JWK (JSON Web Key, RFC 7517) — a JSON representation of a cryptographic key (RSA, EC, AES). Used in OAuth 2.0 and OpenID Connect to publish public keys that signed JWTs. JWKS (JSON Web Key Set) — a URL like https://provider.com/.well-known/jwks.json containing the array of current keys. Client fetches JWKS, finds the key by kid (key ID) → verifies the JWT signature.
Below: details, example, related terms, FAQ.
/.well-known/jwks.jsonkid, keeps the old 30 days for overlap{
"keys": [
{ "kty": "RSA", "kid": "abc123", "use": "sig", "alg": "RS256",
"n": "0vx7agoe...", "e": "AQAB" }
]
}The tool checks HTTP security headers, SSL/TLS configuration, server info leaks, and protection against common attacks (XSS, clickjacking, MIME sniffing). A grade fromA to F shows overall security level.
Checking Content-Security-Policy, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and more.
TLS version, certificate expiry, chain of trust, HSTS support.
Finding exposed server versions, debug modes, open configs, and directories.
Detailed report explaining each issue with specific steps to fix it.
HTTP header audit
config verification
CSP & HSTS setup
compliance checks
Strict-Transport-Security.Server: Apache/2.4.52 helps attackers find exploits. Hide the version.DENY or SAMEORIGIN.nosniff, browsers may misinterpret file types (MIME sniffing).Content-Security-Policy-Report-Only, monitor violations, then enforce.Server, X-Powered-By, X-AspNet-Version from responses.Security check history and HTTP security header monitoring.
Sign up freeJWK — JSON, easy to parse in JS/Python. PEM — traditional base64. JWT with JWKS = standard OAuth path.
Generate new key → publish in JWKS with a new kid → wait 30 days for clients to refresh cache → remove old.
Library like jose (Node), python-jose, PHP firebase/php-jwt with getKeyById callback.