Cspparse – A Tool To Evaluate Content Security Policies
Discription

[![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik3Z0y7G7sHzYzV0cdLxUwiKMzD2bjTm57cEXNRt1rYNdTA0Cefqi_wjnNLLXMANEiZJdmioum1S1VKtySdz2FJxbnGDaSCQTB8Yok91v7Rk5CCUuAK2kNwkKViTmQT25bjJkiZjOaO1DJ9HkGW3cl0CD1f72eN9uKbIjq6n5weDaHkzF0SUtgM4zW/w640-h416/cspparse.png)]()

cspparse is a tool to evaluate Content Security Policies. It uses Google’s API to retrieve the CSP [Headers]( “Headers” ) and returns them in [ReconJSON]( “ReconJSON” ) format. Not only does it check for headers with Google’s API, it also parses the target site’s HTML to look for any CSP rules that are specified in the “ tag

## Installation

### Install Command and Download Source With Go Get

`cspparse` command will be installed to `$GOPATH/bin` and the source code (from `https://github.com/lc/cspparse`) will be found in `$GOPATH/src/github.com/lc/cspparse` with:

~ ? go get -u github.com/lc/cspparse

### Install from Source

~ ? git clone https://github.com/lc/cspparse
~ ? cd cspparse
~ ? go build

## Usage

~ ? cspparse

### Example

~ ? cspparse https://www.facebook.com

### Docker

~ > docker build -t cspparse .

Run

~ > docker run –rm -t cspparse

**[Download Cspparse]( “Download Cspparse” )**Read More

Back to Main

Subscribe for the latest news: