๐Ÿ“‹

HTTP Header Checker

Learn about HTTP headers, security headers checklist and best practices

Share:

Essential Security Headers Checklist

\u25A1X-Frame-Options
\u25A1Content-Security-Policy
\u25A1Strict-Transport-Security
\u25A1X-Content-Type-Options
\u25A1X-XSS-Protection
\u25A1Access-Control-Allow-Origin
\u25A1Referrer-Policy
\u25A1Permissions-Policy
\u25A1Set-Cookie
\u25A1X-Powered-By
\u25A1Server

Content-Type

Specifies the media type of the response body (e.g., HTML, JSON, image).

Content-Type: application/json; charset=utf-8

Best Practice: Always set charset=utf-8 for text content. Use correct MIME types.

Cache-Control

Directives for caching in both requests and responses. Controls how and for how long content is cached.

Cache-Control: max-age=3600, public

Best Practice: Use max-age for static assets. Set no-store for sensitive pages. Immutable for versioned assets.

X-Frame-Options

Security

Prevents clickjacking by controlling whether the page can be framed.

X-Frame-Options: DENY

Best Practice: Set to DENY or SAMEORIGIN. Use Content-Security-Policy frame-ancestors instead for modern browsers.

Content-Security-Policy

Security

Controls which resources the browser is allowed to load. Prevents XSS, data injection attacks.

Content-Security-Policy: default-src 'self'; script-src 'self' cdn.example.com

Best Practice: Start with strict policy and relax as needed. Avoid 'unsafe-inline' and 'unsafe-eval'. Use nonces for inline scripts.

Strict-Transport-Security

Security

Forces browsers to use HTTPS for all future requests to this domain (HSTS).

Strict-Transport-Security: max-age=31536000; includeSubDomains; preload

Best Practice: Set max-age to at least 1 year. Include subdomains. Submit to HSTS preload list.

X-Content-Type-Options

Security

Prevents MIME type sniffing. Browser won't guess content type.

X-Content-Type-Options: nosniff

Best Practice: Always set to 'nosniff'. Prevents browsers from executing files with wrong MIME type.

X-XSS-Protection

Security

Enables browser's built-in XSS filtering (legacy, replaced by CSP).

X-XSS-Protection: 1; mode=block

Best Practice: Set to '0' and use CSP instead. Some modern browsers have deprecated this header.

Access-Control-Allow-Origin

Security

CORS header that specifies which origins can access the resource.

Access-Control-Allow-Origin: https://example.com

Best Practice: Never use * for credentialed requests. Whitelist specific origins. Validate Origin header server-side.

Access-Control-Allow-Methods

Specifies which HTTP methods are allowed in CORS preflight.

Access-Control-Allow-Methods: GET, POST, OPTIONS

Best Practice: Only allow methods you actually need. Don't include DELETE/PUT unless necessary.

Referrer-Policy

Security

Controls how much referrer information is sent with requests.

Referrer-Policy: strict-origin-when-cross-origin

Best Practice: Use strict-origin-when-cross-origin or no-referrer for privacy. Avoid unsafe-url.

Permissions-Policy

Security

Controls which browser features the page can use (camera, mic, geolocation, etc.).

Permissions-Policy: camera=(), microphone=(), geolocation=()

Best Practice: Disable features you don't use. Restrict to self for features you need.

Set-Cookie

Security

Sends a cookie from the server to the browser for session tracking.

Set-Cookie: session=abc123; Secure; HttpOnly; SameSite=Strict

Best Practice: Always use Secure, HttpOnly, SameSite flags. Set appropriate expiry. Don't store sensitive data.

ETag

Unique identifier for a specific version of a resource. Used for caching validation.

ETag: "33a64df551425fcc55e4d42a148795d9f25f89d4"

Best Practice: Use weak ETags for dynamic content. Strong ETags for static files. Combine with Cache-Control.

X-Powered-By

Security

Reveals the server technology (Express, PHP, ASP.NET, etc.).

X-Powered-By: Express

Best Practice: REMOVE this header in production. It reveals server technology to attackers.

Server

Security

Reveals the web server software being used.

Server: nginx/1.24.0

Best Practice: Remove or obscure version info. Set to generic value in production.

About HTTP Header Checker

HTTP Header Checker is a free online tool available on SabTools.in. Learn about HTTP headers, security headers checklist and best practices. This tool is completely free to use, requires no signup, and works instantly in your browser. Your data stays private as all calculations happen on your device.

How to use HTTP Header Checker?

  1. Enter the required values in the input fields above
  2. The results will be calculated automatically in real-time
  3. You can copy or share the results as needed

Why use SabTools.in?

  • 100% free โ€” no signup, no limits, no hidden fees
  • Lightning fast โ€” runs instantly in your browser
  • Privacy first โ€” your data never leaves your device
  • Mobile friendly โ€” works on any phone, tablet or computer
  • Made for India โ€” Indian number formats, GST, EMI & more

Frequently Asked Questions