Security Score — Headers HTTP & OWASP — AISeen Docs
Cómo AISeen verifica el Security Score: HSTS, CSP, X-Frame-Options, cookie flags. OWASP 2025 calificado A–F.
HTTP Security Headers
These headers are sent from your server with every HTTP response. Each one prevents a specific class of attack.
Forces browsers to use HTTPS for all future requests. Prevents attackers from intercepting traffic by downgrading to HTTP.
max-age=31536000; includeSubDomains; preloadDefines allowed content sources. Prevents malicious scripts from loading even if an attacker injects them into your page.
default-src 'self'; script-src 'self'; object-src 'none'Prevents browsers from guessing a file's content type. Stops attackers from tricking the browser into executing a file as a different type.
nosniffControls whether your page can be loaded in an <iframe>. Prevents attackers from tricking users into clicking hidden buttons on your site.
DENY or SAMEORIGINControls how much referrer info is sent when users click links. Prevents leaking sensitive URL parameters to third-party sites.
strict-origin-when-cross-originRestricts what browser features third-party iframes can use. Prevents embedded content from accessing the camera, microphone, or location.
camera=(), microphone=(), geolocation=()Isolates your page's browsing context. Prevents other origins from accessing your window object, protecting against Spectre-type attacks.
same-originLegacy IE/Chrome XSS filter. Superseded by CSP but still checked for completeness. Modern browsers ignore it.
1; mode=blockCookie Security Flags
SecureCookie is only sent over HTTPS connections.HttpOnlyCookie cannot be read by JavaScript (prevents XSS theft).SameSiteControls cross-site cookie sending (prevents CSRF).We check all cookies found in Set-Cookie response headers. Missing flags on session or auth cookies are flagged as High severity.
Information Leakage
Header
ServerRisk
Reveals web server name and version (e.g., Apache 2.4.51)
Fix
Set to a generic value or remove the header.
Header
X-Powered-ByRisk
Reveals backend technology (e.g., PHP/8.1, Express)
Fix
Remove this header entirely in your server config.
Header
X-AspNet-VersionRisk
Reveals .NET version running on the server
Fix
Disable in web.config or server middleware.
How scoring works
Score starts at 100. Each missing or misconfigured security header deducts points based on its severity. Cookie flag issues and leakage headers add further deductions.
Critical
-15 pts
per missing header
High
-10 pts
per missing header
Medium
-6 pts
per missing header
Low
-3 pts
per missing header
Score ranges
80 – 100
Secure (Grade A)
All critical headers present. Your site defends against XSS, clickjacking, and MITM attacks. Excellent baseline security.
50 – 79
Partial (Grade C)
Some headers missing. High-severity gaps remain open. Add HSTS and CSP as a priority.
0 – 49
Exposed (Grade F)
Critical headers missing. Site is vulnerable to XSS, clickjacking, and downgrade attacks. Urgent fix needed.
Security Score — Headers HTTP & OWASP — AISeen Docs
Cómo AISeen verifica el Security Score: HSTS, CSP, X-Frame-Options, cookie flags. OWASP 2025 calificado A–F.