securityheaders's profile picture. Assess the security of your HTTP response headers.
Powered by @probely, created by @Scott_Helme.

Security Headers

@securityheaders

Assess the security of your HTTP response headers. Powered by @probely, created by @Scott_Helme.

고정된 트윗

We're happy to announce that Security Headers will be joining @probely! Read more from our founder, @Scott_Helme, in his blog post: scotthelme.co.uk/security-heade…


For the first time in a long time, we've just updated our Grading Criteria. You can read the full details from our founder, @Scott_Helme, over on the @probely blog: probely.com/blog/a-balance…


Security Headers 님이 재게시함

This is something I've wanted to dig into for years but I've just never had the time to do it! A deep analysis into the @securityheaders scan data, now possible thanks to our partnership with @probely 😎 probely.com/blog/unveiling…


Did somebody say Security Headers?! 💙

Look who I saw at the @AppSec_Village ??? My favorite security headers fan, @Scott_Helme !!!

shehackspurple's tweet image. Look who I saw at the @AppSec_Village  ??? My favorite security headers fan, @Scott_Helme  !!!


Security Headers 님이 재게시함

Can anyone tell me the story behind the HSTS max-age value on Amazon? 🤔 There’s got to be a reason behind that! @amazon @AWSSecurityInfo @securityheaders securityheaders.com/?q=amazon.com&…


We’re at @BlackHatEvents with @probely! 🔒 Stop by booth #1486, try out a free scan of your website, grab some cool swag and meet our founder @Scott_Helme 😎 prbly.us/3Ow4qNi

securityheaders's tweet image. We’re at @BlackHatEvents with @probely! 🔒

Stop by booth #1486, try out a free scan of your website, grab some cool swag and meet our founder @Scott_Helme 😎

prbly.us/3Ow4qNi

Security Headers 님이 재게시함

Come and find us at @NDC_Conferences Oslo for our first ever vendor exhibit! Meet our founder, see a product demo, enter our hacking competition or watch our artist create your swag live on the stand! It's going to be epic, we'll see you there 😎 report-uri.com/event/ndc_oslo…


Security Headers 님이 재게시함

Safari 16.4 is bringing support for the Reporting API! This means reports can be sent out-of-band asynchronously, and, we’re getting some new reports too. ✅ Reporting API ✅ COEP violation reporting ✅ COOP/COEP nav violation reporting webkit.org/blog/13966/web…


Security Headers 님이 재게시함

A few people reached out to say they couldn't get their corporate card or approval in time so I've extended this code for another 7 days! Apparently when you work for a company there's like "processes" and stuff! Who knew?! 😅 Use 15FORLIFE at checkout to get 15% off for life!!


Security Headers 님이 재게시함

This is really interesting research and I wanted to know if I could expand upon it using Content Security Policy and reporting via @reporturi. I've just created inappbrowsercsp.com to do exactly that!

🔥 New Post: Announcing InAppBrowser - see what JavaScript commands get injected through an in-app browser 👀 TikTok, when opening any website in their app, injects tracking code that can monitor all keystrokes, including passwords, and all taps. krausefx.com/blog/announcin…

KrauseFx's tweet image. 🔥 New Post: Announcing InAppBrowser - see what JavaScript commands get injected through an in-app browser

👀 TikTok, when opening any website in their app, injects tracking code that can monitor all keystrokes, including passwords, and all taps.

krausefx.com/blog/announcin…


Security Headers 님이 재게시함

I'm considering changing the grading criteria on @securityheaders to allow an A+ grade with a CSP that contains unsafe-inline in the style-src directive. What are your thoughts?


Security Headers 님이 재게시함

1 TRILLION REPORTS!!!1!!1! 🌟✨🥳🥂🍾

Scott_Helme's tweet image. 1 TRILLION REPORTS!!!1!!1! 🌟✨🥳🥂🍾

150,000,000+ scans?! A huge thanks to our sponsor @probely who have supported us through this milestone and made it possible! 😱💪🔥🎉❤🌍🔒

securityheaders's tweet image. 150,000,000+ scans?! A huge thanks to our sponsor @probely who have supported us through this milestone and made it possible!
😱💪🔥🎉❤🌍🔒

We're *fast* approaching 150,000,000 scans!!! Big thanks to our sponsor @probely, who continue to support us and make this all possible 🤩


We will now maintain a public list of our origin server IP addresses for both IPv4 and IPv6 scans: securityheaders.com/.well-known/ip… securityheaders.com/.well-known/ip…


A *huge* thanks to @probely for their continued sponsorship which allows for development work on new features like this and our ongoing operation as a free service ❤


We've powered through 110,000,000+ free scans and we're super grateful to have @probely sponsoring us again this month! Check them out and say thanks probely.com/r/hS7 🌍🔒💚

securityheaders's tweet image. We've powered through 110,000,000+ free scans and we're super grateful to have @probely sponsoring us again this month! Check them out and say thanks probely.com/r/hS7
🌍🔒💚

Loading...

Something went wrong.


Something went wrong.