MCP HubMCP Hub
スキル一覧に戻る

analyzing-security-headers

jeremylongshore
更新日 Today
68 閲覧
712
74
712
GitHubで表示
その他ai

について

このスキルは、WebドメインのHTTPセキュリティヘッダーを分析し、CSPやHSTSなどの脆弱性や設定ミスを特定します。「セキュリティヘッダーを分析して」などのフレーズで起動され、Web取得ツールを使用してコンプライアンスを監査し、セキュリティに関する推奨事項を提供します。開発者はこれを使用して、Webサイトのセキュリティ状況を迅速に評価し、実践的な改善ガイダンスを得ることができます。

クイックインストール

Claude Code

推奨
プラグインコマンド推奨
/plugin add https://github.com/jeremylongshore/claude-code-plugins-plus
Git クローン代替
git clone https://github.com/jeremylongshore/claude-code-plugins-plus.git ~/.claude/skills/analyzing-security-headers

このコマンドをClaude Codeにコピー&ペーストしてスキルをインストールします

ドキュメント

Prerequisites

Before using this skill, ensure:

  • Target URL or domain name is accessible
  • Network connectivity for HTTP requests
  • Permission to scan the target domain
  • Optional: Save results to {baseDir}/security-reports/

Instructions

1. Domain Input Phase

Accept domain specification:

  • Full URL with protocol (https://example.com)
  • Domain name only (example.com - will test HTTPS first)
  • Multiple domains for batch analysis
  • Specific paths for header variation testing

2. Header Fetching Phase

Retrieve HTTP response headers:

  • Make HEAD or GET request to target
  • Capture all security-relevant headers
  • Test both HTTP and HTTPS responses
  • Record redirect chains and final destination

3. Analysis Phase

Evaluate each security header against best practices:

Critical Headers:

  • Strict-Transport-Security (HSTS)
  • Content-Security-Policy (CSP)
  • X-Frame-Options
  • X-Content-Type-Options
  • Permissions-Policy

Important Headers:

  • Referrer-Policy
  • Cross-Origin-Embedder-Policy (COEP)
  • Cross-Origin-Opener-Policy (COOP)
  • Cross-Origin-Resource-Policy (CORP)

Additional Checks:

  • Server header information disclosure
  • X-Powered-By header exposure
  • Cookie security attributes (Secure, HttpOnly, SameSite)

4. Grading Phase

Calculate security score:

  • A+ (95-100): All critical headers properly configured
  • A (85-94): Critical headers present, minor issues
  • B (75-84): Most headers present, some weaknesses
  • C (65-74): Missing critical headers
  • D (50-64): Significant security gaps
  • F (<50): Multiple critical vulnerabilities

5. Report Generation Phase

Create comprehensive report with:

  • Overall security grade and numeric score
  • Missing headers with impact assessment
  • Misconfigured headers with specific issues
  • Remediation recommendations with examples
  • Priority ranking for fixes

Output

The skill produces:

Primary Output: Security headers analysis report

Report Structure:

# Security Headers Analysis - example.com
## Overall Grade: B (82/100)

## Critical Headers Status
✅ Strict-Transport-Security: Present (max-age=31536000; includeSubDomains)
❌ Content-Security-Policy: Missing
✅ X-Frame-Options: Present (DENY)
✅ X-Content-Type-Options: Present (nosniff)
⚠️  Permissions-Policy: Misconfigured

## Detailed Findings

### Missing Headers (High Priority)
1. Content-Security-Policy
   - Risk: XSS vulnerability exposure
   - Recommendation: Implement strict CSP
   - Example: Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-inline'

### Misconfigured Headers
1. Permissions-Policy
   - Current: geolocation=*
   - Issue: Allows all origins
   - Fix: geolocation=(self)

## Priority Actions
1. Add Content-Security-Policy (Critical)
2. Fix Permissions-Policy wildcard (High)
3. Add Referrer-Policy (Medium)

Optional Outputs:

  • JSON format for automation: {baseDir}/security-reports/headers-DOMAIN-YYYYMMDD.json
  • CSV for spreadsheet analysis
  • Comparison report for multiple domains

Error Handling

Common Issues and Resolutions:

  1. Domain Unreachable

    • Error: "Failed to connect to example.com"
    • Resolution: Check domain spelling, network connectivity, firewall rules
    • Fallback: Test alternate protocols (HTTP vs HTTPS)
  2. SSL/TLS Errors

    • Error: "SSL certificate verification failed"
    • Resolution: Note in report, test with certificate validation disabled
    • Impact: Indicates HSTS not properly enforced
  3. Redirect Loops

    • Error: "Too many redirects"
    • Resolution: Report redirect chain, analyze headers at each hop
    • Note: Headers may differ across redirect chain
  4. Rate Limiting

    • Error: "HTTP 429 Too Many Requests"
    • Resolution: Implement exponential backoff, reduce request frequency
    • Fallback: Queue domain for later analysis
  5. Mixed Content Issues

    • Error: "Headers differ between HTTP and HTTPS"
    • Resolution: Report both sets, highlight critical differences
    • Recommendation: Ensure HSTS enforces HTTPS-only

Resources

Security Header References:

Header-Specific Documentation:

Best Practice Guides:

Testing Tools:

  • Online header checker: https://securityheaders.com/
  • Browser DevTools Network tab for manual inspection
  • curl command for command-line testing: curl -I https://example.com

Integration Examples:

  • Automated header checks in CI/CD pipelines
  • Periodic scanning with alerting on grade degradation
  • Compliance reporting for security audits

GitHub リポジトリ

jeremylongshore/claude-code-plugins-plus
パス: plugins/security/security-headers-analyzer/skills/security-headers-analyzer
aiautomationclaude-codedevopsmarketplacemcp

関連スキル

evaluating-llms-harness

テスト

This Claude Skill runs the lm-evaluation-harness to benchmark LLMs across 60+ standardized academic tasks like MMLU and GSM8K. It's designed for developers to compare model quality, track training progress, or report academic results. The tool supports various backends including HuggingFace and vLLM models.

スキルを見る

sglang

メタ

SGLang is a high-performance LLM serving framework that specializes in fast, structured generation for JSON, regex, and agentic workflows using its RadixAttention prefix caching. It delivers significantly faster inference, especially for tasks with repeated prefixes, making it ideal for complex, structured outputs and multi-turn conversations. Choose SGLang over alternatives like vLLM when you need constrained decoding or are building applications with extensive prefix sharing.

スキルを見る

cloudflare-turnstile

メタ

This skill provides comprehensive guidance for implementing Cloudflare Turnstile as a CAPTCHA-alternative bot protection system. It covers integration for forms, login pages, API endpoints, and frameworks like React/Next.js/Hono, while handling invisible challenges that maintain user experience. Use it when migrating from reCAPTCHA, debugging error codes, or implementing token validation and E2E tests.

スキルを見る

langchain

メタ

LangChain is a framework for building LLM applications using agents, chains, and RAG pipelines. It supports multiple LLM providers, offers 500+ integrations, and includes features like tool calling and memory management. Use it for rapid prototyping and deploying production systems like chatbots, autonomous agents, and question-answering services.

スキルを見る