Valid set
- Strict-Transport-Security: max-age=63072000; includeSubDomains
- X-Content-Type-Options: nosniff
- X-Frame-Options: SAMEORIGIN
- Referrer-Policy: strict-origin-when-cross-origin
web validator
Validate core security headers (HSTS, nosniff, frame options, referrer policy, permissions policy) entirely client-side.
Requires Strict-Transport-Security with max-age (optionally includeSubDomains/preload).
X-Content-Type-Options must be nosniff.
X-Frame-Options should be DENY or SAMEORIGIN.
Referrer-Policy should be a recognized value.
Permissions-Policy is checked for basic structure when present.
HTTP response headers
Paste raw headers from curl/DevTools (one per line). Keep sensitive info out; this runs locally.
This HTTP security headers validator checks HSTS, nosniff, frame options, referrer, and permissions policy values entirely in your browser.
Use it to QA headers from DevTools or curl before deploying or configuring CDN/edge overrides.
All validation happens in your browser. No data is sent, logged, or stored.
Header syntax checks only; does not measure actual transport security or TLS configuration.