HTTP Headers Analyzer
6 / 10
  https://seonews1395.blogspot.com
Website → Browser7 missing headers, 1 warnings, 2 notices
Header
    Value
    Explanation
  content-security-policy
    upgrade-insecure-requests
    The Content Security Policy (CSP) header helps prevent cross-site scripting (XSS), clickjacking, and other code injection attacks by specifying which dynamic resources are allowed to load.
  upgrade-insecure-requests instructs browsers to replace insecure URLs (HTTP) with secure URLs (HTTPS).content-security-policy-report-only
    default-src https: blob: data: 'unsafe-inline' 'unsafe-eval'; report-to blogspot; report-uri https://www.blogger.com/cspreport
    Allows web developers to debug content security policies. Violations are reported to the specified 
  report-uri, but not enforced.report-to
    {"group":"blogspot","max_age":2592000,"endpoints":[{"url":"https://www.blogger.com/cspreport"}]}
    This header is part of the Reporting API specification. They are used to configure the reporting of network errors and other issues to a specified endpoint.
The
  The
Report-To header specifies where reports should be sent.group defines the reporting group. Groups allow reports to be grouped logically; e.g. there could be a group for network errors and a second group for browser feature deprecation reports.max_age defines the number of seconds the browser should remember these settings. Prevents the browser from having to parse the JSON on each request.endpoints defines one or more URLs where the reports need to be send to. Multiple URLs can be specified for failover and load-balancing. Endpoints can be assigned a weight to distribute load, with each endpoint receiving a specified fraction of the reporting traffic. Endpoints can also be assigned a priority to set up fallback collectors.expires
    thu, 30 oct 2025 19:11:28 gmt
    The date and time after which the page should be considered stale and all caches should be refreshed.
Notice Because there is a
  Notice Because there is a
Cache-Control header with a max-age and/or s-maxage directive, the Expires header will be ignored. Consider removing Expires to save bandwidth and processing power.date
    thu, 30 oct 2025 19:11:28 gmt
    The date and time at which the request was made. A browser uses it for age calculations rather than using its own internal date and time; e.g. when comparing against 
  Max-Age or Expires.cache-control
    private, max-age=0
    private means the response can only be stored by the browser's cache, but not by CDNs, proxies, or any other shared caches.max-age specifies the maximum amount of seconds a page is considered valid. The higher max-age, the longer a page can be cached.Warning Because
max-age is set to 0 seconds and no s-maxage is set, nothing will be cached in browsers or shared caches. Caching is effectively disabled!last-modified
    sun, 08 sep 2024 11:51:56 gmt
    The date and time at which the origin server believes the page was last modified.
Notice Because there is an
  Notice Because there is an
Etag header, Last-Modified is likely to be ignored. The ETag hash is more accurate than the date/time in Last-Modified. Consider removing Last-Modified to save bandwidth and processing power.etag
    "8087363f-6fcd-43bc-b4cc-9c18310a55c9"
    A unique identifier that changes every time a page at a given URL changes. It acts as a fingerprint. A cache can compare 
  Etag values to see if the page has changed and became stale. For example, a browsers will send the ETag value of a cached page in an If-None-Match header. The web server compares the ETag value sent by the browser with the ETag value of the current version of the page. If both values are the same, the web server sends back a 304 Not Modified status and no body.x-content-type-options
    nosniff
    The 
The value
  X-Content-Type-Options header, when set to nosniff, prevents MIME type sniffing. This enhances security by ensuring browsers respect the declared Content-Type of the response, mitigating MIME confusion attacks.The value
nosniff is correctly set, providing protection against MIME type sniffing attacks.x-xss-protection
    1; mode=block
    This header enables the browser's built-in XSS protection. However, it's considered legacy and modern browsers may ignore it.
  1 enables the browser's cross-site scripting (XSS) filtering.mode=block instructs the browser to block the response if a XSS attack is detected, instead of sanitizing the page.content-length
    0
    The size of the message body, in bytes.
  server
    gse
    
  alt-svc
    h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
    The 
  alt-svc header advertises alternative services for accessing the same resource, enabling protocol negotiation and potential performance improvements.h3 indicates that HTTP/3 is supported. Variants like h3-29 refer to specific drafts of the HTTP/3 protocol.ma=2592000 specifies that the alternative service information is fresh for 2592000 seconds.ma=2592000 specifies that the alternative service information is fresh for 2592000 seconds.strict-transport-security
    
    missing Add a 
  Strict-Transport-Security header. The Strict-Transport-Security header or HSTS header is used to instruct browsers to only use HTTPS, instead of using HTTP. It helps enforce secure communication.referrer-policy
    
    missing Add a 
  Referrer-Policy header. When a visitor navigates from one page to another, browsers often pass along referrer information. The Referrer-Policy header controls how much referrer information a browser can share. This is important to configure when private information is embedded in the path or query string and passed onto an external destination.permissions-policy
    
    missing Add a 
  Permissions-Policy header. Restrict access to device features like the camera, microphone, location, accelerometer and much more.cross-origin-embedder-policy
    
    missing Add a 
  Cross-Origin-Embedder-Policy to specify how this page can be loaded by cross-origin resources.cross-origin-opener-policy
    
    missing Add a 
  Cross-Origin-Opener-Policy header to opt-in into better browser isolation.cross-origin-resource-policy
    
    missing Add a 
  Cross-Origin-Resource-Policy header to specify who can load this page.x-permitted-cross-domain-policies
    
    missing Add a 
  X-Permitted-Cross-Domain-Policies header to prevent Flash, Adobe Reader and other clients from sharing data across domains.Questions or feedback? Email dries@buytaert.net.