Security Headers Checker API | OWASP Audit avatar

Security Headers Checker API | OWASP Audit

Pricing

from $7.00 / 1,000 results

Go to Apify Store
Security Headers Checker API | OWASP Audit

Security Headers Checker API | OWASP Audit

Audit OWASP security headers in bulk, grade each site, and monitor header drift across client or product portfolios.

Pricing

from $7.00 / 1,000 results

Rating

0.0

(0)

Developer

太郎 山田

太郎 山田

Maintained by Community

Actor stats

0

Bookmarked

2

Total users

1

Monthly active users

6 days ago

Last modified

Share

Bulk-audit websites for OWASP-recommended security headers. Get an A-F grade for each site with specific fix recommendations. Track changes between runs.

Store Quickstart

  • Start with store-input.example.json to validate grading and output shape on three known URLs.
  • If that matches your workflow, switch to store-input.templates.json and pick one of:
    • Quickstart (Dataset) for a cheap first run
    • Batch Audit for broader site portfolios
    • Weekly Compliance Monitor for recurring audits with snapshots
    • Webhook Alert for automated compliance notifications

The Store example keeps the first run small and deterministic while still returning the full scoring structure.

Who gets value fastest?

TeamWhy
Security teamsCatch header regressions before or after releases
Agencies / MSPsAudit many client sites on a repeatable schedule
Platform teamsTrack hardened baselines across product domains

What does this actor do?

Sends a simple HTTP HEAD request to each URL and evaluates 10 OWASP-recommended security headers. Each site gets a score (0-100) and grade (A-F) with actionable fix suggestions.

Key Features

  • 🛡️ 10 OWASP headers checked — HSTS, CSP, X-Frame-Options, Referrer-Policy, and more
  • 📊 Security scoring — 0-100 with A-F grade per site
  • 💡 Fix recommendations — Exact header values to add (e.g., Strict-Transport-Security: max-age=31536000)
  • 🔄 Change tracking — Detects grade/score changes between runs
  • 📋 Bulk processing — Check up to 200 URLs per run
  • 🪝 Webhook + CI/CD — Use in security pipelines

Suggested recurring monitoring cadence

  • Weekly portfolio sweeps using snapshotKey to track score drift
  • Release-day checks on staging or production domains before rollout sign-off
  • Webhook delivery for only the domains that regress and need action
  • Pair with dns-dmarc-security-checker for domain-level email security posture
  • Pair with ssl-certificate-monitor for expiry and issuer monitoring
  • Use the trio as a recurring compliance workflow for client or internal portfolios

Headers Checked

HeaderWeightWhy It Matters
Strict-Transport-Security (HSTS)20Forces HTTPS
Content-Security-Policy (CSP)20Prevents XSS
X-Content-Type-Options10Prevents MIME sniffing
X-Frame-Options10Prevents clickjacking
Referrer-Policy10Controls referrer leakage
Permissions-Policy10Restricts browser features
X-XSS-Protection5Legacy XSS filter
Cross-Origin-Opener-Policy5Isolates browsing context
Cross-Origin-Resource-Policy5Controls resource sharing
X-DNS-Prefetch-Control5Controls DNS prefetching

Input Example

{
"urls": ["https://google.com", "https://github.com", "https://example.com"],
"followRedirects": true,
"concurrency": 5
}

Output Example

{
"url": "https://github.com",
"score": { "total": 75, "grade": "B" },
"statusCode": 200,
"headers": {
"strict-transport-security": "max-age=31536000; includeSubdomains; preload",
"x-frame-options": "deny",
"x-content-type-options": "nosniff"
},
"score": {
"total": 75,
"grade": "B",
"details": [
{ "header": "strict-transport-security", "status": "pass", "points": 20 },
{ "header": "content-security-policy", "status": "missing", "points": 0, "note": "Missing. Add a Content-Security-Policy header" }
]
}
}

A fuller ready-to-share payload is available in sample-output.example.json for Store and README proof.

Cost

Zero external costs. Simple HTTP HEAD requests — no API keys, no proxies. A run checking 100 URLs takes ~15 seconds.

Store Listing Ops

npm run store:optimize
npm run store:kpi

Commercial Ops

Set up .env first:

$cp -n .env.example .env

Cloud Task/Schedule setup (idempotent):

$npm run apify:cloud:setup

Daily reliability checks:

npm run canary:check
npm run contract:test:live

OpenClaw cron commands:

  • openclaw-cron-commands.md
  • dns-dmarc-security-checker — add DNS, SPF, DKIM, and DMARC checks for the same client/domain set.
  • ssl-certificate-monitor — catch TLS expiry and issuer drift on the same sites.
  • rdap-domain-monitor — track registrar and ownership changes behind the same web properties.