Security Headers Checker: Test CSP, HSTS, X-Frame-Options & More
Inspect HTTP security headers for a public website and review CSP, HSTS, clickjacking protection, referrer policy, permissions policy, and cross-origin isolation signals.
Header hardening
Security Headers Checker
Check the defensive HTTP headers returned by a public website.
The checker follows up to five public redirects and evaluates the final response.
Header results
Run a check to see security header details.
Security header findings will appear here after a successful check.
Why run a security headers checker online
A security headers checker online helps you confirm which defensive HTTP headers a public page is returning right now. These headers do not replace application security work, but they reduce exposure to common browser-side risks such as clickjacking, MIME sniffing, overly broad referrers, weak framing rules, and missing HTTPS enforcement.
How the test runs
The tool makes a server-side HTTP or HTTPS request to the public URL you enter, follows up to five public redirects, reads the final response headers, and grades the presence and basic quality of the most common security headers. It checks Strict-Transport-Security, Content-Security-Policy, frame protection through CSP or X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy, Cross-Origin-Opener-Policy, and Cross-Origin-Resource-Policy.
How to interpret results
Start with missing failed headers, then review warnings where a header exists but may be weak for modern browsers. A high score means the final response exposes a strong baseline, while a low score means the site should review its web server, CDN, framework, or application header configuration.
- HSTS helps browsers keep future requests on HTTPS after a secure visit.
- CSP limits where scripts, styles, frames, images, and other resources may load from.
- Frame protection helps reduce clickjacking risk.
- Referrer and permissions policies reduce unnecessary browser data exposure.
- COOP and CORP help isolate cross-origin browsing contexts and resources.
This check reports the headers returned by the final public response. It does not audit the whole application, prove the CSP is perfect, test private networks, or store personal data.