterns and prioritize fixes that materially reduce XSS impact.
- Remove unsafe-inline and adopt nonce/hash strategy
- Add frame-ancestors and base-uri for stronger defaults
CDN / reverse proxy regression checks
Detect when a CDN, load balancer, or proxy strips or duplicates headers.
- Verify security headers survive Cloudflare/Varnish/Nginx changes
- Ensure redirects do not drop HSTS on final destination
❓ Frequently Asked Questions
❓Why are security headers important?
❓Should I enable “Follow Redirects”?
❓Is CSP required for every site?
❓Why is X-XSS-Protection flagged as deprecated or risky?
❓What’s a common HSTS mistake?
HTTPS but forgetting to serve HTTPS consistently (or missing it on the canonical host). Another common mistake is adding preload directives without fully meeting the preload requirements.❓Can headers alone secure my application?
Pro Tips
Audit both the landing HTML and your API endpoints. They often have different middleware and can silently diverge in header coverage.
Run a redirect-chain check: confirm the final destination sets the strongest headers (especially HSTS and CSP).
Treat cookies as part of your security perimeter: Secure + HttpOnly + appropriate SameSite should be your default for session cookies.
For CSP, prioritize removing unsafe-inline/unsafe-eval and adopting nonces or hashes. This is usually the biggest real-world security gain.
Avoid leaking server details. Remove or minimize Server / X-Powered-By where feasible to reduce fingerprinting.
Add a regression test in CI that fails deployments if critical headers disappear (proxy/CDN changes cause this more often than people expect).
Additional Resources
Other Tools
- CSS Opmaker
- HTML Opmaker
- Javascript Opmaker
- PHP Opmaker
- Kleurkiezer
- Sprite Extractor
- Base32 Binaire Encoder
- Base32 Decoder
- Base32 Encoder
- Base58 Binaire Encoder
- Base58 Decoder
- Base58 Encoder
- Base62 Binaire Encoder
- Base62 Decoder
- Base62 Encoder
- Base64 Binaire Encoder
- Base64 Decoder
- Base64 Encoder
- Hex Binaire Encoder
- Hex Decoder
- Hex Encoder
- Csharp Formatter
- Csv Formatter
- Dockerfile Formatter
- Elm Formatter
- ENV Formatter
- Go Formatter
- Graphql Formatter
- Hcl Formatter
- INI Formatter
- JSON Formatter
- Latex Formatter
- Markdown Formatter
- Objectivec Formatter
- Php Formatter
- Proto Formatter
- Python Formatter
- Ruby Formatter
- Rust Formatter
- Scala Formatter
- Shell Script Formatter
- SQL Formatter
- SVG Formatter
- Swift Formatter
- TOML Formatter
- Typescript Formatter
- XML Formatter
- YAML Formatter
- Yarn Formatter
- CSS Verkleiner
- Html Minifier
- Javascript Minifier
- JSON Verkleiner
- XML Verkleiner
- Cache Headers Analyzer
- Cors Checker
- Csp Analyzer
- Dns Records Lookup
- Http Headers Viewer
- Http Status Checker
- Open Graph Meta Checker
- Redirect Chain Viewer
- Robots Txt Tester
- Security Txt Checker
- Sitemap Url Inspector
- Tls Certificate Checker
- PDF Naar Tekst
- Regex Tester
- Serp Rang Checker
- Whois Opzoeken