HTTP headers
GI
github.com response headers
https://github.com/
HTTP 200
grade A
What this means
Strong header hygiene — the major security headers are present and configured at modern defaults. Re-check after deploys; CSP is the one most likely to silently regress.
Security headers
A
Strict-Transport-Security
max-age=31536000; includeSubdomains; preload
A
Content-Security-Policy
default-src 'none'; base-uri 'self'; child-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com git
origin-when-cross-origin, strict-origin-when-cross-origin
Referrer-Policy is "origin-when-cross-origin, strict-origin-when-cross-origin" — consider strict-origin-when-cross-origin.
— missing
No Permissions-Policy header. Without it, every browser API the page might not need (geolocation, camera, etc.) stays available.
Warnings
- Referrer-Policy is "origin-when-cross-origin, strict-origin-when-cross-origin" — consider strict-origin-when-cross-origin.
- No Permissions-Policy header. Without it, every browser API the page might not need (geolocation, camera, etc.) stays available.
- At least one Set-Cookie is missing HttpOnly — JavaScript can read it (XSS risk surface).
Caching
- Cache-Control
- max-age=0, private, must-revalidate
- ETag
- W/"213a812aff5fe17816ae70983e6a7241"
Cookies (3)
_gh_sess
SecureHttpOnlySameSite=lax
_octo
SecureHttpOnlySameSite=lax
logged_in
SecureHttpOnlySameSite=lax
Server & transport
- Server
- github.com
What to try next
Lock in CSP
If your CSP is good today, set up a CSP report-only deploy gate to catch silent regressions.
Pair with /ssl
Verify HSTS is consistent with the cert at /ssl/github.com.
Monitor
Re-run after every deploy. Most security-header regressions land via reverse-proxy config drift.
All response headers (16)
Methodology
- Probe
- We open a HEAD request to https://{host}/ (falling back to GET on 405 / 501), capture every response header, and grade the six load-bearing security headers: Strict-Transport-Security, Content-Security-Policy, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and Permissions-Policy. The overall letter grade is the average of those six.
- Counts as DOWN
- The HEAD (and GET fallback) request fails to complete — DNS, TCP, TLS, or timeout. Nothing to grade.
- Counts as DEGRADED
- Reserved for grade C / D — common security headers present but weakened, or some missing. The probe still returns full data; the grade reflects production-readiness.
- Detail
- We do not test for known CVEs, fingerprint application versions, or attempt downgrade attacks. The probe is a single request — what the server returned to a generic client. CSP grading is intentionally crude (penalises wildcard sources and 'unsafe-eval'); a manual review is the right move for fine-grained CSP work.
- Cadence
- Every 5 minutes, in parallel across 4 monitoring regions (US East Virginia, US West Oregon, Europe London, Asia Singapore).
- Rate-limited targets
- If a host returns 429 or consistently drops connections from our IPs, we cap retries at 3 and report the last observed status — we do not flood the target to confirm the outage.
- Data source
- Direct probes from our monitoring infrastructure. We do not aggregate crowd reports, Twitter mentions, or DownDetector signals — every result on this page is a live network request.