Tool

Cookie Inspector

Runs locally in your browser; pasted data and files are not uploaded.
Tool

Cookie Inspector

Parse and analyze Set-Cookie headers or page cookie dumps to surface security, scope, and privacy issues with remediation guidance. Useful for privacy, security, and ad ops teams to quickly understand cookie risks and fixes.

Paste Set-Cookie headers or Cookie request strings to analyze attributes and highlight issues.

Cookie Inspector

Parse Set-Cookie headers or Cookie request strings and surface security issues.

Runs locally in your browser.
ExamplesTap to load a sample
ValidationAwaiting inputRFC6265 + browser rules

Parser runs locally and evaluates modern cookie requirements (SameSite, Secure, prefixes, size).

Cookies: β€”
Avg size: β€”
SameSite=None: 0
Partitioned: 0
Secure: 0
HttpOnly: 0

Parsed cookies

Filter by name, domain, or source.
Paste Set-Cookie headers or Cookie request values, then click Analyze.

Summary

Overview of issues found.

No cookies parsed yet.

More Info

How it works

The Cookie Inspector parses Set-Cookie headers and page cookies to display attributes like Domain, Path, Expires/Max-Age, Secure, HttpOnly, and SameSite, and flags common security and privacy issues with remediation tips.

Use it to audit cookie headers for security, privacy, and scope issues before deployment.

What you can do with it

  • Quickly spot insecure cookie configurations that break auth or privacy.
  • Provide clear remediation steps for engineers and QA.
  • Generate exportable audit reports for compliance teams.

Common tasks

  • Debug missing session cookies or cross-site login issues.
  • Audit tracking cookies for expiry and scope.
  • Prepare compliance reports for privacy reviews.
Data handling: This tool runs locally in your browser. Data you paste or files you upload stay on your device and are not uploaded.

Quick steps

  1. Paste one or more Set-Cookie headers or Cookie request lines.
  2. Click Analyze to parse the cookies.
  3. Review parsed cookies, warnings, and suggested fixes.

Related tools

More tools in the privacy category.

  • TCF String Decoder β€” Decode IAB TCF v2 consent strings into human-readable metadata, purposes, and vendor consent arrays. Paste a TC string from a CMP or euconsent-v2 cookie, and instantly see what it contains for QA, troubleshooting, and compliance checks. Everything runs client-side for privacy.

Before you start

  • Paste Set-Cookie headers or Cookie request lines.
  • Use example inputs to see common patterns and edge cases.

What you get

  • Parsed cookie list with attributes and warnings.
  • JSON export with full attribute details.

Common pitfalls

  • Cookie values are masked by default to avoid leaking sensitive data.
  • Request cookies (Cookie header) do not include attributes.

Tips for best results

  • Paste raw input so the tool can apply formatting consistently.
  • If output looks wrong, validate the input for missing commas or tags.
  • Use the example buttons above to sanity-check formatting and behavior.

Web Cookies Demystified: Security, Privacy, and Modern Browser Behavior

How Cookies Work in Modern Browsers

HTTP cookies are small pieces of data that web servers send to browsers for storage and return with subsequent requests. Originally designed for session management β€” keeping users logged in, remembering shopping cart contents β€” cookies have evolved to serve authentication, personalization, analytics, and advertising functions. A cookie consists of a name-value pair along with attributes that control its scope, lifetime, and security properties.

When a server sets a cookie via the Set-Cookie header, it can specify several attributes. The Domain attribute controls which domains receive the cookie. The Path attribute limits the cookie to specific URL paths. The Expires or Max-Age attribute determines how long the cookie persists. The Secure flag restricts the cookie to HTTPS connections. The HttpOnly flag prevents JavaScript from accessing the cookie, protecting against cross-site scripting attacks. The SameSite attribute controls whether the cookie is sent with cross-site requests.

Understanding these attributes is critical for security and privacy. A session cookie without the Secure flag can be intercepted on unencrypted connections. A cookie without HttpOnly is vulnerable to XSS attacks. A cookie with SameSite=None without the Secure flag is rejected by modern browsers. Each attribute represents a security decision, and misconfigured cookies are one of the most common sources of authentication failures and security vulnerabilities.

The SameSite Revolution and Third-Party Cookie Deprecation

The most significant change in cookie behavior in recent years is the enforcement of the SameSite attribute. Historically, browsers sent cookies with all requests to the cookie's domain, regardless of which site initiated the request. This behavior enabled cross-site tracking β€” advertising networks could set cookies from their domain and receive them back on any site that embedded their scripts, allowing them to track users across the web.

Modern browsers now default to SameSite=Lax for cookies that do not explicitly set a SameSite value. This means cookies are only sent with same-site requests and top-level navigations, effectively blocking most cross-site cookie transmission. Cookies that need to work in cross-site contexts (authentication for embedded content, advertising tracking) must explicitly set SameSite=None along with the Secure flag.

The ongoing deprecation of third-party cookies by major browsers represents the most significant shift in web advertising technology in decades. Chrome's Privacy Sandbox, Safari's Intelligent Tracking Prevention, and Firefox's Enhanced Tracking Protection all restrict or eliminate third-party cookies. For ad operations teams, understanding how these changes affect cookie behavior β€” which cookies are blocked, which are restricted, and which alternative mechanisms exist β€” is essential for maintaining functional advertising and analytics systems.

Auditing Cookies for Security and Compliance

Cookie auditing involves examining the cookies set by a website to identify security misconfigurations, privacy issues, and compliance gaps. Key checks include verifying that session cookies have the Secure and HttpOnly flags, that SameSite is set appropriately for each cookie's purpose, that cookie lifetimes are reasonable (a tracking cookie with a 10-year expiry raises privacy concerns), and that sensitive data is not stored in cookie values.

For privacy compliance under GDPR, CCPA, and similar regulations, cookie audits also verify that cookies are categorized correctly (necessary, functional, analytics, advertising) and that non-necessary cookies are not set before the user provides consent. This audit process requires parsing the actual Set-Cookie headers to see exactly what attributes are set, rather than relying on documentation that may be outdated or incomplete.

A cookie inspection tool that parses Set-Cookie headers, displays all attributes clearly, and flags common security and privacy issues provides the foundation for systematic cookie auditing. By surfacing missing Secure flags, absent HttpOnly protection, permissive SameSite settings, and excessive lifetimes in a structured report, it transforms cookie auditing from a manual, error-prone task into a guided, repeatable process.

Frequently asked questions

Is it free to use?

Yes. Core tools are free and accessible without signup.

Does it upload my data?

This tool runs locally in your browser. Data you paste or files you upload stay on your device and are not uploaded.

What if I spot a bug?

Please reach out via the Contact page with a reproduction example.

Can it read browser cookies directly?

No. Paste the Cookie or Set-Cookie header values you want to inspect.

Does it handle multiple Set-Cookie headers?

Yes. Paste multiple lines or combined headers and it will split them.

Are cookie values uploaded?

No. Parsing runs locally, and values are masked by default.

Standards & references

Official specs that inform how this tool interprets data.