CSP Analyzer
NewAnalyze Content Security Policy (CSP) headers by parsing all directives and identifying security issues. Detects dangerous configurations: unsafe-inline (allows inline scripts, negating XSS protection), unsafe-eval (allows eval(), a common XSS vector), wildcard sources (*), data: URIs in script-src, and missing critical directives. Explains each directive and provides a security score with remediation suggestions.
CSP Analyzer
Parse and analyze Content Security Policy headers. Identify unsafe directives and security risks.
How to Use CSP Analyzer
- 1Paste a Content-Security-Policy header value
- 2View parsed directives and values
- 3Check for dangerous settings like unsafe-inline
- 4Read recommendations for improvement
Your Privacy is Protected
CSP Analyzer runs entirely in your browser. Your files and data are never uploaded to any server, never stored, and never shared. Everything happens locally on your device using secure browser APIs.
Frequently Asked Questions
What does unsafe-inline in CSP mean?
unsafe-inline allows inline <script> and <style> tags and on* event handlers. This effectively disables CSP protection against XSS attacks from injected inline code.
Why Use This Tool?
Tags
Related Tools
More Security Tools
View all Security ToolsRelated Articles
More articlesTry CSP Analyzer Now
Free, instant, no login. Use it right now — directly in your browser.
Use CSP Analyzer Instantly