Security Report Summary
B
Site: https://www.facebook.com/
IP Address: 2a03:2880:f122:83:face:b00c:0:25de
Report Time: 24 Jun 2017 12:05:00 UTC
Report Short URL: https://schd.io/5i
Headers:
  • X-XSS-Protection
  • Content-Security-Policy
  • X-Frame-Options
  • Strict-Transport-Security
  • X-Content-Type-Options
  • Public-Key-Pins
  • Referrer-Policy
Warning: Grade capped at A, please see warnings below.
Raw Headers
HTTP/1.1200 OK
X-XSS-Protection0
public-key-pins-report-onlymax-age=500; pin-sha256="WoiWRyIOVNa9ihaBciRSC7XHjliYS9VwUGOIud4PB18="; pin-sha256="r/mIkG3eEpVdm+u/ko/cwxzOMo1bk4TyHIlByibiA5E="; pin-sha256="q4PO2G2cbkZhZ82+JgmRUyGMoAeozA+BSXVXQWB8XWQ="; report-uri="http://reports.fb.com/hpkp/"
Pragmano-cache
content-security-policydefault-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Cache-Controlprivate, no-cache, no-store, must-revalidate
X-Frame-OptionsDENY
Strict-Transport-Securitymax-age=15552000; preload
X-Content-Type-Optionsnosniff
ExpiresSat, 01 Jan 2000 00:00:00 GMT
Set-Cookiefr=03R9I6TiAah0MdXpk..BZTlVo.0q.AAA.0.0.BZTlVo.AWVDME67; expires=Fri, 22-Sep-2017 12:04:56 GMT; Max-Age=7776000; path=/; domain=.facebook.com; secure; httponly
VaryAccept-Encoding
Content-Typetext/html; charset=UTF-8
X-FB-DebugrqNBwyRJl8uR+cXf6KF8OKifoOP/7yxLZU9BTVP50+UUEsDL24ZmR0SmhR0IaZ6OtBKtj9CqoYcL9cuGVpgwWg==
DateSat, 24 Jun 2017 12:04:56 GMT
Transfer-Encodingchunked
Connectionkeep-alive
Missing Headers
Public-Key-PinsHTTP Public Key Pinning protects your site from MiTM attacks using rogue X.509 certificates. By whitelisting only the identities that the browser should trust, your users are protected in the event a certificate authority is compromised.
Referrer-PolicyReferrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
Other Services
Secarma Visit our sponsor Secarma.
Warnings
Content-Security-PolicyThis policy contains 'unsafe-inline' which is dangerous in the script-src directive. This policy contains 'unsafe-eval' which is dangerous in the script-src directive.
Upcoming Headers
Expect-CTExpect-CT allows a site to determine if they are ready for the upcoming Chrome requirements and/or enforce their CT policy.
Additional Information
X-XSS-ProtectionX-XSS-Protection sets the configuration for the cross-site scripting filters built into most browsers. The best configuration is "X-XSS-Protection: 1; mode=block".
public-key-pins-report-onlyHTTP Public Key Pinning Report Only allows a host to test the effects of a HPKP policy before making it live. The browser will report on actions that would have been taken if the policy were live so a host can see what effect it would have. Analyse this policy in more detail.
content-security-policyContent Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets. Analyse this policy in more detail.
X-Frame-OptionsX-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking.
Strict-Transport-SecurityHTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS.
X-Content-Type-OptionsX-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".