Passer au contenu principal

Security Headers Analyzer

Use Security Headers Analyzer online for your needs

Analyze HTTP security headers of any website: CSP, HSTS, X-Frame-Options and 9 more. A+→F grade with OWASP recommendations.

Examples: toolsmartly.com github.com mozilla.org cloudflare.com
The scan uses a public CORS proxy to bypass browser restrictions. Only public HTTP headers are read — no page content is sent.
Load example: ✅ Secure config ❌ Insecure config ⚠️ Partial config
↵ Enter to analyze
Enter a URL or paste your headers to get the security analysis.

Scan history

No scans yet.

Why are HTTP security headers important?

HTTP security headers are directives sent by the web server in the HTTP response, instructing the browser on how to handle page content. A misconfigured or absent header leaves the door open to XSS, clickjacking, content injection, MITM and session theft attacks. Their correct configuration is one of the first recommendations in the OWASP guide.

The most critical headers

Content-Security-Policy (CSP) is the most powerful header: it defines allowed sources for scripts, styles, images and iframes, effectively blocking XSS attacks. Strict-Transport-Security (HSTS) enforces HTTPS connections for a defined period, protecting against MITM attacks on HTTP connections.

Security grade A+ → F

Our analyzer assigns a score out of 100 based on the presence and configuration quality of 12 headers. Critical headers (CSP, HSTS) count more than secondary headers. An A+ grade means all required headers are present and correctly configured according to OWASP and Mozilla Observatory recommendations.