From security-headers-analyzer
Analyzes HTTP/HTTPS security headers for vulnerabilities, misconfigurations, OWASP compliance, cookie issues, and info leaks. Assigns grades and suggests Nginx/Apache/Cloudflare fixes.
npx claudepluginhub jeremylongshore/claude-code-plugins-plus-skills --plugin security-headers-analyzerThis skill is limited to using the following tools:
Evaluate HTTP response headers for web applications against OWASP Secure Headers Project recommendations and browser security baselines. Identify missing, misconfigured, or information-leaking headers across both HTTP and HTTPS responses.
Validates HTTP security headers in web app responses, identifies issues like missing CSP or HSTS, rates posture, checks OWASP compliance, and suggests fixes for XSS, clickjacking, and MIME sniffing.
Analyzes HTTP security headers for a given URL with context-aware grading on exploitable risks, WHY explanations, and exact fix commands. Ideal for web security reviews.
Audits HTTP security headers including CSP, HSTS, X-Frame-Options, and Cookie attributes using curl scripts and tools like SecurityHeaders.com to identify missing or misconfigured web protections.
Share bugs, ideas, or general feedback.
Evaluate HTTP response headers for web applications against OWASP Secure Headers Project recommendations and browser security baselines. Identify missing, misconfigured, or information-leaking headers across both HTTP and HTTPS responses.
${CLAUDE_SKILL_DIR}/security-reports/ for persisting resultshttps://. For batch analysis, accept a newline-separated list.WebFetch for both HTTP and HTTPS endpoints. Record the full redirect chain and final destination URL.Strict-Transport-Security: require max-age>=31536000, includeSubDomains, and preload eligibilityContent-Security-Policy: check for unsafe-inline, unsafe-eval, overly broad default-src, and missing frame-ancestorsX-Frame-Options: require DENY or SAMEORIGINX-Content-Type-Options: require nosniffPermissions-Policy: verify camera, microphone, geolocation restrictionsReferrer-Policy: recommend strict-origin-when-cross-origin or no-referrerCross-Origin-Embedder-Policy (COEP), Cross-Origin-Opener-Policy (COOP), Cross-Origin-Resource-Policy (CORP)Server, X-Powered-By, X-AspNet-Version, and any header revealing technology stack or version numbers.Set-Cookie headers: verify Secure, HttpOnly, SameSite=Lax|Strict, and __Host-/__Secure- prefix usage.See ${CLAUDE_SKILL_DIR}/references/implementation.md for the five-phase implementation workflow.
Set-Cookie header| Error | Cause | Solution |
|---|---|---|
| Failed to connect to domain | DNS resolution failure, firewall block, or domain down | Verify domain spelling and DNS records; test alternate protocols |
| SSL certificate verification failed | Expired, self-signed, or mismatched certificate | Note TLS issue in report; indicates HSTS not properly enforced |
| Too many redirects | Redirect loop between HTTP and HTTPS | Report the redirect chain and analyze headers at each hop |
| HTTP 429 Too Many Requests | Rate limiting by target server | Implement backoff; queue domain for delayed re-analysis |
| Headers differ between HTTP and HTTPS | Inconsistent server configuration | Report both sets; highlight critical differences and flag HSTS gap |
https://claudecodeplugins.io and explain any CSP or HSTS issues."example.com on both HTTP and HTTPS and provide an Nginx remediation config."${CLAUDE_SKILL_DIR}/references/errors.md -- full error handling reference${CLAUDE_SKILL_DIR}/references/examples.md -- additional usage examples