🔒

Security

HTTPS check, mixed content, HSTS, CSP, X-Frame-Options, email privacy.

What We Check

We check HTTPS, security headers (HSTS, CSP, X-Frame-Options, X-Content-Type-Options), mixed content, and exposed email addresses.

Individual Checks

HTTPS

error

Verifies the page is served over a secure HTTPS connection.

Example: https://example.com
Best practice: HTTPS

Mixed Content

warning

Detects HTTP resources loaded on an HTTPS page.

Example: <img src="http://...">
Best practice: No HTTP resources

HSTS Header

notice

Checks for Strict-Transport-Security header that forces HTTPS.

Example: Strict-Transport-Security: max-age=31536000
Best practice: Present

CSP Header

notice

Checks for Content-Security-Policy header preventing XSS attacks.

Example: Content-Security-Policy: default-src 'self'
Best practice: Present

X-Content-Type-Options

notice

Checks for X-Content-Type-Options: nosniff preventing MIME sniffing.

Example: X-Content-Type-Options: nosniff
Best practice: nosniff

X-Frame-Options

notice

Checks for X-Frame-Options header preventing clickjacking.

Example: X-Frame-Options: SAMEORIGIN
Best practice: DENY/SAMEORIGIN

Email Privacy

warning

Detects plain-text email addresses exposed in page content.

Example: [email protected]
Best practice: No exposed emails

Why It Matters

Security headers protect against XSS, clickjacking, and MIME sniffing attacks. HTTPS is a Google ranking signal and browsers warn users about insecure pages.

Test your website now

Analyze Website

Other Check Categories

📊

Need a more detailed SEO analysis?

✓ 30+ continuous SEO checks
✓ Google Search Console integration
✓ Keyword tracking
Try TopRankerTools
👥

Let's talk about increasing your profits online

🔎 SEO health of your website
📈 Opportunities for growth
🎯 Expected results
Book Free Consultation