Skip to main content
EvvyTools.com EvvyTools.com

Navigate

Home Tools Data Lists About Blog Contact

Tool Categories

Home & Real Estate Health & Fitness Freelance & Business Everyday Calculators Writing & Content Dev & Tech Cooking & Kitchen Personal Finance Math & Science

More

Subscribe Donate WordPress Plugin
Sign In Create Account

HTTP Security Header Grader — Audit Your Site Headers

Audit your HTTP security headers with A-F grades per category

Paste your HTTP response headers below to get an instant security grade. The tool analyzes Content-Security-Policy, HSTS, X-Frame-Options, and six other critical security headers, then gives you a letter grade for each one plus an overall score. Everything runs entirely in your browser — no headers are sent to any server.

Pro tip: Subscribers get copy-paste fix snippets for nginx, Apache, Express.js, and Cloudflare Workers for every missing or weak header, plus a before/after comparison mode to verify your improvements and compliance reports for OWASP, PCI-DSS, and HIPAA standards.

How to get your headers:
Browser: Open DevTools (F12) → Network tab → reload the page → click the first request → copy the Response Headers section.
Terminal: Run curl -I https://yoursite.com and paste the full output below.

Why HTTP Security Headers Matter

HTTP security headers are your first line of defense against a wide range of web attacks. They are directives sent by your server that instruct browsers how to behave when handling your site’s content. Without them, browsers fall back to permissive default behaviors that leave your users vulnerable to cross-site scripting (XSS), clickjacking, MIME-type sniffing attacks, man-in-the-middle interception, and data exfiltration. Major security frameworks including OWASP, PCI-DSS, and HIPAA all require or strongly recommend specific HTTP security headers as part of a compliant web application deployment. Configuring these headers correctly costs nothing — they are simple server configuration directives — yet a surprising number of production websites ship without them or with misconfigured values that provide a false sense of security.

Content-Security-Policy: Your XSS Shield

CSP is the single most important security header. It defines an allowlist of content sources the browser may load, blocking injected scripts from attacker-controlled servers. A comprehensive policy covers script-src, style-src, img-src, font-src, connect-src, frame-ancestors, and a default-src fallback. The report-to directive sends violation reports to a URL you control for monitoring. Use Content-Security-Policy-Report-Only to audit a policy before enforcing it, which is essential for rollout on sites with inline scripts or third-party dependencies.

Strict-Transport-Security and the HTTPS Guarantee

HSTS tells browsers to only connect to your site over HTTPS, even if a user types http:// or clicks an HTTP link. This prevents SSL-stripping attacks where an attacker intercepts the initial HTTP request before the HTTPS redirect. The max-age directive (recommended: 31536000, one year) controls how long browsers enforce HTTPS. Adding includeSubDomains covers all subdomains, and preload qualifies your domain for browser HSTS preload lists — hardcoded into browser builds so even the first connection uses HTTPS.

Clickjacking, MIME Sniffing, and Other Headers

Clickjacking is an attack where a malicious page embeds your site in a transparent iframe and tricks users into clicking on hidden elements. X-Frame-Options prevents this by controlling iframe embedding — DENY blocks all framing while SAMEORIGIN allows only same-origin frames. Although CSP frame-ancestors provides more granular control, X-Frame-Options remains important for backward compatibility. X-Content-Type-Options: nosniff prevents browsers from guessing MIME types, blocking attacks where files with misleading extensions get executed as active content. Referrer-Policy controls how much URL information leaks to third-party sites — the recommended strict-origin-when-cross-origin sends full URLs for same-origin requests but only the origin for cross-origin ones. Permissions-Policy lets you disable unused browser APIs like camera, microphone, and geolocation, reducing your attack surface if the site is compromised.

Cookie Security Flags

Cookie attributes set via Set-Cookie are critical security controls. Secure ensures cookies are only sent over HTTPS, HttpOnly prevents JavaScript access (blocking XSS-based session theft), and SameSite controls cross-site cookie transmission for CSRF protection. Use SameSite=Lax for session cookies or SameSite=Strict for maximum security. All three flags should be set on every sensitive cookie, especially session identifiers and authentication tokens.

Grading Methodology

This tool evaluates eight categories with a weighted scoring system: CSP (25%), HSTS (20%), X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy, and cookie flags (10% each), plus additional cross-origin headers (5%). Each category receives a grade from A through F, and the overall score maps to a composite letter grade where A requires 90 or above. Use the Hash Generator to verify file integrity after downloading configurations, or the Base64 & Encoding Toolkit to decode encoded header values.

Link copied to clipboard!