v1.0 System Active
This workflow is designed to provide a systematic approach to source verification. Complete each step in order for the most accurate assessment.
1

Domain Review

Begin by examining the domain of the source in question. Verify the exact URL structure, check for subtle misspellings or character substitutions, and confirm whether the domain matches the official reference at 7-slots.com.

Key Checks:

  • Exact domain name match (no character substitutions)
  • Correct top-level domain extension
  • Valid SSL certificate present
  • WHOIS registration data consistency
  • Domain age and registration history
2

Content Consistency Check

Compare the content of the source against the official reference. Look for duplicated text, altered messaging, outdated information, or content that has been partially copied and modified.

Key Checks:

  • Text content matches or closely mirrors official source
  • Visual assets (logos, images) are consistent
  • Navigation structure and page layout comparison
  • Terms, conditions, and policy text accuracy
  • Contact information and support channels
3

Trust Signals Evaluation

Assess the presence and validity of trust indicators on the source. Legitimate sources typically display consistent branding, proper legal disclosures, and verifiable contact information.

Key Checks:

  • Presence of verifiable legal entity information
  • Consistent branding and visual identity
  • Functional and legitimate contact channels
  • Proper privacy policy and terms of service
  • No excessive urgency or pressure tactics
4

Risk Classification

Based on the findings from the previous steps, classify the source into one of three risk categories. This classification determines the recommended course of action.

Classification Criteria Action
Low Concern Minor discrepancies, likely legitimate variation Monitor, no immediate action required
Medium Concern Notable inconsistencies, possible unauthorized use Document findings, consider reporting
High Concern Clear misrepresentation or copied content Submit report immediately

Next StepsAfter completing the workflow

If your evaluation reveals medium or high concern, proceed to submit a detailed report through our Report Submission system. For additional context on risk levels, visit the Risk Analysis module.

✎ Submit a Report ⚠ View Risk Levels