You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- 📊 **CSP violation reporting** — built-in `/csp-report` endpoint using Reporting API v1
136
136
137
+
## Validate Your Headers
138
+
139
+
After deploying, test your security headers with:
140
+
141
+
-**[securityheaders.com](https://securityheaders.com/)** — Grades all response headers A+ through F. With the Strict A+ preset you should score **A+** immediately.
142
+
-**[Google CSP Evaluator](https://csp-evaluator.withgoogle.com/)** — Paste your `Content-Security-Policy` value to check for misconfigurations (missing `object-src`, `'unsafe-inline'` without nonce, missing `'strict-dynamic'`, etc.).
143
+
137
144
## Documentation
138
145
139
146
Full documentation: [github.com/MPCoreDeveloper/SafeWebCore/docs](https://github.com/MPCoreDeveloper/SafeWebCore/tree/master/docs)
Scans **all** response headers and grades your site **A+** through **F**. Validates HSTS, CSP, X-Frame-Options, Permissions-Policy, Referrer-Policy, and more.
259
+
260
+
> With SafeWebCore's Strict A+ preset you should score **A+** immediately.
4. All checks should be green with SafeWebCore's defaults
132
+
133
+
Google's CSP Evaluator checks for common misconfigurations like missing `object-src`, `'unsafe-inline'` without nonce, and missing `'strict-dynamic'`.
134
+
135
+
> 💡 **Tip:** Always validate with both tools after any CSP changes. See the [CSP Configuration Guide](csp-configuration.md#validate-your-csp) for detailed usage instructions.
0 commit comments