Test websites for clickjacking vulnerabilities
What this shows:
Clickjacking is a malicious technique where an attacker tricks a user into clicking on something different from what the user perceives.
X-Frame-Options: DENY
Options:
• DENY - Never allow framing
• SAMEORIGIN - Only allow same-origin framing
• ALLOW-FROM uri - Allow framing from specific URI
Content-Security-Policy: frame-ancestors 'none'
Options:
• 'none' - Never allow framing
• 'self' - Only allow same-origin framing
• 'self' example.com - Allow specific domains
X-Frame-Options: DENY
Never allow framing from any source (most secure)
X-Frame-Options: SAMEORIGIN
Only allow framing from same origin
X-Frame-Options: ALLOW-FROM https://trusted.com
Allow framing from specific URI (deprecated)
ALLOW-FROM (deprecated, use CSP instead)frame-ancestors 'none'
Never allow framing from any source
frame-ancestors 'self'
Only allow framing from same origin
frame-ancestors 'self' https://trusted.com
Allow framing from same origin and trusted domain
frame-ancestors https://*.example.com
Allow framing from any subdomain of example.com
default-src
Fallback for other directives
script-src
Controls JavaScript execution
style-src
Controls CSS stylesheets
img-src
Controls image sources
connect-src
Controls AJAX/fetch requests
font-src
Controls font loading
object-src
Controls plugins (Flash, etc.)
media-src
Controls video/audio sources
'none'
Block all sources
'self'
Same origin only
'unsafe-inline'
Allow inline scripts/styles
'unsafe-eval'
Allow eval() and similar
'strict-dynamic'
Trust dynamically loaded scripts
'unsafe-hashes'
Allow specific inline scripts
'report-sample'
Include sample in reports
'nonce-*'
Allow scripts with specific nonce