Security Headers Checker
Check HTTP security headers for any website and get a security grade (A+ to F) with actionable recommendations to fix missing or misconfigured headers.
Related Tools
About Security Headers Checker
How It Works
- Sends a server-side HTTP request to the target website
- Reads all response headers from the server
- Evaluates 8 critical security headers against best practices
- Calculates a weighted score and assigns a letter grade (A+ to F)
- Provides specific remediation advice for each header
Common Use Cases
- Security audits and penetration testing prep
- Hardening web server configurations
- Verifying security header deployments
- Compliance checks (OWASP, PCI DSS, etc.)
- Monitoring security posture over time
Frequently Asked Questions
What are HTTP security headers?
HTTP security headers are response headers that instruct browsers on how to behave when handling your website's content. They are a critical layer of defense against common web attacks such as XSS, clickjacking, MIME sniffing, and protocol downgrade attacks.
How is the security grade calculated?
Each of the 8 checked headers is assigned a weight based on its security impact. Fully present and correctly configured headers earn full weight, misconfigured headers earn partial credit, and missing headers earn nothing. The weighted total is converted to a 0–100 score and mapped to a letter grade: A+ (95+), A (80+), B (65+), C (50+), D (35+), F (below 35).
Which security headers does this tool check?
The tool evaluates: Content-Security-Policy (CSP), Strict-Transport-Security (HSTS), X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy, X-XSS-Protection, and Cross-Origin-Opener-Policy (COOP).
What is Content-Security-Policy and why is it important?
Content-Security-Policy (CSP) is the most important security header. It prevents Cross-Site Scripting (XSS) and data injection attacks by specifying exactly which sources are allowed to load scripts, styles, images, and other resources. A strong CSP avoids unsafe-inline and unsafe-eval directives.
What is HSTS (Strict-Transport-Security)?
HTTP Strict Transport Security (HSTS) forces browsers to connect to your site exclusively over HTTPS for a specified period. This prevents protocol downgrade attacks and cookie hijacking. A max-age of at least 1 year (31536000 seconds) with includeSubDomains is recommended.
What does X-Frame-Options do?
X-Frame-Options prevents your website from being embedded inside an iframe on another domain, protecting users from clickjacking attacks. The recommended values are DENY (never allow framing) or SAMEORIGIN (only allow framing from the same origin).
Can I check any website?
You can check most publicly accessible websites. Some sites may block automated requests or be behind authentication, in which case the check may fail. The tool makes a server-side HEAD request, so client-side restrictions like CORS do not apply.
What is Permissions-Policy?
Permissions-Policy (formerly Feature-Policy) restricts which browser features and APIs your page can use, such as camera, microphone, geolocation, and payment APIs. This limits the potential impact of XSS or third-party script compromises.
My website got an F grade — where do I start?
Start with the headers marked Critical: add Strict-Transport-Security to enforce HTTPS, then implement Content-Security-Policy. Next address High severity headers (X-Frame-Options, X-Content-Type-Options). Use the example values provided in each header's detail card as a starting point.
Is this tool safe to use on my website?
Completely safe. The tool only makes a standard HTTP HEAD request (no body is downloaded), similar to what a browser does when checking a link. No changes are made to your server, and the check is entirely read-only.
What is Cross-Origin-Opener-Policy (COOP)?
COOP isolates your browsing context from cross-origin documents opened in popups. Setting it to same-origin prevents Spectre-like side-channel attacks and enables access to certain powerful browser APIs like SharedArrayBuffer.
How often should I check my security headers?
Run a check after any web server or CDN configuration change, after deploying new infrastructure, and as part of regular security audits. Many teams include security header checks in their CI/CD pipeline to catch regressions automatically.