Website Trust Signals Checker: What Agencies Should Review Before Client Handover
Use a website trust signals checker to review HTTPS, TLS, headers, CAA, robots.txt, sitemap.xml, and security.txt before client handover.
Updated 9 May 2026
See exactly where your client domains stand.
Run a free audit on up to 10 domains — SSL expiry, domain expiry, and DNS health in one report. No signup needed.
A website trust signals checker reviews public signals that are visible from a normal website request: HTTPS/TLS, certificate expiry, HTTP-to-HTTPS redirect behavior, key response headers, cookie flags, CAA DNS records, robots.txt, sitemap.xml, and security.txt. It is useful before a client handover because it catches obvious public gaps that can create awkward client questions later.
This tool checks public trust signals only. It is not a security audit, vulnerability scan, malware scan, or compliance check.
For agencies, the value is practical. A handover report should not only say that the design is live. It should show that the public website basics are in place, that certificate renewal signals look reasonable, that common header hygiene is not missing, and that public metadata files are discoverable. CertPilot's Client Website Trust Check gives teams a fast first pass for one public site. For a broader portfolio review, run the free 10-domain agency audit after the single-site review.
For the broader agency framework around public trust signals, use the client website trust signals guide.
Quick answer: what a website trust signals checker reviews
A website trust signals checker looks at public website posture from the outside, using only a small number of normal public requests. The core checklist is:
- Whether the public URL responds over HTTPS.
- Whether HTTP redirects to HTTPS.
- Whether the TLS certificate is present and how many days remain before expiry.
- Whether expected response headers are present, including HSTS, X-Content-Type-Options, framing controls, Referrer-Policy, Permissions-Policy, and CSP presence.
- Whether cookies visible on the public response include useful flags such as
HttpOnlyandSameSitewhere applicable. - Whether
/.well-known/security.txt,/robots.txt, and/sitemap.xmlare available. - Whether the domain publishes CAA records that guide certificate authority issuance.
These checks do not prove full website quality. They provide a practical review layer that agencies can include in onboarding, launch QA, and care-plan reporting.
Why agencies should check trust signals before client handover
Client handover is the moment when small technical details become visible to non-technical stakeholders. A missing HTTPS redirect, a certificate close to expiry, or absent public metadata can make an otherwise polished project feel unfinished.
Agencies also inherit uneven hosting stacks. One client may be on a managed WordPress host. Another may use Cloudflare, Webflow, Shopify, a custom Next.js app, or a legacy shared hosting account. Each stack exposes different defaults. Header settings may live in the CDN, web server, app framework, or plugin layer. CAA records may sit with the DNS provider rather than the host. security.txt may need a content change, while sitemap.xml may be generated by the CMS.
A short public trust-signal review gives the team a repeatable workflow. It keeps handovers factual: here is what was checked, here is what is present, here is what should be improved, and here is what needs the host, developer, or DNS owner.
The public trust-signal checklist
| Signal | What it shows | Why agencies should care | Tool/check | |---|---|---|---| | HTTPS response | The public URL serves over TLS | Clients expect the main site to load over HTTPS | Browser, Trust Check | | HTTP to HTTPS redirect | Plain HTTP requests move to HTTPS | Prevents users from staying on the wrong scheme | Trust Check, hosting panel | | Certificate expiry | Days remaining before renewal is needed | Expiry surprises become urgent client tickets | Trust Check, Watchtower | | HSTS | Browser should prefer HTTPS after first visit | Shows HTTPS-only behavior is being signaled | Trust Check, host/CDN | | X-Content-Type-Options | Browser should not MIME-sniff responses | Common baseline header hygiene | Trust Check | | Framing control | Site declares how it can be framed | Useful public posture signal | Trust Check | | Referrer-Policy | Controls referrer detail shared on navigation | Reduces unnecessary referrer exposure | Trust Check | | Permissions-Policy | Limits browser features by default | Documents intentional feature access | Trust Check | | CSP presence | Site publishes a content policy signal | Presence is useful; deep quality needs manual review | Trust Check | | Cookie flags | Public cookies expose helpful flags | Shows visible cookie handling patterns | Trust Check | | security.txt | Contact path for reports | Helps responsible reports reach the right inbox | Trust Check | | robots.txt | Crawler instructions exist | Useful for search and site operations | Trust Check | | sitemap.xml | URL discovery file exists | Helps technical SEO review and indexing workflows | Trust Check | | CAA record | DNS names allowed certificate authorities | Helps avoid renewal authorization surprises | Trust Check, Pre-Flight |
HTTPS and TLS signals
The first trust-signal layer is HTTPS/TLS. Agencies should confirm the canonical public URL works over HTTPS, that HTTP redirects to HTTPS, and that the certificate has enough runway before expiry.
Certificate expiry is especially important as renewal windows tighten. A site that looks fine today can still be a near-term client risk if the certificate is within a short renewal window and the agency does not own the DNS, hosting, or certificate automation. The single-site trust check is useful for public posture; CertPilot's 47-day SSL certificate guide explains why shorter renewal cycles increase the need for repeatable review.
Security header signals
Headers are not a complete quality judgment. They are public signals returned by the server, CDN, or application. For a handover review, agencies should look for common baseline headers:
Strict-Transport-SecurityX-Content-Type-OptionsX-Frame-Optionsor CSPframe-ancestorsReferrer-PolicyPermissions-PolicyContent-Security-Policy
The right values depend on the site, application, and hosting stack. For example, a complex app may need a carefully tested CSP rollout, while a simple marketing site may only need a baseline policy. The trust check reports presence and obvious signals, then points the team toward recommended improvement rather than making broad claims.
Cookie flag signals
Some public pages set cookies for analytics, consent banners, personalization, or application sessions. When those cookies are visible in the first public response, agencies can review whether flags such as HttpOnly and SameSite are present where appropriate.
This is only a visible-response check. Cookies set after JavaScript runs, after consent, or after login are outside the public passive check. That limitation matters in reports: a missing visible flag is worth reviewing, but an unknown result does not mean the entire site lacks thoughtful cookie handling.
Public metadata files: robots.txt, sitemap.xml, security.txt
Public metadata files help crawlers, tools, and people understand the website:
robots.txttells crawlers which paths are allowed or disallowed.sitemap.xmlhelps discovery and technical SEO review.security.txtgives a public contact path for responsible reports.
For agencies, these files are easy to miss during launches because they are not always part of visual QA. They can also be overwritten by CMS settings, plugins, hosting defaults, or deployment pipelines. A quick public check catches whether the files are reachable on the live domain.
DNS trust signals: why CAA matters
CAA records tell certificate authorities which CAs may issue certificates for a domain. For agencies, CAA matters because the website team may manage the site while the client or IT provider manages DNS. A CAA record that does not match the active certificate provider can interrupt future renewals.
Use the trust check for a quick CAA presence review. Use ACME readiness checks and the CAA renewal guide when the team needs to understand certificate automation and DNS ownership in more depth.
What a passive check can catch
A passive public check can catch missing or unexpected public signals:
- The site does not redirect HTTP to HTTPS.
- The TLS certificate is close to expiry.
- A common header is absent from the checked response.
- Public cookies lack visible flags.
security.txt,robots.txt, orsitemap.xmlare not reachable.- CAA records are missing or may need review.
These findings are useful because they are observable and easy to discuss with a host, developer, or DNS owner.
What a passive check cannot catch
A passive public check cannot inspect every route, run JavaScript, log in, test forms, inspect server configuration, or evaluate all application behavior.
We make a small number of public requests to the domain you submit. We do not log in, scan plugins, or crawl the site.
Some signals are only visible if the site responds normally on the public URL being checked. Sites behind WAFs, geo-blocks, or aggressive bot protection may show unknown rather than missing.
For more detail on how CertPilot describes public checks, data sources, and limitations, see the CertPilot methodology.
How to use Client Website Trust Check
Use the Client Website Trust Check when:
- A site is about to launch.
- A redesign is being handed over.
- A client is entering a care plan.
- A host or CDN has recently changed.
- DNS has moved between providers.
- A client asks for proof that public website basics were reviewed.
Submit the public URL, review the score and category breakdown, then route each recommendation to the right owner: developer, host, CDN manager, DNS owner, or client stakeholder.
How this feeds agency proof reports and client conversations
Trust-signal checks are useful because they produce concrete report language. Instead of saying "we checked the website," an agency can say:
- HTTPS and TLS were reviewed.
- Certificate runway was checked.
- Public headers were reviewed.
- CAA and public metadata files were checked.
- Follow-up items were assigned to the right owner.
For multiple domains, pair the trust check with a 10-domain agency audit so the client conversation covers SSL, DNS, domain expiry, and email-authentication posture across a portfolio.
Related Resources
- Client website health report template
- Monthly proof reports for agencies
- SSL monitoring for web agencies
- CAA records for client SSL renewals
Frequently Asked Questions
What is a website trust signals checker?
A website trust signals checker is a practical public review of signals such as HTTPS/TLS, certificate expiry, redirect behavior, headers, cookie flags, CAA records, and public metadata files. It helps agencies find visible gaps before handover or during client onboarding. It does not inspect private pages, run browser automation, crawl the whole site, or judge every part of the hosting stack.
When should an agency run this check?
Run it before launch, before handover, after hosting or DNS changes, during new-client onboarding, and before care-plan renewal conversations. These are the moments when a missing signal can create extra back-and-forth. The check is fast enough to use as a standard QA step, then any recommendation can be routed to the right owner.
Is this the same as a technical SEO audit?
No. It overlaps with technical SEO because robots.txt, sitemap.xml, HTTPS, and headers are public site signals, but it is narrower. A technical SEO audit may include crawling, indexation review, content analysis, structured data, internal links, and performance. The website trust signals checker focuses on passive public posture signals.
Why does CAA matter for client websites?
CAA matters because it can affect which certificate authorities may issue certificates for the domain. If the CAA record does not match the certificate provider used by the host or automation workflow, renewals may require urgent DNS changes. Agencies should review CAA when clients own DNS separately from the website stack.
What should I do with an unknown result?
Treat unknown as "needs context," not as a failure. A site may block automated requests, return different responses by region, or hide a signal behind a CDN layer. The next step is to check the same item in the hosting panel, CDN settings, or DNS provider and document what the owner confirms.
Can I use this for a multi-site client portfolio?
Use the single-site trust check for one public URL at a time. For a broader portfolio conversation, use the free 10-domain audit to review multiple client domains together, then add trust-signal notes for priority sites such as homepages, lead forms, and high-value landing pages.
Monitor every client domain from one dashboard.
CertPilot checks SSL expiry, DNS records, and domain registration daily — then sends one alert when action is needed. 14-day free trial, no card required.