ED

HTTP Header Analyzer

Analyze security headers, CORS policies, caching, and performance configurations.

What It Analyzes

Quick Start

  1. Go to Header Analyzer
  2. Enter URL to analyze
  3. View security score (A-F rating)
  4. Review missing/misconfigured headers
  5. Export report for devops team

Security Headers Explained

Critical Security Headers

HeaderPurposeExample Value
Strict-Transport-SecurityForce HTTPSmax-age=31536000; includeSubDomains
Content-Security-PolicyPrevent XSSdefault-src 'self'; script-src 'self' cdn.example.com
X-Frame-OptionsPrevent clickjackingDENY or SAMEORIGIN
X-Content-Type-OptionsPrevent MIME sniffingnosniff
Permissions-PolicyControl browser featuresgeolocation=(), microphone=()

Security Scores

Common Issues & Fixes

1. Missing HSTS

Risk: Users can be downgraded to HTTP (MITM attacks)

Fix: Add to server config:

# Apache
Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains"

# Nginx
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;

2. No Content Security Policy

Risk: XSS attacks can inject malicious scripts

Fix (Basic):

Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline'

⚠️ Remove 'unsafe-inline' in production. Use nonces or hashes instead.

3. Server Header Exposure

Risk: Reveals server software version (helps attackers)

Example: Server: Apache/2.4.41 (Ubuntu)

Fix: Hide or genericize:

# Apache
ServerTokens Prod
ServerSignature Off

# Nginx
server_tokens off;

CORS Analysis

Checks for:

Caching Headers

Optimal caching improves performance. Analyzer checks:

Best Practices

Analyze Your Headers Now

Open Header Analyzer →