HTTP Headers Analyzer
5 / 10
https://weeblysetup12.bigcartel.com/product/gf
Website → CloudFlare → Browser5 missing headers, 2 warnings, 2 notices
The site is using a CDN, but the HTML page is not cached.
Header
Value
Explanation
date
wed, 15 jan 2025 08:37:46 gmt
The date and time at which the request was made. A browser uses it for age calculations rather than using its own internal date and time; e.g. when comparing against
Max-Age
or Expires
.connection
keep-alive
Specifies whether the network connection stays open after the current request.
keep-alive
specifies that the browser would like to keep the connection open, while close
indicates that the browser wants to close the connection.cache-control
max-age=0, private, must-revalidate
private
means the response can only be stored by the browser's cache, but not by CDNs, proxies, or any other shared caches.max-age=0
with must-revalidate
means caching is disabled and all requests must be validated with the origin server.content-security-policy
frame-ancestors https://my.bigcartel.com https://www.bigcartel.com https://bigcartel.com https://*.bc-site-staging.pages.dev http://localhost:3000
The Content Security Policy (CSP) header helps prevent cross-site scripting (XSS), clickjacking, and other code injection attacks by specifying which dynamic resources are allowed to load.
Notice Consider adding the
frame-ancestors
defines what parents may embed a page using <frame>
, <iframe>
, <object>
, <embed>
or <applet>
.Notice Consider adding the
upgrade-insecure-requests
directive to automatically upgrade HTTP requests to HTTPS, helping to prevent mixed content issues.referrer-policy
strict-origin-when-cross-origin
When a visitor navigates from one page to another page, browsers often pass along referrer information. The
Referrer-Policy
header controls how much referrer information a browser can share. This is important because private information can be embedded in the path or query string.strict-origin-when-cross-origin
means that the protocol, host, port, path and query string are shared for same-site requests. For cross-site requests, protocol, host, and port are shared, but only when the protocol security level remains the same (HTTP → HTTP, HTTPS → HTTPS). For cross-site requests where the protocol becomes less secure (HTTPS → HTTP), nothing is shared.set-cookie
_storefront_session=yycscq5znfwbgnvbgamyid3nhygpoajtqqbcism4zwzhkncfkmxzekhm%2b9kznyb9sygfkjz%2fgvkoqd9sogo6nbzpgxa6kdb81ufslwei9lk8t8kqq6jr3%2bwzmqdxgfyaqdzwm%2b5u6srmuvli9u8e7ehagbxzbx3gux4ssalb3k8qhc505guxm1qxagswtikmbtx3ehg4omr2bukdr90r3zrzi%2fjqpbhhlelmurtil8dmcy2gddpr0f2ykj4xby4t0xgy1jb%2bkv8wb2shhk3pjgamtbt9jmuzbc%2fjcjxhvveotfzc2vo%2f9bnigejqgtpbx1hdf7jlm0ubjogzyumxqt%2b4swqhlt9uweajsxhs6h3warlrcocckt71g1uadwwggrhivyk5e3uv4zqfbnkwh1%2feaq6x233ewuuhesqixxxyeeebhfwvjv%2bi2etdic0%3d--rbio9fg%2ffqmb4ayk--6yro%2btpvw4m4ebuelif50a%3d%3d; path=/; httponly
A cookie that was sent from the server to the browser.
path=
indicates the path that must exist in the requested URL for the browser to send the cookie.httponly
forbids JavaScript from accessing the cookie. Helps mitigate the risk of client side scripts accessing a protected cookie.set-cookie
_cfuvid=ln9bednobozu8amt0wmk4cijzamjm_1twox2vlf2ah0-1736930266513-0.0.1.1-604800000; path=/; domain=.bigcartel.com; httponly; secure; samesite=none
A cookie that was sent from the server to the browser.
Warning
domain=
sets the domain to which the cookie will be sent.path=
indicates the path that must exist in the requested URL for the browser to send the cookie.Warning
samesite=none
instructs the browser to send the cookie to all cross-site requests, such as on requests to load images or frames from other sites. This enables third-party sites to log cookie data. This could lead to data leaks and cross-site request forgery attacks. To improve security, set to samesite=strict
or samesite=lax
.secure
instructs the browser to only send the cookie back when HTTPS requests are used, making it more resistant to man-in-the-middle attacks.httponly
forbids JavaScript from accessing the cookie. Helps mitigate the risk of client side scripts accessing a protected cookie.x-content-type-options
nosniff
The
The value
X-Content-Type-Options
header, when set to nosniff
, prevents MIME type sniffing. This enhances security by ensuring browsers respect the declared Content-Type of the response, mitigating MIME confusion attacks.The value
nosniff
is correctly set, providing protection against MIME type sniffing attacks.x-download-options
noopen
Alters the download dialog by removing the "Open with" option. Only supported by Internet Explorer.
x-frame-options
allow-from https://my.bigcartel.com
X-Frame-Options
prevents this URL from being embedded in an iframe
. This protects against clickjacking attacks.allow-from
means that this page can be displayed in an iframe
but only on the listed URLs.Notice
allow-from
is deprecated. Use the Content-Security-Policy
header with the frame-src
directive.x-permitted-cross-domain-policies
none
Instructs clients like Flash and Acrobat Reader what cross-domain policy they have to use.
none
is the most secure setting. Data can't be shared across domains.x-request-id
ed64c86c-6df1-4227-8978-648665231fd6
A unique identifier for the HTTP request. This can be useful for tracking a request through complex systems or for debugging purposes.
x-runtime
0.018605
Indicates the time taken to generate the response on the server, typically in seconds. This can be useful for performance monitoring and debugging.
x-xss-protection
1; mode=block
This header enables the browser's built-in XSS protection. However, it's considered legacy and modern browsers may ignore it.
1
enables the browser's cross-site scripting (XSS) filtering.mode=block
instructs the browser to block the response if a XSS attack is detected, instead of sanitizing the page.cf-cache-status
dynamic
Warning The
dynamic
status indicates that Cloudflare did not cache the requested HTML page, similar to a "cache miss". By default, Cloudflare caches static assets such as images, CSS, and JavaScript but excludes HTML due to its dynamic nature. To cache HTML content, change the 'Cache Level' setting from dynamic
to cache everything
in Cloudflare. This adjustment allows HTML pages to be cached, leveraging Cloudflare's global network for faster and more efficient content delivery.server
cloudflare
cf-ray
90248bb5096e57fa-iad
The
cf-ray
header provides a unique identifier for each request through Cloudflare. It's useful for troubleshooting and tracking requests in Cloudflare logs.strict-transport-security
missing Add a
Strict-Transport-Security
header. The Strict-Transport-Security
header or HSTS header is used to instruct browsers to only use HTTPS, instead of using HTTP. It helps enforce secure communication.permissions-policy
missing Add a
Permissions-Policy
header. Restrict access to device features like the camera, microphone, location, accelerometer and much more.cross-origin-embedder-policy
missing Add a
Cross-Origin-Embedder-Policy
to specify how this page can be loaded by cross-origin resources.cross-origin-opener-policy
missing Add a
Cross-Origin-Opener-Policy
header to opt-in into better browser isolation.cross-origin-resource-policy
missing Add a
Cross-Origin-Resource-Policy
header to specify who can load this page.Questions or feedback? Email dries@buytaert.net.