Defense in depth. HTTP response headers are the thinnest, easiest-to-configure layer of application defenses: emitted by the web server or application middleware, zero performance cost, immediate impact. CSP alone prevents the vast majority of reflected and DOM-based XSS, HSTS closes the TLS downgrade window, X-Frame-Options blocks clickjacking, Permissions-Policy disables unused browser APIs (camera, microphone, geolocation, USB) reducing the attack surface.
What this tool actually checks. 12 header families, from essentials (CSP, HSTS, X-Frame-Options, X-Content-Type-Options) to modern ones (COOP/COEP/CORP for cross-origin isolation), with specific rules for each: directives that must be present, directives that must NOT be present (e.g. CSP unsafe-inline), correct value format, minimum values (e.g. HSTS max-age >= 15768000 = 6 months), interactions between headers (e.g. X-XSS-Protection deprecated when CSP is present).
Standards mapping. Each finding cites its applicable reference: NIS2 EU Directive 2022/2555 art. 21 c.2 lett. e (security in acquisition / development / maintenance), OWASP Top 10 + ASVS V14, Mozilla Web Security Cheatsheet, RFC 6797 (HSTS), W3C CSP Level 3. For organizations subject to NIS2 this is the starting point of an application-layer audit.
Privacy by design. No upload, no remote fetch. The analysis is entirely: your browser parses your headers, evaluates them against local rules, displays the findings. The site you're auditing is never contacted by our server. Useful for auditing internal systems, staging environments not exposed externally, intranet applications.