Security Headers Scanner
Automated weekly validation of your security headers configuration with zero code implementation required.
Key features
No JWT token required
Works independently of CSP monitoring
Automatic weekly scans
Email notifications for header issues
Step-by-Step Setup
Create Page Monitor
Go to Monitor > Pages in the console
Click "+ New Page Monitor"
Configure the page information:
Name:
Monitor my Checkout PageDescription: Description of your payment page
Base URL:
https://your-site.com/checkout(your payment page)URL patterns: NOT REQUIRED for Security Headers scanning
Activate Security Headers Monitoring
Navigate to your page configuration
Click the toggle "Set Up Headers"
Select the security headers you want to monitor (up to 16 available). For more information about our available headers please go to Supported Security Headers
Configure expected values for each header
Configure notifications:
Add email addresses that will receive alerts
The account owner's email is automatically included
Save the configuration
Supported Security Headers
Content-Security-Policy (CSP)
Controls script, style, iframe loading policy (XSS, skimming, MITM protection)
Content-Security-Policy-Report-Only
CSP testing mode (sends violation reports without blocking)
Report-To
Defines endpoint for CSP violation reports
Reporting-Endpoints
Latest version for centralizing security reports (CSP, COOP, CORP, etc.)
Cross-Origin-Embedder-Policy (COEP)
Isolates resources and documents to prevent Spectre-like attacks
Cross-Origin-Opener-Policy (COOP)
Restricts cross-origin window communication
Cross-Origin-Resource-Policy (CORP)
Prevents cross-origin resources from being loaded by other domains
Origin-Agent-Cluster
Origin isolation in modern browsers
Strict-Transport-Security (HSTS)
Enforces HTTPS usage and prevents HTTP downgrade
Upgrade-Insecure-Requests
Forces browsers to convert HTTP requests to HTTPS
Permissions-Policy
Restricts browser APIs (e.g., geolocation, camera, microphone)
Referrer-Policy
Controls Referer information exposed in outgoing requests
X-Frame-Options
Prevents site loading in malicious iframes (clickjacking protection)
X-Content-Type-Options
Prevents MIME sniffing attacks
X-XSS-Protection
Configures browser XSS filters
X-Permitted-Cross-Domain-Policies
Restricts Flash/Adobe data access
Configuration Example
During setup, select the header to configure ann assign the expected value:
Last updated
Was this helpful?