NoClickjack is a free, instant tool that checks any website for clickjacking vulnerabilities and missing security headers. Just enter your URL and secure your site with a simple scan.
Clickjacking (also known as UI redressing) is a deceptive attack where a malicious website hides your website inside a transparent or invisible iframe. The attacker tricks users into clicking on buttons or links they don’t see, but which exist on your real website.
Attacker embeds your site inside a transparent iframe.
They place fake buttons or overlays on top.
When the user clicks, the action actually happens on your site — like:
Submitting a form
Changing settings
Making a payment
Sharing something on social media
Unauthorized transactions
Account takeovers or forced logouts
Social engineering attacks
Bypassing CSRF protections
Clickjacking can damage user trust, expose sensitive actions, and even be used to trick admins into changing critical settings.
Step-by-step Clickjacking Protection — Made Simple
Paste any URL into the scanner. No login or signup needed.
Our tool checks if your website is vulnerable to clickjacking using iframe tests and header inspection.
You’ll see whether your site is safe or at risk — with clear explanations of missing security headers.
If vulnerable, you’ll get step-by-step instructions (or a plugin download) to patch the issue right away.
Clickjacking attacks are blocked by setting specific HTTP response headers that tell browsers not to render your site inside an iframe. Here’s how to secure your site, whether it’s WordPress, Apache, NGINX, or custom PHP.
Use the NoClickjack tool to:
Header always set X-Frame-Options "SAMEORIGIN" Header always set Content-Security-Policy "frame-ancestors 'self';"
add_header X-Frame-Options "SAMEORIGIN" always; add_header Content-Security-Policy "frame-ancestors 'self';";
function add_clickjacking_protection_headers() {
header('X-Frame-Options: SAMEORIGIN');
header("Content-Security-Policy: frame-ancestors 'self'");
}
add_action('send_headers', 'add_clickjacking_protection_headers');
Go back to the NoClickjack tool, scan again, and make sure the status shows Safe.
X-Frame-Options: SAMEORIGIN Content-Security-Policy: frame-ancestors 'self';
| Step | Action | Result |
|---|---|---|
| 1 | Scan with NoClickjack | Check if your site is vulnerable |
| 2 | Add required headers | Block iframe-based attacks |
| 3 | Re-scan | Confirm safety status |
Clickjacking is fairly common, especially among websites that do not use proper security headers. Many websites unknowingly allow themselves to be embedded in iframes, making them vulnerable to such attacks.
You can enable clickjacking protection by setting the following HTTP headers on your server:
X-Frame-Options: SAMEORIGIN or DENY
Content-Security-Policy: frame-ancestors 'self';
These headers instruct browsers not to render your site in iframes on unauthorized domains.
Security best practices recommend setting both X-Frame-Options and Content-Security-Policy headers to restrict iframe embedding. Regularly scan your site and use tools like NoClickjack to monitor these settings.
Frame busting is a JavaScript technique that prevents a webpage from being embedded in an iframe by redirecting it to the top window. However, it’s outdated and not reliable — modern browsers may block it, so using security headers is preferred.
Two key headers help prevent clickjacking:
X-Frame-Options
Content-Security-Policy (specifically frame-ancestors)
These should be configured at the server or application level.
Clickjacking can:
Trick users into performing actions they didn’t intend
Lead to unauthorized transactions or data exposure
Bypass CSRF protections
Damage your brand’s trust and credibility
UI redressing is another term for clickjacking. It describes attacks where the user interface is manipulated (or “dressed”) to trick users into interacting with hidden or disguised elements.