Security Headers Checker
Grade your HTTP security headers from A+ to F with fix recommendations.
Score: 50/100 • 4/8 headers present
max-age=31536000; includeSubDomains
Forces HTTPS connections. Prevents protocol downgrade attacks.
Controls which resources the browser can load. Mitigates XSS attacks.
💡 Define a strict CSP. Start with default-src 'self' and expand as needed.
Content-Security-Policy: default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'DENY
Prevents clickjacking by controlling iframe embedding.
nosniff
Prevents MIME type sniffing. Forces browser to respect declared content type.
strict-origin-when-cross-origin
Controls how much referrer information is sent with requests.
Controls which browser features and APIs can be used.
💡 Disable unused features like camera, microphone, and geolocation.
Permissions-Policy: camera=(), microphone=(), geolocation=()Legacy XSS filter (mostly superseded by CSP).
💡 Set to '0' (modern browsers) or '1; mode=block' for legacy support.
X-XSS-Protection: 0Controls DNS prefetching behavior.
💡 Set to 'off' to prevent DNS prefetch information leakage.
X-DNS-Prefetch-Control: offRelated Tools
🔒 This tool runs entirely in your browser. No data is sent to any server.