HTTP Headers Analyzer
7 / 10
https://www.previousnext.com.au
Website โ Amazon CloudFront โ Browser1 missing headers, 2 warnings, 4 notices
JSON API
Header
Value
Explanation
date
sun, 17 may 2026 19:58:45 gmt
The date and time at which the request was made. A browser uses it for age calculations rather than using its own internal date and time; e.g. when comparing against
Max-Age or Expires.content-encoding
br
Specifies how the resource is compressed. Not to be confused with
Warning Add a
Transfer-Encoding which specifies how the data is transferred.br means that the data is compressed with brotli.Warning Add a
Content-Length header. The Content-Length header is required, unless the message is transported using chunked encoding. Without a Content-Length header some servers will respond with 400 (bad request) or terminate connections early.etag
w/"1779019309"
A unique identifier that changes every time a page at a given URL changes. It acts as a fingerprint. A cache can compare
ETag values to see if the page has changed and has become stale. For example, a browser will send the ETag value of a cached page in an If-None-Match header. The web server compares the ETag value sent by the browser with the ETag value of the current version of the page. If both values are the same, the web server sends back a 304 Not Modified status and no body. This particular ETag value starts with W/ which means that it is a weak identifier; while unlikely, multiple pages might have the same identifier. Weak identifiers are used because strong identifiers can be difficult and costly to generate.cache-control
max-age=10800, public
public means the response may be stored by all caches, including browser caches, CDNs, and shared caches.max-age specifies the maximum amount of seconds a page is considered valid. The higher max-age, the longer a page can be cached.content-language
en
Specifies the page's intended audience. For example,
en-US means that the document is intended for English language speakers in the United States. The language tags are defined in RFC 5646.x-content-type-options
nosniff
The
The value
X-Content-Type-Options header prevents browsers from guessing a response's content type. Without it, browsers may interpret files differently than intended, which can lead to security vulnerabilities.The value
nosniff is correctly set.x-frame-options
sameorigin
X-Frame-Options prevents this URL from being embedded in an iframe. This protects against clickjacking attacks.sameorigin allows this page to be displayed in an iframe on the same origin. This is the recommended setting.expires
sun, 19 nov 1978 05:00:00 gmt
This
Notice Because there is a
PS: November 19th is my birthday! ๐
Expires date is in the past: the page is considered stale and will be removed from all caches.Notice Because there is a
Cache-Control header with a max-age and/or s-maxage directive, the Expires header will be ignored. Consider removing Expires to save bandwidth and processing power.PS: November 19th is my birthday! ๐
last-modified
sun, 17 may 2026 12:01:49 gmt
The date and time at which the origin server believes the page was last modified.
Notice Because there is an
Notice Because there is an
Etag header, Last-Modified is likely to be ignored. The ETag hash is more accurate than the date/time in Last-Modified. Consider removing Last-Modified to save bandwidth and processing power.x-xss-protection
1; mode=block
A legacy header that enables the browser's built-in cross-site scripting (XSS) filter. Modern browsers ignore it in favor of
Content-Security-Policy.1 enables XSS filtering.mode=block blocks the response entirely if an attack is detected, instead of sanitizing the page.content-security-policy
default-src 'self' bam.nr-data.net; connect-src 'self' analytics.google.com *.analytics.google.com *.google-analytics.com *.googletagmanager.com hello.myfonts.net stats.g.doubleclick.net www.google.com; font-src 'self' data: fonts.googleapis.com fonts.gstatic.com hello.myfonts.net; frame-src 'self' player.vimeo.com www.google.com www.googletagmanager.com www.youtube.com youtube.com; img-src 'self' *.google-analytics.com *.googletagmanager.com *.google.com.au *.siteimproveanalytics.io *.ytimg.com data: www.gstatic.com; object-src 'none'; script-src 'self' 'unsafe-inline' *.googletagmanager.com js-agent.newrelic.com player.vimeo.com ssl.google-analytics.com tagmanager.google.com www.google-analytics.com www.google.com www.gstatic.com www.youtube.com cdn.jsdelivr.net https://www.google.com; style-src 'self' 'unsafe-inline' tagmanager.google.com fonts.googleapis.com fonts.gstatic.com hello.myfonts.net data: cdn.jsdelivr.net; base-uri 'self'; frame-ancestors 'self'
The Content Security Policy (CSP) header helps prevent cross-site scripting (XSS), clickjacking, and other code injection attacks by specifying which dynamic resources are allowed to load.
Notice Consider adding the
Warning
default-src sets the default policy for fetching resources like JavaScript, images, CSS, fonts, AJAX requests, frames, HTML5 media.script-src specifies valid sources for JavaScript. This includes not only URLs loaded directly into <script> elements, but also things like inline script event handlers (onclick) and XSLT stylesheets which can trigger script execution.base-uri defines what URLs can be used in the <base> element.object-src defines what <object>, <embed> and <applet> elements are allowed to be loaded and executed.style-src defines what CSS stylesheets are allowed to be loaded.img-src defines what images and favicons can be loaded.font-src defines what fonts can be loaded using CSS's @font-face.frame-src defines what <frame> and <iframe> elements can be loaded.frame-ancestors defines what parents may embed a page using <frame>, <iframe>, <object>, <embed> or <applet>.Notice Consider adding the
upgrade-insecure-requests directive to automatically upgrade HTTP requests to HTTPS, helping to prevent mixed content issues.Warning
unsafe-inline in script-src allows execution of inline scripts, which effectively disables CSP's XSS protection. Consider using nonces or hashes instead.cache-tags
538c97,3d5f6f,eeade2,b3765e,64779b,51460a,f32d93,c3ed16,94677d,b6fe1b,4eff63,171bd9,e9be06,7897d3,ff4424,ff1736,60331b,42e5c0,b0ed2f,258a80,2525e5,2c0691,ca47df,02cf9a,015bd4,88ba0c,131300,f87122,0ff36f,d50676,7113da,e4456b,05b142,a6a7b9,2739fd,3c82a6,aff48b,c77d7c,07965f,313342,3b577a,08b6b7,8e3613,89653d,f1fc69,357b71,13becd,b3c9e6,d70e05,be9bc2,c35c45,3ff4c6,58a379,bf5892
permissions-policy
camera=(), microphone=(), geolocation=(), payment=(), usb=(), interest-cohort=()
Controls which browser features and APIs (camera, microphone, geolocation, payment, USB, etc.) this page and its embedded iframes are allowed to use. Each feature is set to an allowlist of origins; an empty list
() disables the feature entirely. This is a defense-in-depth measure: even if an attacker injects script via XSS, they cannot access the restricted APIs.x-permitted-cross-domain-policies
none
Instructs clients like Flash and Acrobat Reader what cross-domain policy they have to use.
none is the most secure setting. Data can't be shared across domains.cross-origin-opener-policy
same-origin-allow-popups
Controls whether other pages can access this page's
window object (and vice versa) when opened via window.open() or by navigating to a new page. Without this header, a malicious page could open your site and retain a reference to its window, enabling script-based attacks through the shared browsing context. Setting this to same-origin severs that link for cross-origin pages. Note: COOP governs top-level documents and popups, not iframes. Use X-Frame-Options or CSP frame-ancestors to control iframe embedding.same-origin-allow-popups isolates this page from cross-origin openers (like same-origin), but still allows popups opened by this page to retain a connection if the popup has COOP set to unsafe-none (any origin) or same-origin-allow-popups (same origin only). This is useful for pages that need to interact with OAuth or payment popups.cross-origin-resource-policy
cross-origin
Controls which origins are allowed to load this resource (e.g. embed this image, load this script). This prevents other sites from hotlinking your resources and is how a resource signals its consent to be loaded by pages that use
Notice
Cross-Origin-Embedder-Policy.Notice
cross-origin means the resource can be loaded by documents from any origin. This is the least secure option.feature-policy
geolocation 'none'; midi 'none'; notifications 'none'; push 'none'; microphone 'none'; camera 'none'; magnetometer 'none'; gyroscope 'none'; speaker 'self'; vibrate 'none'; fullscreen 'self'; payment 'none';
strict-transport-security
max-age=31536000
The
Strict-Transport-Security header (HSTS) instructs browsers to only use HTTPS for future connections to this domain, enhancing security by preventing downgrade attacks and cookie hijacking.max-age specifies the time, in seconds, that the browser should remember to use HTTPS only for this domain.referrer-policy
same-origin
When a visitor navigates from one page to another page, browsers often pass along referrer information. The
Referrer-Policy header controls how much referrer information a browser can share. This is important because private information can be embedded in the path or query string.same-origin means that the full URL (protocol, host, port, path and query string) is shared for same-origin requests. For cross-origin requests, no referrer information is shared at all.vary
cookie,accept-encoding
The
Vary header specifies a list of headers that must be considered when caching responses. For a cached response to be used, these headers must match between the cached response and the new request. This ensures that the appropriate version of a resource is served based on factors like language, encoding, or device type.x-cache
miss from cloudfront
The page was not served from Amazon CloudFront.
via
1.1 87e02820e63ff6cf9cd98d9efbaab1fc.cloudfront.net (cloudfront)
The
Via header tracks how a page is forwarded from proxy to proxy. Beware, not all proxies append themselves to the Via header.x-amz-cf-pop
iad55-p5
Amazon CloudFront's edge servers that were queried for the request. The first 3 letters are an IATA location code.
alt-svc
h3=":443"; ma=86400
The
alt-svc header tells the browser that the same content is available over a different protocol. This allows the browser to upgrade to a faster protocol (e.g. HTTP/3 over QUIC) on subsequent requests without a separate negotiation step.h3 indicates that HTTP/3 is supported. HTTP/3 uses the QUIC protocol (UDP-based) instead of TCP, which eliminates the TCP handshake delay and performs better on lossy networks. Variants like h3-29 refer to specific drafts of the HTTP/3 protocol.ma=86400 specifies that the alternative service information is fresh for 86400 seconds.x-amz-cf-id
jj9cjwqfi86lrhioz2kcvj84dygbxt8cswmihs3tzm5wf2wuyghfwg==
A unique request identifier generated by Amazon CloudFront. This ID can be used to troubleshoot the request and trace it through Amazon's network.
cross-origin-embedder-policy
missing Add a
Cross-Origin-Embedder-Policy header. It requires cross-origin resources to explicitly consent before this page can load them, protecting those resources from being exposed to Spectre-style timing attacks. Together with Cross-Origin-Opener-Policy, it enables cross-origin isolation and access to SharedArrayBuffer.