Free security headers scanner — check HTTP response headers and fix vulnerabilities on your website
This free security headers scanner fetches any website directly from our server and analyses all HTTP response headers against a comprehensive security checklist. It evaluates nine key areas — CSP, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy, HTTPS transport, X-XSS-Protection, and server information exposure — and produces a score from 0 to 100 with a letter grade from A+ to F. Results are instant because everything runs on our server with no external dependencies.
Security headers are the fastest and cheapest security improvements you can make to a website. Most headers require adding a single line to your server configuration and cost zero performance overhead. Yet many websites — including large, well-known ones — still score C or below, leaving their users exposed to clickjacking, cross-site scripting, MIME sniffing attacks, and unwanted information leakage.
Every failing test includes a specific, actionable recommendation showing exactly what header value to add. After implementing the fixes, re-run the scan to verify your changes. Achieving an A grade typically takes under 30 minutes for a developer familiar with their server configuration.
Security header examples — correct configurations, common mistakes, and how to fix them
All six key security headers are present and correctly configured. HSTS with preload ensures HTTPS forever. CSP restricts script sources. X-Frame-Options blocks clickjacking. nosniff stops MIME sniffing. Referrer-Policy limits URL leakage. Permissions-Policy restricts browser feature access. This configuration scores A+.
A site without these three headers is vulnerable to XSS injection, clickjacking attacks, and MIME sniffing. Adding them in a single Nginx server block takes under five minutes and immediately improves the grade from F to B or higher.
Exposing server software versions tells attackers exactly which CVEs to target. These are trivially removed — ServerTokens Prod in Apache, server_tokens off in Nginx, expose_php = Off in PHP. Takes 2 minutes and immediately reduces your attack surface.
Frequently asked questions about HTTP security headers
Need a disposable email address?Stop exposing your real inbox — get a free instant throwaway email with no signup and no trace.
Get Free Temp Mail →