HTTP Headers Analyzer
Analyze HTTP response headers for any URL. Security scoring, CSP policy visualization, missing header recommendations, and HSTS preload status check.
How to Use
Analyze HTTP security headers for any website in three steps:
- Enter a URL — Type or paste any website URL into the input field. Quick-try buttons are provided for popular sites. The tool accepts both
http://andhttps://URLs. If you omit the protocol,https://is added automatically. - Review the security grade — The tool assigns a grade from A+ to F based on the presence and configuration of critical security headers. Each header is checked individually with pass/fail indicators and descriptions of what it protects against.
- Explore header details — All response headers are displayed in a searchable table. If a Content-Security-Policy (CSP) header is present, it's parsed into a readable table showing which domains are allowed for scripts, styles, images, and other resource types. Missing headers are listed with recommendations.
The analysis is performed by a Cloudflare Worker that sends a HEAD request to the target URL. Only publicly accessible HTTP headers are examined — no content is downloaded or stored.
About This Tool
Security Headers Explained
HTTP security headers are response headers that instruct browsers to enable or restrict specific behaviors, forming a defense-in-depth layer against common web attacks. Strict-Transport-Security (HSTS) forces HTTPS connections and prevents SSL stripping attacks. Content-Security-Policy (CSP) restricts which domains can serve scripts, styles, and other resources, mitigating cross-site scripting (XSS). X-Content-Type-Options prevents MIME type sniffing attacks. X-Frame-Options blocks clickjacking by preventing the page from being embedded in iframes.
Referrer-Policy controls how much URL information is sent to other sites when a user navigates away. Permissions-Policy (formerly Feature-Policy) restricts browser APIs like camera, microphone, and geolocation. Cross-Origin-Opener-Policy (COOP) isolates the browsing context from cross-origin popups to prevent Spectre-class attacks. Each missing header represents a potential attack vector.
Content-Security-Policy Parsing
CSP is the most complex security header, often spanning hundreds of characters. The tool parses it into individual directives (script-src, style-src, img-src, etc.) and displays each with its allowed sources. Unsafe keywords like 'unsafe-inline' and 'unsafe-eval' are flagged as security risks. The default-src directive serves as a fallback for any directive not explicitly set.
How the Proxy Works
Browsers enforce CORS (Cross-Origin Resource Sharing) restrictions that prevent JavaScript from reading response headers from other domains. To work around this, the tool sends the URL to a Cloudflare Worker that performs a HEAD request on your behalf. The Worker follows redirects (up to the server's redirect chain), reads the response headers, and returns them as JSON. Private/internal IP addresses (127.0.0.1, 10.x, 192.168.x) are blocked to prevent Server-Side Request Forgery (SSRF). Requests time out after 10 seconds.
Scoring Methodology
The security grade is calculated by checking for 8 critical headers and their configurations. Full points are awarded for each present header, with bonus points for strong configurations: HSTS with max-age over 31536000 (1 year) and includeSubDomains, CSP without unsafe-inline or unsafe-eval, and strict Referrer-Policy values. The methodology is inspired by SecurityHeaders.com and Mozilla Observatory. Related developer tools include JSON Formatter and DNS Lookup.
Why Use This Tool
Security Audit Your Website
Security headers are one of the easiest and most impactful security improvements for any website. Adding headers like HSTS, CSP, and X-Content-Type-Options takes minutes to configure but blocks entire classes of attacks. This tool provides an instant audit with actionable recommendations — no account signup or installation required.
Common Use Cases
- Pre-deployment check: Before launching a website or web application, verify that all security headers are configured correctly. Missing headers are easy to overlook during development.
- Competitor analysis: Compare your security posture against competitors or industry leaders. Enter their URLs to see what headers they implement and learn from their configurations.
- CSP debugging: Content-Security-Policy headers are notoriously difficult to write correctly. The CSP visualization helps you understand what your current policy allows and identify overly permissive rules.
- Compliance verification: Many security frameworks (PCI DSS, SOC 2, OWASP Top 10) recommend or require specific security headers. Use this tool to verify compliance.
- Client reporting: Generate a quick security header assessment for client websites. The grade system provides a clear, understandable summary for non-technical stakeholders.
No Installation Required
Command-line tools like curl -I show raw headers but don't analyze them. Browser DevTools show headers but require navigating to the site first. This tool provides both the raw data and the security analysis in one view, accessible from any device with a browser. Related tools include DNS Lookup, JSON Formatter, URL Parser, and User Agent Parser.