Content Security Policy Evaluator - Online Hash & Nonce Check
Test if a script or style will be allowed by a given CSP. Compute hash/nonce. Strengthen your site’s defense against XSS. Local.
UD5 Toolkit
Paste a Permissions-Policy (formerly Feature-Policy) HTTP header to decode and inspect permissions for your site.
(self "https://example.com").
Enter a header value and click Parse to see decoded directives.
| Directive | Description | Example | Default |
|---|---|---|---|
camera |
Controls access to video input devices | camera=(self) |
All origins allowed |
microphone |
Controls access to audio input devices | microphone=() |
All origins allowed |
geolocation |
Controls access to Geolocation API | geolocation=(self "https://maps.example.com") |
All origins allowed |
fullscreen |
Controls ability to use Fullscreen API | fullscreen=* |
All origins allowed |
interest-cohort |
Controls FLoC tracking (Privacy Sandbox) | interest-cohort=() |
Allowed (opt out recommended) |
accelerometer, gyroscope, magnetometer |
Controls sensor APIs | accelerometer=() |
All origins allowed |
Permissions-Policy header (formerly Feature-Policy) allows a website to control which browser features and APIs can be used by the current page and embedded iframes. It helps improve security and privacy by restricting sensitive capabilities like camera, microphone, geolocation, etc.
Feature-Policy was the original header, but it has been replaced by Permissions-Policy. The new header uses a simpler syntax (directive=() instead of directive 'none') and is now the standard. Browsers will gradually drop support for Feature-Policy.
() means the feature is completely blocked for the current origin and all embedded contexts. For example, camera=() disables camera access entirely.
* means the feature is allowed for all origins (both same-origin and cross-origin iframes). However, use it cautiously because it may weaken your site's security posture.
Permissions-Policy HTTP response header (from browser DevTools → Network tab) and paste it into the input field above. Click Parse Header to see a clear breakdown of what each directive allows or blocks.
Test if a script or style will be allowed by a given CSP. Compute hash/nonce. Strengthen your site’s defense against XSS. Local.
Define minimum length, uppercase, digits, special chars, and check if a password meets your custom policy. Instant feedback.
Enter a website and check which security headers (HSTS, CSP, X‑Frame‑Options) are present. Get a security grade.
Display your effective connection type (4g, 3g, etc.) and downlink speed using the Navigator API. Adapt your app accordingly.
Validate a DNSSEC chain by entering DS and RRSIG records. Verify that signatures match. Educational. Local algorithm.
Enter a domain and see its SSL certificate details: issuer, validity dates, and chain. Client‑side fetch.
Generate a Contributor Covenant or custom Code of Conduct for your project or event. Ready to paste into your repo.
Tell if your password has appeared in data breaches without sending the full password. Uses hash prefix locally.
Enter a router's MAC address or serial and generate the common default WPA passphrase for major ISP brands. Educational purpose only.
Convert integers into short, unique, YouTube‑style IDs (hashids) and decode them back. Customize salt and minimum length.
Tell the tool what base liquor and mixers you have, and it suggests classic cocktails. Simple database. Cheers!
Paste a SQL CREATE TABLE statement and extract just the column names as a CSV header row. For data migration.
Test a regular expression against malicious inputs to detect catastrophic backtracking and ReDoS vulnerabilities. Educational.
Paste a URL or HTML to detect known vulnerable JavaScript library versions. Quick security audit. Client‑side only.
Drop a WAV file and see its full header: sample rate, bit depth, channels, and chunk structure. Raw bytes explained.
Drop a PDF and extract any embedded JavaScript or form actions. Check for malicious code. Privacy‑friendly analysis.
Test SQL injection inputs on a mock database and see the resulting query. Learn how to prevent SQLi. No real data.
Send conditional requests to a URL and verify that the server correctly handles ETag and If‑None‑Match. Audit caching.
Scroll a container and see how sticky elements behave. Adjust top, bottom, and scroll margins. Copy the code.
Paste a `Set‑Cookie` header and see all attributes parsed: domain, path, Max‑Age, SameSite, Secure, HttpOnly. Debug cookies easily.
Check if a URL can be embedded in an iframe. Test your site’s defense against clickjacking. Browser‑based.
Fetch a site’s HSTS header and validate its syntax, max‑age, and subdomain flags. Ensure your site enforce HTTPS.
Paste a Content‑Security‑Policy header and get a human‑readable breakdown. See potential risks and suggestions.
Configure browser feature permissions (camera, microphone, geolocation) and generate the Permissions‑Policy HTTP header.
Drop or paste an .ics file and see all events in a readable table. Check dates, times, and locations. Privacy‑friendly.
Parse a Snowflake ID (used by Discord, Twitter) into its timestamp, worker, and sequence components. Instant local decoding.
Paste a human‑readable date (like 'next Friday' or 'March 5, 2023') and convert it to ISO 8601 format. Quick and tolerant.
Build an iframe with different sandbox flags and see live which features are blocked. For secure embedding.
Instantly convert plain text into HTML‑safe escaped characters for secure display in web pages. Prevent cross‑site scripting. All processing local.
Paste a raw server log snippet and see a structured table with IP, method, URL, and status. Quick audit.