Skip to content

alexladwong/headerhunter_v2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

headerhunter_v2

CleanShot 2025-10-08 at 19 08 48@2x

Breakdown of Results

  1. Warnings in the Output The InsecureRequestWarning messages are not about your site's security, but about the tool's configuration. HeaderHunter is temporarily disabling SSL certificate verification to avoid errors during scanning. This doesn't affect the results.

  2. Security Headers Analysis (The Green Checkmarks ✅) These headers are properly configured and strong:

Strict-Transport-Security: Strong (with preload) ✅ - Perfect! You're forcing HTTPS for all users, including future ones, and are committed to the preload list. This is the most important header.

X-Content-Type-Options: nosniff ✅ - Effectively blocks MIME-sniffing attacks.

X-Frame-Options: DENY ✅ - Perfect! This completely blocks your site from being framed, mitigating clickjacking.

Referrer-Policy: same-origin ✅ - Good. Controls referrer leakage to your origin only.

Cross-Origin-Opener-Policy: same-origin ✅ - Excellent. This isolates your page from other origins, preventing cross-origin attacks.

  1. The "Needs Improvement" Header (Yellow ) Content-Security-Policy: Present () - Your CSP is basic. upgrade-insecure-requests is good for forcing HTTPS on all resources, but it doesn't provide the real security benefits of a full CSP, which is to block unauthorized scripts (XSS). This is why it didn't get a full "Strong" rating.

  2. The Missing Header (Red X ❌) Permissions-Policy: Missing ❌ - This is a newer header that controls which browser features (camera, microphone, geolocation, etc.) your site can access. While not as critical as the others, it's a best practice for privacy and security.

  3. Subdomain & CORS Results The tool found no vulnerable subdomains. This is great! It means common subdomains like api., admin., dev. either don't exist or also have strong headers.

The tool found no CORS misconfigurations. This is also great! It means your server isn't incorrectly allowing other websites to read its responses, which could lead to data leakage.

About

Cybersecurity Analytic Tools

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors