Valid CSP
- default-src 'self'; script-src 'self' cdn.example.com; object-src 'none'; frame-ancestors 'none'
web validator
Validate CSP headers client-side—check directives, missing values, and risky flags.
Ensures default-src is present.
Flags directives without values (except upgrade-insecure-requests and block-all-mixed-content).
Warns on script-src 'unsafe-inline'.
Identifies unknown directives.
CSP header
Paste the full Content-Security-Policy header. Keep hashes/nonces intact; avoid production secrets in sample values.
This CSP validator checks default-src presence, empty directives, and risky flags like 'unsafe-inline' entirely in your browser.
Use it to harden Content-Security-Policy headers pasted from DevTools or server configs before you deploy.
web
URL Validator
Validate HTTP/HTTPS URLs locally—parse host/path and catch malformed links before publishing or sending to APIs.
security
Hash Generator (MD5 / SHA1 / SHA256)
Generate MD5, SHA1, or SHA256 hashes locally—no data leaves your browser.
web
HTTP Security Headers Validator
Validate core security headers (HSTS, nosniff, frame options, referrer policy, permissions policy) entirely client-side.
web
CORS Header Validator
Validate CORS response headers locally—origins, methods, headers, credentials, and max-age.
All validation happens in your browser. No data is sent, logged, or stored.
Structure and basic risk checks only; does not fetch resources or verify hashes/nonces.