Content-Security-Policy
passCSP present with safer baseline directives.
default-src 'self'; script-src 'self'; object-src 'none'; frame-ancestors 'none'; base-uri 'self'
Like this tool?
Install byteflow.tools for faster startup and offline tool access.
Install guideAnalyze security headers with pass/warn/fail scoring and remediation guidance.
CSP present with safer baseline directives.
default-src 'self'; script-src 'self'; object-src 'none'; frame-ancestors 'none'; base-uri 'self'
HSTS is configured with strong baseline.
max-age=31536000; includeSubDomains; preload
Anti-clickjacking policy is configured.
DENY
MIME-sniffing protection is enabled.
nosniff
Referrer policy is privacy-conscious.
strict-origin-when-cross-origin
Permissions-Policy is present.
camera=(), microphone=(), geolocation=()
COOP is configured for isolation.
same-origin
CORP header is present.
same-origin
Analyze HTTP security headers and receive pass/warn/fail scoring with remediation guidance for safer web deployments.
It parses raw response header blocks including optional status lines.
It evaluates critical security headers and classifies each as pass, warn, or fail.
It computes an overall security score with status counts.
It generates a copyable report with actionable remediation hints.
Raw headers
content-security-policy: ...\nstrict-transport-security: ...
Security sample
x-frame-options: DENY\nx-content-type-options: nosniff
Optional status line
HTTP/2 200
Score
Score 14/18 with PASS/WARN/FAIL counts
Per-header assessment
CSP pass, HSTS warn, COOP fail with recommendations
Copy report
formatted security header summary for tickets and audits
Headers pasted in non-standard format
Use one `name: value` pair per line.
False negatives from missing proxy headers
Capture final response headers from edge/prod path.
Score interpreted as compliance certification
Use score as guidance, not legal/compliance guarantee.
Outdated policy assumptions
Review recommendations against current browser support and org policies.
Copying incomplete report context
Include environment URL and timestamp with copied output.
Security Header Analyzer should be treated as a repeatable validation step before merge, release, and handoff.
What does pass/warn/fail mean?
It indicates whether header presence and configuration meet baseline expectations.
Can this detect every web security issue?
No, it focuses on header-level posture only.
Should I run this after every infra change?
Yes, especially after proxy, CDN, or middleware updates.
Can I copy a full report summary?
Yes, report copy action is built in.
Does a high score guarantee full security?
No, combine this with broader security testing practices.