🔒

セキュリティ

HTTPSチェック、混在コンテンツ、HSTS、CSP、X-Frame-Options、メールプライバシー。

チェック内容

We check HTTPS, security headers (HSTS, CSP, X-Frame-Options, X-Content-Type-Options), mixed content, and exposed email addresses.

個別チェック項目

HTTPS

error

Verifies the page is served over a secure HTTPS connection.

Example: https://example.com
Best practice: HTTPS

Mixed Content

warning

Detects HTTP resources loaded on an HTTPS page.

Example: <img src="http://...">
Best practice: No HTTP resources

HSTS Header

notice

Checks for Strict-Transport-Security header that forces HTTPS.

Example: Strict-Transport-Security: max-age=31536000
Best practice: 存在

CSP Header

notice

Checks for Content-Security-Policy header preventing XSS attacks.

Example: Content-Security-Policy: default-src 'self'
Best practice: 存在

X-Content-Type-Options

notice

Checks for X-Content-Type-Options: nosniff preventing MIME sniffing.

Example: X-Content-Type-Options: nosniff
Best practice: nosniff

X-Frame-Options

notice

Checks for X-Frame-Options header preventing clickjacking.

Example: X-Frame-Options: SAMEORIGIN
Best practice: DENY/SAMEORIGIN

Email Privacy

warning

Detects plain-text email addresses exposed in page content.

Example: [email protected]
Best practice: No exposed emails

なぜ重要か

Security headers protect against XSS, clickjacking, and MIME sniffing attacks. HTTPS is a Google ranking signal and browsers warn users about insecure pages.

今すぐウェブサイトをテスト

ウェブサイトを分析

他のチェックカテゴリ

📊

より詳細なSEO分析が必要ですか?

✓ 30項目以上の継続SEOチェック
✓ Google Search Console連携
✓ キーワードトラッキング
TopRankerToolsを試す
👥

Let's talk about increasing your profits online

🔎 SEO health of your website
📈 Opportunities for growth
🎯 Expected results
Book Free Consultation