Free Security Headers Checker
Analyze your website's HTTP security headers in seconds. Get an A-F grade with actionable recommendations.
Analyzing security headers...
Fetching and evaluating 7 HTTP security headers.
7 Headers We Analyze
Each header protects against a different class of attack. Here's what we check and why it matters.
Strict-Transport-Security
HSTSForces HTTPS connections, preventing protocol downgrade attacks and cookie hijacking. A must-have for any site handling sensitive data.
Content-Security-Policy
CSPControls which resources browsers can load, providing the strongest defense against XSS and data injection attacks.
X-Frame-Options
ClickjackingPrevents your site from being embedded in iframes on malicious pages, blocking clickjacking attacks.
X-Content-Type-Options
MIME SniffingStops browsers from guessing content types, preventing attackers from tricking browsers into executing malicious files.
Permissions-Policy
Feature ControlRestricts which browser features (camera, microphone, geolocation) your site can access, reducing attack surface.
Referrer-Policy
PrivacyControls how much URL information is shared when users navigate away, protecting sensitive paths and query strings.
X-XSS-Protection
LegacyA deprecated header that once activated browser XSS filters. Modern best practice is to rely on CSP instead. We check you're not misconfiguring it.
Get Your Full Security Headers Report
Weekly tips on security headers, CSP configuration, and web hardening best practices.
Frequently Asked Questions
What are HTTP security headers?
HTTP security headers are directives sent by your web server that tell browsers how to handle your content securely. They protect against common attacks like clickjacking, XSS, MIME sniffing, and protocol downgrades. Most take only a few minutes to configure.
How do I add security headers?
In Nginx, use add_header directives in your server block. In Apache, use Header set in .htaccess. In Laravel, create middleware that sets headers on responses. CDNs like Cloudflare also support configuring headers through their dashboard.
What grade should I aim for?
Aim for at least a B. An A requires all 7 headers properly configured, including Content-Security-Policy which can be complex to set up. Start with the quick wins: HSTS, X-Frame-Options, X-Content-Type-Options, and Referrer-Policy can all be added in minutes.
Is Content-Security-Policy difficult to set up?
CSP can be complex for sites with many third-party scripts. Start with Content-Security-Policy-Report-Only to see what would be blocked without breaking anything. Once you understand your site's requirements, switch to enforcing mode.
Does this tool access my private data?
No. We send a single standard HTTP GET request — exactly what any browser does when visiting your site. We only read the response headers. We don't scan for vulnerabilities, test login forms, or access non-public resources.
How is this different from the free scanner?
The free scanner checks for Laravel-specific issues like debug mode, exposed .env files, and missing headers. This tool provides a deep-dive specifically on security headers with per-header grading and fix recommendations.
Related Security Resources
Free Laravel Scanner
Check for debug mode, exposed .env files, and more in your Laravel application.
How to Fix Security Headers
Step-by-step guide to configuring all essential security headers for Nginx, Apache, and Laravel.
All Security Checks
Explore the 30+ security checks StackShield runs on your application continuously.
Monitor Headers Continuously
Headers can regress after deployments. StackShield monitors your security headers (and 29 other checks) automatically and alerts you when something changes.
No credit card required. 14-day free trial on all plans.