Claude-code-plugins-plus-skills analyzing-security-headers
install
source · Clone the upstream repo
git clone https://github.com/jeremylongshore/claude-code-plugins-plus-skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/jeremylongshore/claude-code-plugins-plus-skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/plugins/security/security-headers-analyzer/skills/analyzing-security-headers" ~/.claude/skills/jeremylongshore-claude-code-plugins-plus-skills-analyzing-security-headers-80c819 && rm -rf "$T"
manifest:
plugins/security/security-headers-analyzer/skills/analyzing-security-headers/SKILL.mdsource content
Analyzing Security Headers
Overview
Evaluate HTTP response headers for web applications against OWASP Secure Headers Project recommendations and browser security baselines. Identify missing, misconfigured, or information-leaking headers across both HTTP and HTTPS responses.
Prerequisites
- Target URL or domain name accessible over the network
- Authorization to perform HTTP requests against the target domain
- Network connectivity for both HTTP and HTTPS protocols
- Optional: write access to
for persisting results${CLAUDE_SKILL_DIR}/security-reports/
Instructions
- Accept the target domain. If only a domain name is provided, default to
. For batch analysis, accept a newline-separated list.https:// - Fetch response headers using
for both HTTP and HTTPS endpoints. Record the full redirect chain and final destination URL.WebFetch - Evaluate critical headers -- flag any that are missing or misconfigured:
: requireStrict-Transport-Security
,max-age>=31536000
, and preload eligibilityincludeSubDomains
: check forContent-Security-Policy
,unsafe-inline
, overly broadunsafe-eval
, and missingdefault-srcframe-ancestors
: requireX-Frame-Options
orDENYSAMEORIGIN
: requireX-Content-Type-Optionsnosniff
: verify camera, microphone, geolocation restrictionsPermissions-Policy
- Evaluate important headers -- report status and recommendations:
: recommendReferrer-Policy
orstrict-origin-when-cross-originno-referrer
(COEP),Cross-Origin-Embedder-Policy
(COOP),Cross-Origin-Opener-Policy
(CORP)Cross-Origin-Resource-Policy
- Check for information disclosure -- flag
,Server
,X-Powered-By
, and any header revealing technology stack or version numbers.X-AspNet-Version - Inspect cookie attributes on
headers: verifySet-Cookie
,Secure
,HttpOnly
, andSameSite=Lax|Strict
/__Host-
prefix usage.__Secure- - Calculate a security grade: A+ (95-100), A (85-94), B (75-84), C (65-74), D (50-64), F (<50) based on weighted presence and correctness of each header.
- Generate per-header remediation directives with configuration examples for Nginx, Apache, and Cloudflare.
See
${CLAUDE_SKILL_DIR}/references/implementation.md for the five-phase implementation workflow.
Output
- Headers Analysis Report: overall grade, per-header status (present/missing/misconfigured), and risk impact
- Remediation Checklist: prioritized fixes with server configuration snippets
- Cookie Security Assessment: attribute compliance for each
headerSet-Cookie - Comparison Table: side-by-side HTTP vs. HTTPS header differences
Error Handling
| Error | Cause | Solution |
|---|---|---|
| Failed to connect to domain | DNS resolution failure, firewall block, or domain down | Verify domain spelling and DNS records; test alternate protocols |
| SSL certificate verification failed | Expired, self-signed, or mismatched certificate | Note TLS issue in report; indicates HSTS not properly enforced |
| Too many redirects | Redirect loop between HTTP and HTTPS | Report the redirect chain and analyze headers at each hop |
| HTTP 429 Too Many Requests | Rate limiting by target server | Implement backoff; queue domain for delayed re-analysis |
| Headers differ between HTTP and HTTPS | Inconsistent server configuration | Report both sets; highlight critical differences and flag HSTS gap |
Examples
- "Analyze security headers for
and explain any CSP or HSTS issues."https://claudecodeplugins.io - "Check headers for
on both HTTP and HTTPS and provide an Nginx remediation config."example.com - "Batch-analyze headers for five staging domains and rank them by security grade."
Resources
- OWASP Secure Headers Project: https://owasp.org/www-project-secure-headers/
- MDN Security Headers Guide: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers#security
- Security Headers Scanner: https://securityheaders.com/
- Content Security Policy Reference: https://content-security-policy.com/
- HSTS Preload Submission: https://hstspreload.org/
-- full error handling reference${CLAUDE_SKILL_DIR}/references/errors.md
-- additional usage examples${CLAUDE_SKILL_DIR}/references/examples.md- https://intentsolutions.io