Security Headers Test Page

1. X-Frame-Options Test

This iframe should be blocked if X-Frame-Options: DENY or SAMEORIGIN

https://example.com | No X-Frame-Options | No CSP
http://www.httpforever.com | Mixed Content Violation
https://www.fakeorca.com | Disabled=Displayed | Enabled=Blocked

2. X-Content-Type-Options Test

❌ This test is not applicable. This static page does not handle file uploads or serve user-generated content, so there is no risk of MIME type sniffing. This protection is relevant when browsers might incorrectly interpret a file's content type, which can lead to security issues if the file is treated as executable. In this context, all content types are static and controlled by the server.

3. Content-Security-Policy Test

Category 1: External Script Injection — Attacker attempts to execute malicious JavaScript by exploiting how the website loads external script, either directly or through misconfigurations.

Attack Vectors:


Test Case 2: Clickjacking / UI Redress - A deceptive technique where an attacker tricks user into clicking on somethings they didnt intend to by overlaying a fake interface (e.g. Click to Win) on top of a legitimate website loaded in a transparent iframe. Though users think they are interacting with the visible UI, their clicks are actually being redirected to underlying elements such as 'confirm' buttons, purchase links or sensitive settings.
🎁 $100 Voucher!

Test Case 3: Third-Party Resource Compromise - This attack target websites that rely on external JavaScript resources; Typically loaded from CDN, analytic services or UI libraries(e.g. jQuery, Bootstrap). If any of these third-party servers are compromised, attackers can inject malicious code into every website that include their scripts.

✅ Applicable

Test Case 4: [Medium Likelihood] Use of eval()/new function() - The use of JavaScript functions like eval() and new Function() to run code from the URL can introduce serious security vulnerabilities. These functions execute strings as code, and when user input is passed directly into them without validation, attackers can inject and execute malicious scripts in the browser. This leads to DOM-based Cross-Site Scripting (XSS) — a client-side attack that doesn’t require any server processing. The risk becomes critical when the website's Content-Security-Policy (CSP) allows unsafe-eval, which explicitly permits such dangerous behavior. This pattern is often found in static or single-page applications where developers use dynamic logic for things like UI customization.

✅ Applicable

Test Case 5: [Medium Likelihood] Malicious iframe injection - An attacker injects an iframe pointing to a phishing or malicious page to trick users or steal session data.
POC: Enter example here


Test Case 6: [Medium Likelihood] Form Action Hijack - A form’s action attribute is changed to submit data (e.g., credentials) to an attacker-controlled endpoint.
POC: Enter example here


Test Case 7: [Medium Likelihood] Data Exfil via img, fetch, or XHR - Sensitive data is extracted from the page and exfiltrated to an external domain using image loads or background requests.
POC: Enter example here


Test Case 8: [Medium Likelihood] Object Tag Exploitation - Embedding legacy plugins (like Flash or PDF viewers) with object tags may enable attacks if they load unsafe content.
POC: Enter example here


Test Case 9: [High Likelihood] Inline Script Injection (DOM-based XSS) - Unsanitized content from the URL (e.g., hash or query string) is injected directly into the DOM and executed as JavaScript.
POC: https://www.fakeorca.com/static#<script>alert('XSS Successful!')</script>

4. Referrer-Policy Test

This test illustrates how the Referrer-Policy header controls the amount of referrer information included in outbound requests. Submit the form below to observe what referrer details are exposed in the request sent to the target.



5. X-Permitted-Cross-Domain-Policies Test

❌ This test is not applicable. This is a static page that does not use Flash, Silverlight, or any plugin-based content. It does not serve crossdomain policy files like crossdomain.xml, nor does it load external resources through legacy plugins. The protection controlled by this setting is only relevant when such plugins are used to access data from another domain. Modern websites use CORS and CSP instead, making this check unnecessary.