An official document certifying the result of a single Web-PSQC test item. Use it to quickly prove performance in a specific area or confirm partial improvements.
A comprehensive certificate issued after completing all 16 tests across Performance, Security, Quality, and Content, based on a weighted aggregate score.
Grade | Score | Distribution (est.) |
---|---|---|
A+ | 900 – 1000 | Top ~2% |
A | 800 – 899 | Top ~8% |
B | 700 – 799 | Top ~15% |
C | 600 – 699 | Top ~25% |
D | 500 – 599 | Top ~40% |
F | < 500 | Remaining (100%) |
Test | Method | A+ | A | B | C | D | F |
---|---|---|---|---|---|---|---|
Global Speed |
8 regions, new/return visits TTFB & Load Performance check |
• Origin: TTFB ≤ 200ms, Load ≤
1.5s
• Global average: TTFB ≤ 800 ms, Load ≤ 2.5s • All regions: TTFB ≤ 1.5 s, Load ≤ 3s • Return visit improvement: 80%+ |
• Origin: TTFB ≤ 400ms, Load ≤
2.5s
• Global average: TTFB ≤ 1.2 s, Load ≤ 3.5s • All regions: TTFB ≤ 2 s, Load ≤ 4s • Return visit improvement: 60%+ |
• Origin: TTFB ≤ 800ms, Load ≤
3.5s
• Global average: TTFB ≤ 1.6 s, Load ≤ 4.5s • All regions: TTFB ≤ 2.5 s, Load ≤ 5.5s • Return visit improvement: 50%+ |
• Origin: TTFB ≤ 1.2s, Load ≤
4.5s
• Global average: TTFB ≤ 2.0 s, Load ≤ 5.5s • All regions: TTFB ≤ 3.0 s, Load ≤ 6.5s • Return visit improvement: 37.5%+ |
• Origin: TTFB ≤ 1.6s, Load ≤
6.0s
• Global average: TTFB ≤ 2.5 s, Load ≤ 7.0s • All regions: TTFB ≤ 3.5 s, Load ≤ 8.5s • Return visit improvement: 25%+ |
• Below the above criteria
|
Load Test |
Virginia region k6 load test P95 response time Stability check |
Basic conditions:
• 100 VUs + 60 s • Think time: 3–10 s Performance criteria: • P95 response time: < 1000 ms • Error rate: < 0.1% • Stability: P90 ≤ 200% of average |
Basic conditions:
• 100 VUs + 60 s • Think time: 3–10 s Performance criteria: • P95 response time: < 1200 ms • Error rate: < 0.5% • Stability: P90 ≤ 240% of average |
Basic conditions:
• 50+ VUs + 45+ s • Think time: 3–10 s Performance criteria: • P95 response time: < 1500 ms • Error rate: < 1.0% • Stability: P90 ≤ 280% of average |
Basic conditions:
• 30+ VUs + 30+ s • Think time: 3–10 s Performance criteria: • P95 response time: < 2000 ms • Error rate: < 2.0% • Stability: P90 ≤ 320% of average |
Basic conditions:
• 10+ VUs + 15+ s • Think time: 3–10 s Performance criteria: • P95 response time: < 3000 ms • Error rate: < 5.0% • Stability: P90 ≤ 400% of average |
• Below the above criteria
|
Mobile Test |
iPhone/Galaxy (Playwright) Median response time (repeat visit) JS errors · render width overflow |
• Median response time: ≤ 800 ms
• JS runtime errors: 0 • Render width overflow: None |
• Median response time: ≤ 1200 ms
• JS runtime errors: ≤ 1 • Render width overflow: None |
• Median response time: ≤ 2000 ms
• JS runtime errors: ≤ 2 • Render width overflow: Allowed |
• Median response time: ≤ 3000 ms
• JS runtime errors: ≤ 3 • Render width overflow: Frequent |
• Median response time: ≤ 4000 ms
• JS runtime errors: ≤ 5 • Render width overflow: Severe |
• Below the above criteria
|
Test | Method | A+ | A | B | C | D | F |
---|---|---|---|---|---|---|---|
SSL Basics |
testssl.sh results Protocols · ciphers · certificate Vulnerabilities summary |
• Only latest TLS used, no known vulnerabilities
• Strong cipher suites applied • Certificate and chain fully valid • HSTS and other settings strong |
• TLS 1.2/1.3 supported; legacy blocked
• No major vulnerabilities • Possible minor weak ciphers or misconfigurations • Generally safe |
• Mostly secure protocols
• Some weak cipher suites present • Many testssl.sh WEAK warnings • Needs improvement |
• Some legacy TLS enabled
• High use of weak crypto • Certificate near expiry / simple DV • Few vulnerabilities found |
• SSLv3/TLS 1.0 permitted
• Many weak ciphers enabled • Certificate chain errors/near expiry • Multiple vulnerabilities present |
• SSL/TLS configuration fundamental flaws
• Vulnerable protocols broadly allowed • Certificate expired/self‑signed • Many testssl.sh FAIL/VULNERABLE |
SSL Advanced |
SSLyze deep analysis Protocols · ciphers · certificate OCSP · ALPN |
• Only TLS 1.3/1.2 allowed; no weak ciphers (all PFS)
• Certificate ECDSA or RSA≥3072, complete chain; expiry ≥ 60 days • OCSP Stapling enabled (Must‑Staple when supported) • ALPN h2 negotiated; compression/insecure renegotiation disabled |
• TLS 1.3/1.2, strong ciphers first (mostly PFS)
• Certificate RSA≥2048, SHA‑256+, valid chain; expiry ≥ 30 days • OCSP Stapling active (occasional failure allowed) • h2 supported or proper ALPN; risky features disabled |
• TLS 1.2 required; 1.3 optional/unsupported; some CBC
• Certificate RSA≥2048, chain valid (expiry ≥ 14 days) • OCSP Stapling disabled (OCSP responses acceptable) • h2 may be unsupported; risky features mostly disabled |
• TLS 1.0/1.1 enabled or many weak ciphers (low PFS)
• Chain missing/weak signature (SHA‑1) or expiry imminent (≤ 14 days) • Stapling absent; revocation status unclear • h2 unsupported; some risky features enabled |
• Obsolete protocols/ciphers (SSLv3/EXPORT/RC4) allowed
• Certificate mismatch/chain errors frequent • Stapling fails; revocation checks impossible • Compression/insecure renegotiation enabled |
• Defects at the level of handshake failures
• Expired/self‑signed/hostname mismatch • Widespread weak protocols/ciphers allowed • Overall TLS configuration breakdown |
Headers | Header completeness |
• Strong CSP (nonce/hash/strict‑dynamic; no unsafe-*)
• XFO: DENY/SAMEORIGIN or limited frame‑ancestors • X-Content-Type: nosniff • Referrer-Policy: strict-origin-when-cross-origin or better • Permissions‑Policy: unneeded features blocked • HSTS: ≥ 6 months + include subdomains |
• CSP present (weaker allowed) or non‑CSP 5 items strong
• XFO applied (or frame‑ancestors limited) • X-Content-Type: nosniff • Referrer‑Policy: recommended value • Permissions‑Policy: basic restrictions • HSTS: ≥ 6 months |
• CSP none/weak
• XFO applied • X-Content-Type: nosniff present • Referrer‑Policy: okay/average • Permissions‑Policy: partially restricted • HSTS: short or no subdomains |
• Some headers present
• CSP none/weak • Referrer‑Policy weak • X-Content-Type missing • HSTS absent or very short |
• Only 1–2 key headers present
• No CSP • Referrer weak/absent • Many other headers missing |
• Security headers virtually absent
• No CSP/XFO/X-Content • No Referrer‑Policy • No HSTS |
Vulnerability Scan |
Passive response analysis HTTP header/body checks (excluding CSP warnings)
OWASP ZAP Passive Scan
Main page only (1 URL) No child crawling |
• High/Medium 0
• Security headers complete (HTTPS, HSTS, X‑Frame‑Options, etc.) • No sensitive data exposure (cookies, comments, debug) • Server/framework version info minimized • CSP checks performed in a separate item |
• High 0, Medium ≤1
• Security headers mostly present, minor gaps • No sensitive data exposure • Minor info exposure (e.g., server type) |
• High ≤1, Medium ≤2
• Some headers missing (HSTS, X‑XSS‑Protection, etc.) • Session cookies missing Secure/HttpOnly • Minor internal identifiers in comments/meta |
• High ≥ 2 or Medium ≥ 3
• Key security headers absent • Sensitive parameters/tokens exposed in response • Weak session management (cookie attributes inadequate) |
• Multiple Highs
• Authentication/session attributes severely missing • Debug/dev info exposed (stack traces, internal IPs) • Exposed admin consoles/config files |
• Widespread High vulnerabilities
• No HTTPS or entirely bypassed • Sensitive data in plaintext/exposed • Lack of security headers and session controls overall |
CVE Check |
Freshness‑based Nuclei templates
2024–2025
(non‑intrusive, single URL) |
• Critical/High 0, Medium 0
• 2024–2025 CVEs not detected • No exposed directories/debug/sensitive files • Security headers/banners minimal |
• High ≤1, Medium ≤1
• No direct exposure to recent CVEs (bypass/conditions required) • Minor configuration warnings (informational) • Patching/configuration good |
• High ≤ 2 or Medium ≤ 3
• Some config/banner exposures • Admin endpoints protected (hard to bypass) • Patch delays for recent security releases |
• High ≥ 3 or many Medium
• Exposed sensitive files/backups/indexing • Outdated components inferred (banners/meta) • Patching/configuration needs systematic improvement |
• Critical ≥ 1 or easily exploitable High
• Recent (2024–2025) CVEs directly impactful • Risky endpoints/files accessible without auth • Sensitive info exposed (build/logs/env) |
• Multiple Critical/High present simultaneously
• Latest CVEs widely unpatched/exposed • Lacking basic security configs (defensive headers/access control) • Absent security guardrails overall |
Test | Method | A+ | A | B | C | D | F |
---|---|---|---|---|---|---|---|
Lighthouse |
Integrated analysis of Performance + SEO + Accessibility (Lighthouse) |
• Performance: 90 points+
• Accessibility: 90 points+ • Best Practices: 90 points+ • SEO: 90 points+ • Overall average: 95 points+ |
• Performance: 85 points+
• Accessibility: 85 points+ • Best Practices: 85 points+ • SEO: 85 points+ • Overall average: 90 points+ |
• Performance: 75 points+
• Accessibility: 75 points+ • Best Practices: 75 points+ • SEO: 75 points+ • Overall average: 80 points+ |
• Performance: 65 points+
• Accessibility: 65 points+ • Best Practices: 65 points+ • SEO: 65 points+ • Overall average: 70 points+ |
• Performance: 55 points+
• Accessibility: 55 points+ • Best Practices: 55 points+ • SEO: 55 points+ • Overall average: 60 points+ |
• Performance: ≤ 54 points
• Accessibility: ≤ 54 points • Best Practices: ≤ 54 points • SEO: ≤ 54 points • Overall average: ≤ 59 points |
Accessibility |
WCAG 2.1 rule‑based Automated accessibility checks Evaluated via counts of errors/warnings (axe‑core) |
• critical=0,
serious=0
• Total violations ≤ 3 • Keyboard/ARIA/alt text/contrast all good |
• critical=0, serious ≤
3
• Total violations ≤ 8 • Key landmarks/labels mostly good |
• critical ≤ 1, serious ≤
6
• Total violations ≤ 15 • Some contrast/labels need improvement |
• critical ≤ 3, serious ≤
10
• Total violations ≤ 25 • Focus/ARIA structure needs remediation |
• critical ≤ 6 or serious ≤
18
• Total violations ≤ 40 • Many keyboard traps/label omissions |
• Exceeds the above (many critical/serious)
• Difficult to use with screen readers/keyboard |
Compatibility |
Chrome / Firefox / Safari Based on JS/CSS errors (Playwright) |
• Chrome / Firefox / Safari all pass
• JS errors: 0 • CSS rendering errors: 0 |
• Major browser support good
• JS errors ≤ 1 • CSS errors ≤ 1 |
• Minor differences among browsers
• JS errors ≤ 3 • CSS errors ≤ 3 |
• Degraded functionality in some browsers
• JS errors ≤ 6 • CSS errors ≤ 6 |
• Many compatibility issues
• JS errors ≤ 10 • CSS errors ≤ 10 |
• Cannot operate on major browsers
• JS errors > 10 • CSS errors > 10 |
Responsive UI |
By key viewport Overflow pixels (px) measurement (mobile · foldable · tablet · desktop) |
• 0 overflows across all viewports
• Body render width always within viewport |
• Overflows ≤ 1 and each ≤ 8 px
• On narrow mobile (≤390 px): 0 overflows |
• Overflows ≤ 2 and each ≤ 16 px
or on narrow mobile: ≤ 8 px (1) |
• Overflows ≤ 4 or a single overflow is
17–32px
|
• Overflows > 4 or a single overflow is
33–64px
|
• Measurement failed or overflow ≥ 65 px
|
Test | Method | A+ | A | B | C | D | F |
---|---|---|---|---|---|---|---|
Links |
Internal/external/image links Anchor link status checks Grade by error rate (Broken Link Checker) |
• Internal/external/image link error rate: 0%
• Redirect chains ≤ 1 hop • Anchor links 100% valid |
• Overall error rate ≤ 1%
• Redirect chains ≤ 2 hops • Anchor links mostly valid |
• Overall error rate ≤ 3%
• Redirect chains ≤ 3 hops • Some invalid anchor links |
• Overall error rate ≤ 5%
• Many link warnings (timeouts/SSL issues) • Frequent anchor link errors |
• Overall error rate ≤ 10%
• Redirect loops or long chains • Many broken image links |
• Overall error rate ≥ 10%
• Many broken internal links • Anchor/image links largely broken |
Structured Data |
JSON‑LD/Schema.org based Structured data errors/warnings (Google Rich Results Test) |
• Schema.org schemas fully implemented
• JSON‑LD format used • Rich snippets 100% recognized • 0 errors, no warnings • Appropriate schema types applied |
• Key schemas valid
• Implemented via JSON‑LD • Rich snippets mostly recognized • No errors, ≤ 2 warnings |
• Some core schemas missing
• Rich snippets recognized partially • ≤ 1 error, ≤ 5 warnings |
• Structured data incomplete
• Rich snippets unstable • ≤ 3 errors, many warnings • Some types inappropriate |
• Structured data inconsistent/duplicated
• Rich snippets not recognized • ≥ 4 errors • Many warnings and wrong types |
• Structured data not implemented
• No JSON‑LD/Microdata • Pervasive errors • Search engine rich snippets not possible |
Crawl |
robots/sitemap validation + full crawl via sitemap (internal quality/duplication analysis) |
• robots.txt correctly applied
• sitemap.xml present; no missing/404 • All target pages return 2xx • Site‑wide quality average ≥ 85 points • Duplicate content ≤ 30% |
• robots.txt correctly applied
• sitemap.xml present; consistent • All target pages return 2xx • Site‑wide quality average ≥ 85 points |
• robots.txt and sitemap.xml present
• All target pages return 2xx • Site‑wide quality average not required |
• robots.txt and sitemap.xml present
• Some targets include 4xx/5xx |
• robots.txt and sitemap.xml present
• Can generate target URLs (robots allowed + sitemap collected) • However, low successful access rate or quality checks not feasible |
• No robots.txt or no sitemap.xml
• Cannot generate crawl target list |
Metadata |
Completeness‑based (Meta Inspector CLI) |
• Title: optimal length (50–60 chars)
• Description: optimal length (120–160 chars) • Open Graph fully implemented • Canonical accurate + Twitter Cards complete |
• Title/Description within acceptable range
• Open Graph fully implemented • Canonical correctly set • Twitter Cards optional |
• Title/Description basic and valid
• Open Graph basic tags • Canonical set • Some metadata omissions allowed |
• Title/Description improper length
• Open Graph incomplete (key tags missing) • Canonical inaccurate or missing • Overall metadata quality degraded |
• Title/Description severely improper length
• Open Graph insufficient basic tags • Canonical incorrectly set • Insufficient basic metadata |
• Title/Description not provided
• Open Graph absent • Metadata largely not implemented • No basic SEO configurations |
Every individual test is scored on a 100‑point scale.
(e.g., SSL Basics → 85, Mobile Test → 92, Links → 78)Web-PSQC is an independent website quality assessment service, built with reference to widely recognized web standards.
International standard for software quality models
Web-PSQC mapping: We reference ISO 25010 quality characteristics to organize the Performance, Security, Quality, and Content areas. (Using Web-PSQC’s own evaluation approach)
W3C Web Content Accessibility Guidelines
Web-PSQC mapping: We reference WCAG 2.1 AA to build the accessibility deep‑dive test and use the axe‑core engine for automated checks.
Google’s page experience metrics
Web-PSQC mapping: We reference Core Web Vitals for performance assessments and measure real‑world experience via global region tests.
Web application security practices
Web-PSQC mapping: We reference OWASP Top 10 and CVE databases to set vulnerability scan criteria, using OWASP ZAP and the Nuclei engine.
Web-PSQC adapts methods and criteria from international standards to modern web environments. We fully disclose detailed methodologies and measured raw data for each test to ensure transparent, trustworthy results. Clients can use the provided data to define concrete, actionable website improvements.
Metric | Excellence threshold | Global attainment | Source | Related Web-PSQC test |
---|---|---|---|---|
Lighthouse all categories 90+ | Performance, Accessibility, Best Practices, SEO all 90+ |
< 2% | HTTP Archive (Lighthouse distribution) | Quality/lighthouse |
Core Web Vitals pass | LCP < 2.5 s, INP/TBT < 200 ms, CLS < 0.1 | ≈ 43-44% | Chrome UX Report (CrUX) | Performance/speed + Quality/lighthouse |
SSL Labs A+ grade | TLS 1.3, HSTS, hardened configuration | ≈ 46% | SSL Labs | Security/ssl + Security/sslyze |
WCAG 2.1 AA compliance (automated checks) |
0 detected errors | ≈ 5% (94.8% detection rate) |
WebAIM Million | Quality/accessibility |
No OWASP Top 10 vulns | 0 major vulnerabilities | ≈ 30-40% | OWASP Top 10 | Security/scan + Security/nuclei |
Schema.org structured data fully implemented |
Implemented on all pages | ≈ 25–35% | W3C structured data stats | Content/structure |
Full browser compatibility | Chrome, Firefox, Safari all OK | ≈ 60–70% | MDN compatibility data | Quality/compatibility |
Sites excelling in all seven areas are nearly 0%. A practical view focuses on the four core indicators: Quality, Performance, Security, and Accessibility.