Missing Content-Security-Policy
Identifies absent or overly permissive CSP headers that allow XSS and data injection attacks.
Free account required
Inspect HTTP security headers and detect missing CSP, HSTS, and clickjacking protections.
Fetches response headers from any URL and grades each security header against OWASP recommendations. Identifies missing protections, weak policy values, and CSP bypasses. Generates a report suitable for bug bounty submissions.
What it detects
Detection capabilities
Identifies absent or overly permissive CSP headers that allow XSS and data injection attacks.
Checks for HTTP Strict Transport Security including max-age value, includeSubDomains, and preload status.
Validates X-Frame-Options and CSP frame-ancestors directives against UI redressing attacks.
Flags headers that reveal server technology (Server, X-Powered-By) useful for fingerprinting.
Step-by-step guide
The tool sends a real HTTP request and captures all response headers including redirects.
Each header gets a pass/warn/fail rating with the actual value and recommended configuration.
Generate a formatted table suitable for inclusion in HackerOne or Bugcrowd bug reports.
Keep going
Find open redirects, SSRF indicators, and injection points in any URL.
Use tool →
Generate context-aware XSS, SQLi, SSRF, and SSTI payloads for security testing.
Use tool →
Discover hidden endpoints, admin paths, and API routes from any web application.
Use tool →