Tools / Security HTTPx / Use Cases / Probe Security Headers

Probe Security Headers

Check HTTP security headers across your web properties to identify missing protections like CSP, HSTS, and X-Frame-Options.

Tool
Security HTTPx icon
Security HTTPx

Security headers are the first line of defense for web applications. Headers like Content-Security-Policy prevent XSS, Strict-Transport-Security enforces HTTPS, X-Frame-Options blocks clickjacking, and X-Content-Type-Options prevents MIME sniffing. Missing or misconfigured headers leave your application vulnerable to attacks that are trivially prevented by proper header configuration.

The probe_hosts skill sends HTTP requests to your targets and analyzes the response headers for security-relevant configurations. It checks for the presence and correctness of all critical security headers, flags missing headers that should be present, and identifies misconfigurations that weaken their effectiveness.

This is essential for any organization managing multiple web properties. A marketing site, a main application, API endpoints, and CDN-served assets may all have different header configurations. Probing them all at once gives you a unified view of your security header posture and ensures nothing is left unprotected.

Agent Guides

Claude

  1. Connect ToolRouter: claude mcp add toolrouter -- npx -y toolrouter-mcp
  2. Ask Claude: "Probe these hosts for security headers using security-httpx" and provide your domains
  3. Claude scans each host and reports on security header presence and configuration
Read full guide →

ChatGPT

  1. Configure ToolRouter in ChatGPT
  2. Ask: "Check the security headers on these domains" and provide your list
  3. ChatGPT probes each host and reports header findings
Read full guide →

Copilot

  1. Add ToolRouter to Copilot MCP config
  2. In Copilot Chat: "Probe security headers on my domains" and list them
  3. Copilot scans and returns header findings
Read full guide →

OpenClaw

  1. Connect ToolRouter: openclaw mcp add toolrouter -- npx -y toolrouter-mcp
  2. Ask OpenClaw: "Probe security headers on these hosts"
  3. OpenClaw scans and reports header configuration for each host
Read full guide →

Related Use Cases

Open Discover Hidden Services

Discover Hidden Services

Find hidden or forgotten web services running on your infrastructure that may be exposed without your knowledge.

Security HTTPx icon
Security HTTPx
4 agent guides
Open Check SSL/TLS Configuration

Check SSL/TLS Configuration

Verify SSL/TLS certificate validity, protocol versions, and cipher suite configurations across your hosts.

Security HTTPx icon
Security HTTPx
4 agent guides
Open Enumerate Subdomains

Enumerate Subdomains

Discover all subdomains of a domain to map the full attack surface and find forgotten or hidden services.

Security HTTPx icon
Security HTTPx
4 agent guides
Open Detect Web Technologies

Detect Web Technologies

Identify the web technologies, frameworks, and server software running on target hosts.

Security HTTPx icon
Security HTTPx
4 agent guides

Related Workflows

Full Security AssessmentComprehensive security assessment combining infrastructure probing, vulnerability scanning, penetration testing, and CVE intelligence.SSL and DNS AuditAudit SSL certificates, DNS configuration, HTTP security headers, and domain registration for security gaps.Subdomain Security ScanEnumerate subdomains, probe services, scan for takeover vulnerabilities, and capture visual evidence.Infrastructure Health CheckVerify DNS resolution, service availability, and server locations to ensure infrastructure is healthy and correctly configured.Web Application Security TestCrawl a web application, analyze HTTP security, test for injections, and document findings with screenshots.Network ReconnaissanceMap the complete network attack surface through DNS enumeration, geolocation, service probing, and attack vector analysis.API Security TestingTest API endpoints for authentication flaws, injection vulnerabilities, and compliance with OWASP API Security Top 10.Certificate MonitoringMonitor SSL/TLS certificates for expiration, verify TLS configuration, and confirm domain ownership alignment.Cloud Security AuditAudit cloud infrastructure by discovering assets, probing for misconfigurations, testing cloud-specific attacks, and checking CVEs.Third-Party Risk AssessmentAssess third-party vendor security through identity verification, external security probing, attack surface analysis, and breach history.Continuous Security MonitoringMaintain ongoing security visibility through DNS monitoring, service probing, vulnerability scanning, and CVE tracking.Dark Web Exposure CheckCheck for organizational data exposure on the web including credential leaks, paste sites, and breach databases.