Paste raw HTTP response headers from browser DevTools (Network tab) or run `curl -I https://yourdomain.com`. Click Analyze or press ⌘↵.
View your A–F security grade and 0–100 score. The grade reflects the presence and configuration of HSTS, CSP, X-Frame-Options, and other critical headers.
Check the Security Headers, CORS, Caching, and Information Disclosure sections. Each row shows the header value, status icon, and actionable fix note.
Fix missing headers by adding them to your Nginx, Apache, or Next.js config. The tool provides recommended values for each header.
Verify compliance with PCI-DSS, OWASP Top 10, and GDPR Article 32. The tool flags missing HSTS and CSP as compliance gaps.
Instant A–F security grade and 0–100 score, similar to Mozilla Observatory and SecurityHeaders.com but running entirely in your browser.
HSTS validation: checks max-age, includeSubDomains, and preload directives. Flags missing or misconfigured Strict-Transport-Security.
Content-Security-Policy (CSP) analysis: parses directives and flags unsafe-inline, unsafe-eval, or wildcard sources that weaken XSS protection.
X-Frame-Options & X-Content-Type-Options: verifies DENY/SAMEORIGIN and nosniff. Detects Clickjacking and MIME-sniffing risks.
CORS misconfiguration detection: flags wildcard (*) origins, wildcard with credentials, and other dangerous Access-Control-Allow-* setups.
Information disclosure flags: identifies Server, X-Powered-By, X-AspNet-Version, and X-Runtime headers that leak fingerprints.
Caching analysis: parses Cache-Control directives, ETag, and Last-Modified for performance optimization.
PCI-DSS & GDPR compliance warnings: flags missing security headers as compliance gaps under strict regulatory requirements.
100% client-side processing: headers are analyzed entirely in your browser. No data sent to external servers — fully private.
Paste from cURL: paste the output of `curl -I https://example.com` to analyze headers without manual extraction.
AI-powered explanations: use the built-in AI to explain header configurations and get exact code snippets to fix issues.
JSON export: export the full analysis result as formatted JSON with ⌘⇧C for CI/CD pipelines and security audits.
Keyboard shortcuts: ⌘↵ to analyze, ⌘⇧C to copy JSON, ⌘⇧K to clear, ⌘⇧E for examples dropdown.