This project is not covered by Drupal’s security advisory policy.

About SmarTest

SmarTest is a module for improving the testing process in Drupal.

This work is based on an extensive research study publised as an article in the International Software and System Modelling Journal. For more information see: Basically, we propose new testing techniques to accelerate the detection of faults in Drupal, providing faster feedback to the testers and reducing debugging efforts.

SmarTest extends the functionality of SimpleTest core module by integrating testing techniques and providing the Drupal developer with a dashboard with statistics about the Drupal system in real time. This information allows you to guide the testing in your system through faults propensity data in different parts of the code. This is based on a correlation study that relates number of commits made in a module, faults detected in last tests executions, cyclomatic complexity, etc, with the faults propensity of the module. Also, SmarTest allows the testers to prioritize (i.e. order) the executions of the Drupal tests modules in order to detect faults as fast as possible basing the prioritization in an extensive correlation study.

Improvements with respect to SimpleTest

  • Customizable Dashboard with run- time extracted data to guide the testing
  • Different Test prioritizations to detect faults faster
  • Automated testing with feedback in real time
  • Time-out option to automatically stop the test execution

Pending features

  • Include multi-prioritization criteria
  • Study the integration of SmarTest with other test systems: Behat, phpUnit...
  • Improve the SmartTest UI
  • Adapt our test case prioritization techniques to drush


See here which libraries are used within the SmarTest module:

External dependencies


Supporting organizations: 

Project information

  • caution Minimally maintained
    Maintainers monitor issues, but fast responses are not guaranteed.
  • Module categories: Developer
  • shield alertThis project is not covered by the security advisory policy.
    Use at your own risk! It may have publicly disclosed vulnerabilities.