PKCE (Proof Key for Code Exchange, RFC 7636) — an OAuth 2.0 extension protecting the authorization code from theft in public clients (SPAs, mobile apps without secure storage). Client generates a random code_verifier → sends a hash (code_challenge) in the authorize URL → at token exchange sends the original verifier back. Without PKCE, an attacker who intercepts the code can mint an access_token.
Below: details, example, related terms, FAQ.
code_verifier = base64url(random(32)) // "dBjftJeZ..."
code_challenge = base64url(sha256(code_verifier))
auth_url = authorize?client_id=X&code_challenge=CC&code_challenge_method=S256The tool checks HTTP security headers, SSL/TLS configuration, server info leaks, and protection against common attacks (XSS, clickjacking, MIME sniffing). A grade fromA to F shows overall security level.
Checking Content-Security-Policy, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and more.
TLS version, certificate expiry, chain of trust, HSTS support.
Finding exposed server versions, debug modes, open configs, and directories.
Detailed report explaining each issue with specific steps to fix it.
HTTP header audit
config verification
CSP & HSTS setup
compliance checks
Strict-Transport-Security.Server: Apache/2.4.52 helps attackers find exploits. Hide the version.DENY or SAMEORIGIN.nosniff, browsers may misinterpret file types (MIME sniffing).Content-Security-Policy-Report-Only, monitor violations, then enforce.Server, X-Powered-By, X-AspNet-Version from responses.Security check history and HTTP security header monitoring.
Sign up freeRecommended (OAuth 2.1 draft) but not required. For public clients (SPA, mobile) — mandatory.
All major ones: Google, GitHub, Microsoft, Auth0, Okta, Keycloak. Yandex OAuth since 2022.
S256 (SHA-256) only in production. Plain (verifier=challenge) is legacy and insecure.