Content Security Policy
Analyzer
Analyze CSP headers for vulnerabilities, detect bypass opportunities, and get actionable security insights.
CSP Analyzer
Paste your policy below
✓ What we check
- Unsafe inline/eval detection
- JSONP & Angular bypasses
- Missing directive analysis
- Google CSP Evaluator
Pro Tip
Copy your CSP directly from browser DevTools → Network tab → Response Headers
POST /analyze
API Documentation
Simple REST API for integrating CSP analysis into your security workflows
POST /analyze
Analyze a Content-Security-Policy header and get detailed findings.
# Request
curl -X POST https://csp.quentinra.dev/api/analyze \
-H "Content-Type: application/json" \
-d '{
"policy": "default-src 'self'; script-src 'unsafe-inline'"
}'
RESPONSE 200 OK
Returns detailed analysis including bypasses and security findings.
{
"scriptAnalysis": {
"unsafeInline": true,
"bypasses": { "angular": [...] }
},
"googleFindings": [...]
}
GET /health
Health check endpoint for monitoring and load balancers.
# Request
curl https://csp.quentinra.dev/api/health
# Response
{ "status": "ok" }
EXAMPLE Python Integration
Easy integration with any programming language.
import requests
response = requests.post(
"https://csp.quentinra.dev/api/analyze",
json={"policy": csp_header}
)
findings = response.json()
Features
Everything you need to analyze and improve your Content Security Policy
Bypass Detection
Detects known JSONP endpoints and Angular libraries that can bypass your CSP.
Google CSP Evaluator
Integrates with Google's CSP Evaluator for industry-standard findings.
REST API
Simple JSON API for easy integration into CI/CD pipelines and security tools.
Custom Bypasses
Add your own bypass database with hot-reload support.
Docker Ready
Deploy instantly with Docker and docker-compose.
Security Focused
Built by security professionals for security professionals.