Lighthouse Best Practices Cheat Sheet
Checklist of general practices to improve the overall code health of your web app
Monday, February 7, 2022
TL;DR
Use Lighthouse to check if your website is following the list of best practices. You will see the same exact information in the Best Practices report.
Here some of the best practices audits to improve the code health of your web page. To learn more, check this page where I based the categorization.
General best practices
- Page has the HTML doctype
Specifying a doctype prevents the browser from switching to quirks-mode.
- No browser errors logged to the console
Errors logged to the console indicate unresolved problems. They can come from network request failures and other browser concerns.
- Displays images with correct aspect ratio
Image display dimensions should match natural aspect ratio.
- Properly defines charset
A character encoding declaration is required. It can be done with a <meta>
tag in the first 1024 bytes of the HTML or in the Content-Type HTTP response header.
- Fonts with font-display: optional are preloaded
Preload optional
fonts so first-time visitors may use them.
- Avoids unload event listeners
The unload
event does not fire reliably and listening for it can prevent browser optimizations like the Back-Forward Cache. Consider using the pagehide
or visibilitychange
events instead.
Make your page secure
- Uses HTTPS
All sites should be protected with HTTPS, even ones that don't handle sensitive data. This includes avoiding mixed content, where some resources are loaded over HTTP despite the initial request being served over HTTPS. HTTPS prevents intruders from tampering with or passively listening in on the communications between your app and your users, and is a prerequisite for HTTP/2 and many new web platform APIs.
- Detected JavaScript libraries
All front-end JavaScript libraries detected on the page.
- Ensure CSP is effective against XSS attacks
A strong Content Security Policy (CSP) significantly reduces the risk of cross-site scripting (XSS) attacks.
- Links to cross-origin destinations are safe
Add rel="noopener"
or rel="noreferrer"
to any external links to improve performance and prevent security vulnerabilities.
- Avoids front-end JavaScript libraries with known security vulnerabilities
Some third-party scripts may contain known security vulnerabilities that are easily identified and exploited by attackers.
Create a good user experience
- Serves images with appropriate resolution
Image natural dimensions should be proportional to the display size and the pixel ratio to maximize image clarity.
- Avoids requesting the geolocation permission on page load
Users are mistrustful of or confused by sites that request their location without context. Consider tying the request to a user action instead.
- Avoids requesting the notification permission on page load
Users are mistrustful of or confused by sites that request to send notifications without context. Consider tying the request to user gestures instead.
- Allows users to paste into password fields
Preventing password pasting undermines good security policy.
Avoid deprecated technologies
- Avoids Application Cache
Application Cache is deprecated.
- Avoids deprecated APIs
Deprecated APIs will eventually be removed from the browser.
Diagnostics audits
- Detected JavaScript libraries
All front-end JavaScript libraries detected on the page.
- No issues in the Issues panel in Chrome Devtools
Issues logged to the Issues
panel in Chrome Devtools indicate unresolved problems. They can come from network request failures, insufficient security controls, and other browser concerns. Open up the Issues panel in Chrome DevTools for more details on each issue.
- Page has valid source maps
Source maps translate minified code to the original source code. This helps developers debug in production. In addition, Lighthouse is able to provide further insights. Consider deploying source maps to take advantage of these benefits.