Project lead: Fernando Flores Alvarado
Short description: Randomized Header Channel is a CSRF mitigation technique that dynamically selects one header from a predefined pool to carry the CSRF token per request, breaking deterministic traffic patterns and making automated replay/interception harder.
Status: Approved project — OWASP Foundation
PoC/— Proof-of-concept demo (simple PHP + static frontend)docs/— Design and methodology documentsLICENSE— Apache License 2.0 (code)NOTICE— Attribution notice
- Clone or fork the repository.
- Copy
PoC/to your local webserver (Laragon, XAMPP, etc.). - Serve the
public_htmlfolder and update theapiURLinpublic_html/index.phpto point to your local API endpoint (e.g.,http://localhost/midominio/api/). - Test by running the frontend and clicking "Petición Fetch" or "Petición AJAX".
- Clear description of the change.
- Tests or reproducible steps for PoC changes.
- Respect the
CODE_OF_CONDUCT.mdandCONTRIBUTING.md.
- Code: Apache-2.0 (see
LICENSE) - Documentation / site content: CC BY-SA 4.0 (OWASP site policy)
- Personal Medium articles: CC BY 4.0 (author retained)
- OWASP project webpage: https://owasp.org/www-project-randomized-header-channel-for-csrf-protection
- GitHub repo: https://github.com/OWASP/www-project-randomized-header-channel-for-csrf-protection