If you’ve noticed a spike of 404 errors for files like ads.txt, security.txt, sellers.json, or various /.well-known/ paths, the culprit is likely the WebPageTest.org bot. Unlike simple crawlers, WebPageTest uses real Chromium browsers to test websites, which means JavaScript executes and your error monitoring captures the failed network requests.

These errors don’t indicate problems with your website. They’re the result of WebPageTest probing for standard configuration files that most websites don’t have.

Important: These errors come from an external testing service, not from your users or your application code.

The Problem

WebPageTest.org is a popular web performance testing tool that uses real browsers to analyze websites. When WebPageTest (or services built on it, like HTTP Archive) scans your site, it checks for various well-known configuration files. If those files don’t exist, the requests return 404 errors.

Because WebPageTest runs in a real Chromium browser, your JavaScript error monitoring picks up these failed network requests just like it would for any other browser. You’ll see 404 errors like:

  • GET /dsrdelete.json
  • GET /ads.txt
  • GET /sellers.json
  • GET /.well-known/security.txt
  • GET /.well-known/apple-app-site-association

Key point: These are bot-generated requests checking for files your site may legitimately not have. The 404 response is correct behavior.

Understanding the Root Cause

WebPageTest bot errors appear in your JavaScript monitoring for a specific reason:

Real Browser Execution

Most web crawlers make simple HTTP requests without executing JavaScript. WebPageTest is different. It launches actual Chromium browser instances to render pages, run JavaScript, and measure real-world performance. This means:

  • Your analytics and error monitoring scripts execute
  • Network requests (including failed ones) are visible to client-side tools
  • TrackJS captures these 404 errors because they happen in a real browser context

What Files Does WebPageTest Check?

WebPageTest probes for numerous standard configuration files:

Advertising Files:

  • /ads.txt - Authorized Digital Sellers
  • /app-ads.txt - Authorized Sellers for Apps
  • /sellers.json - Supply chain transparency
  • /dsrdelete.json - IAB Data Deletion Request Framework

Security Files:

  • /.well-known/security.txt - Security contact information
  • /.well-known/change-password - Password change URL

Authentication and Identity:

  • /.well-known/passkey-endpoints - Passkey configuration
  • /.well-known/webauthn - WebAuthn configuration
  • /.well-known/web-identity - Federated identity

Mobile App Integration:

  • /.well-known/apple-app-site-association - iOS Universal Links
  • /.well-known/assetlinks.json - Android App Links

Privacy and Platform:

  • /.well-known/gpc.json - Global Privacy Control
  • /.well-known/privacy-sandbox-attestations.json - Chrome Privacy Sandbox
  • /.well-known/related-website-set.json - Related Website Sets

Other:

  • /llms.txt - LLM crawler instructions
  • /.well-known/resource-that-should-not-exist-whose-status-code-should-not-be-200/ - HTTP compliance test

If you’re seeing 404 errors for several of these files around the same time, WebPageTest is almost certainly the source.

Who Uses WebPageTest?

Beyond individual developers testing their sites, WebPageTest infrastructure powers larger projects:

  • HTTP Archive runs monthly crawls of millions of websites using a private WebPageTest instance
  • Research projects use WebPageTest for web standards adoption studies
  • Enterprise monitoring services build on WebPageTest’s capabilities

This means your site might be scanned by WebPageTest even if you’ve never used it directly.

How to Fix WebPageTest Bot Errors

Since these errors come from external bots rather than your users, the solution is filtering them from your monitoring.

Step 1: Identify the Pattern

Check your error timeline for clusters of 404 errors affecting multiple well-known files. If you see a burst of errors for ads.txt, security.txt, and similar files within a short window, that’s the signature of a WebPageTest scan.

Step 2: Filter Bot Traffic

In TrackJS, you can filter out WebPageTest bot errors using ignore rules. If you don’t use TrackJS, you can filter it by user-agent string, but it’s not at all obvious that this is webpagetest:

Mozilla/5.0 (Linux; Android 8.1.0; Moto G (4)) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/143.0.0.0 Mobile Safari/537.36 PTST/251202.154650

You can also use the broader bot filtering approach described in our search engine spiders and bots guide.

Step 3: Consider Which Files You Actually Need

Before dismissing all these 404s, consider whether you should implement any of these files:

Recommended for most sites:

  • /.well-known/security.txt - Helps security researchers contact you responsibly

Required for specific use cases:

  • ads.txt / sellers.json - If you run programmatic advertising
  • /.well-known/apple-app-site-association - If you have an iOS app with Universal Links
  • /.well-known/assetlinks.json - If you have an Android app with App Links

Optional but useful:

  • /.well-known/change-password - Helps password managers direct users to your password reset page
  • /.well-known/gpc.json - If you want to honor Global Privacy Control signals

For most websites, the majority of these files aren’t needed, and 404 responses are perfectly appropriate.

When to Ignore These Errors

WebPageTest bot errors should almost always be ignored because:

  • Bot traffic: These requests come from automated testing, not real users
  • No user impact: Your actual visitors aren’t requesting these files
  • Correct behavior: Returning 404 for files you don’t have is the right response
  • Temporary spikes: Bot scans produce bursts of errors, not ongoing issues

However, pay attention if:

  • Errors persist continuously: Might indicate something other than WebPageTest
  • You need these files: If you run ads or have mobile apps, missing files could be a real problem
  • Patterns change: Sudden increases might indicate new scanning activity worth understanding

Summary

WebPageTest.org bot errors appear in your JavaScript monitoring because WebPageTest uses real Chromium browsers that execute your tracking scripts. The bot probes for standard configuration files like ads.txt, security.txt, and various /.well-known/ paths. When these files don’t exist, you see 404 errors in your monitoring.

The fix is straightforward: filter WebPageTest bot traffic from your error monitoring using user agent or URL-based ignore rules. These errors don’t affect your users and don’t indicate problems with your site.

Remember: Bots using real browsers are increasingly common. When you see bursts of 404 errors for well-known configuration files, check the user agent before assuming something is broken.

TrackJS is the easy way to monitor your JavaScript applications and fix production errors. TrackJS is provides detailed error monitoring and alerting to developers around the world at companies like 3M, Tidal, IKEA, Venmo, Allbirds, and Frontend Masters. TrackJS catches millions of errors from users everyday. Let's start catching yours.

Protect your JavaScript