C79
Overall API Score
Top 10% in your industry!
This is a report based on demo API data
Top 10% in your industry!
content-type
header as application/json
. This test checks to make sure the content-type
header is application/json
./v2
) or numeric based (/1
)./users
vs. /user
x-ratelimit-*
headers in the response payload to see if you use rate limiting./user/{id}
vs. /postUser/{id}
content-encoding
header exists.cache-control
header is used to specify browser caching policies, including how a resource is cached, where it is cached, and it's expiration.X-Content-Type-Options
header plays a vital role in protecting the API from MIME sniffing attacks. By setting the value of this header to nosniff, it instructs the browser to strictly adhere to the declared Content-Type
and prevents it from attempting to sniff or interpret the response data based on its content. This test checks to see if the X-Content-Type-Options
header exists and if its value is set to nosniff
.securitySchemes
object is present and is not empty.Strict-Transport-Security
(HSTS) header is crucial for enforcing secure communication over HTTPS. When a server includes the HSTS header in its response, it instructs the browser to always connect to the API using HTTPS, even if the user enters an HTTP URL. This prevents potential downgrade attacks and ensures that all communication remains encrypted. This test checks for the Strict-Transport-Security
header in your API responses.X-Frame-Options
header indicates whether a browser can render a page in a <frame>
or <iframe>
. If not set to DENY
, sites can manipulate user's activity via clickjacking attacks. This test check if the X-Frame-Options
header exists and its value is set to DENY
.Content-Security-Policy
header allows you to restrict which resources can be loaded and what URLs they can be loaded from. This test checks to see if the Content-Security-Policy
header exists.