Headers by Omegapoint is a tool to help developers and security researchers analyse the HTTP headers in responses from web servers for security misconfigurations.
If you just want to run the scanner locally using Docker
there is a docker-compose.yml
in the project root.
- Docker
- Docker Compose
- (optional) GNU make
Run docker-compose up
to start the application,
by default it'll be accessible at http://localhost:8080
.
After pulling new changes (or making changes yourself) you need
to remove the local image before starting. This can be achieved
by running docker rmi --force headers.security.api
.
Alternatively, if you have GNU make installed, simply run make
(or make update
if you need to rebuild the image after making
changes to the code).
Both the API and frontend project need to be started separately.
- .NET 9 SDK
- Node JS v23+
- mkcert (to automate setting up valid HTTPS certificates for Vite dev server)
- Go to the
API
directorycd headers.security.Api
- Start the server
ASPNETCORE_URLS=https://localhost:5000 DOTNET_ENVIRONMENT=Development dotnet watch
- Go to the
Frontend
directorycd headers.security.Api/Frontend
- Install dependencies
npm i
- Start the server
npm run dev
- Browse to the Vite dev server at
https://localhost:5123