Enter your current CSP header value in the text area, or use the visual builder to create directives step by step.
Select which directives you need (script-src, style-src, img-src, etc.) and add allowed sources for each.
Click 'Analyze' to validate your CSP and get a security score from A (strong) to F (critical issues).
Review any warnings or errors — the tool suggests fixes for insecure settings like '*' or 'unsafe-inline'.
Copy the optimized CSP header and add it to your web server configuration or meta tag.
For testing, enable 'Report-Only' mode to see violations without blocking content.
Visual CSP builder with clickable directives — no need to write header syntax manually.
Security scoring from A-F with detailed analysis of each directive.
Detection of common CSP vulnerabilities: '*' wildcards, 'unsafe-inline', 'unsafe-eval'.
Suggestions for improving your policy with specific, actionable fixes.
Optimized CSP output that removes redundant sources and tightens security.
Preset policies: Strict, Typical Web App, CDN-friendly, and WordPress templates.
Preset examples for quick starting points with common configurations.
Keyboard shortcuts: ⌘↵ to analyze, ⌘⇧C to copy, ⌘⇧K to clear, ⌘⇧E for examples.
JSON view for programmatic access and API integration.
Works entirely in your browser — no CSP data is ever sent to any server.