[![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik3Z0y7G7sHzYzV0cdLxUwiKMzD2bjTm57cEXNRt1rYNdTA0Cefqi_wjnNLLXMANEiZJdmioum1S1VKtySdz2FJxbnGDaSCQTB8Yok91v7Rk5CCUuAK2kNwkKViTmQT25bjJkiZjOaO1DJ9HkGW3cl0CD1f72eN9uKbIjq6n5weDaHkzF0SUtgM4zW/w640-h416/cspparse.png)]()
cspparse is a tool to evaluate Content Security Policies. It uses Google’s API to retrieve the CSP [Headers]( “Headers” ) and returns them in [ReconJSON]( “ReconJSON” ) format. Not only does it check for headers with Google’s API, it also parses the target site’s HTML to look for any CSP rules that are specified in the “ tag
## Installation
### Install Command and Download Source With Go Get
`cspparse` command will be installed to `$GOPATH/bin` and the source code (from `https://github.com/lc/cspparse`) will be found in `$GOPATH/src/github.com/lc/cspparse` with:
~ ? go get -u github.com/lc/cspparse
### Install from Source
~ ? git clone https://github.com/lc/cspparse
~ ? cd cspparse
~ ? go build
## Usage
~ ? cspparse
### Example
~ ? cspparse https://www.facebook.com
### Docker
~ > docker build -t cspparse .
Run
~ > docker run –rm -t cspparse
**[Download Cspparse]( “Download Cspparse” )**Read More
References
Back to Main