Example Test Inspection Report
Scenario: User Registration Feature
Engineer's Test Suite
test_user_registration.py
def test_user_creation(): """Test user creation""" user = create_user("test@example.com", "password123") assert user
def test_login(): """Test login""" user = create_user("test@example.com", "password123") result = login("test@example.com", "password123") assert result
def test_duplicate_email(): """Test duplicate email""" create_user("test@example.com", "password123") user2 = create_user("test@example.com", "password456") assert user2
QA Inspection Report
Test 1: test_user_creation()
Claimed Intent: Test user creation Actually Tests: Object instantiation only
Issues Found
🔴 CRITICAL: Worthless Assertion
assert user # Line 5
-
Would pass with corrupt data
-
Would pass with wrong email
-
Would pass with invalid password hash
-
Would pass if database save failed
Mental Debug: User object with garbage data would pass this test.
🟠 HIGH: Missing Validation Tests
-
No test for invalid email format
-
No test for weak password
-
No test for duplicate email (separate test exists but broken)
-
No test for SQL injection in email
🟠 HIGH: No Persistence Verification
-
Test doesn't verify user is saved to database
-
Test doesn't verify user can be retrieved
-
Transaction might be rolled back
🟡 MEDIUM: Vague Test Name
-
"test_user_creation" doesn't describe what should happen
-
Better: "test_user_creation_with_valid_data_persists_to_database"
Suggested Improvements
def test_user_creation_with_valid_data_persists_to_database(): """Creating a user with valid email and password should: 1. Create user object with correct attributes 2. Save to database 3. Hash password (not store plaintext) 4. Set default role and active status """ email = "test@example.com" password = "SecurePass123!"
user = create_user(email, password)
# Verify user object
assert user.id is not None, "User should have an ID after creation"
assert user.email == email, "Email should match input"
assert user.is_active is True, "New users should be active by default"
assert user.role == "user", "New users should have 'user' role"
assert user.created_at is not None, "Created timestamp should be set"
# Verify password is hashed, not plaintext
assert user.password_hash != password, "Password should be hashed"
assert len(user.password_hash) > 50, "Password hash should be substantial"
# Verify persistence
retrieved_user = User.get_by_email(email)
assert retrieved_user is not None, "User should be retrievable from database"
assert retrieved_user.id == user.id, "Retrieved user should match created user"
def test_user_creation_with_invalid_email_format_raises_validation_error(): """Creating a user with malformed email should raise ValidationError""" invalid_emails = [ "not-an-email", "@example.com", "test@", "test space@example.com", "", ]
for invalid_email in invalid_emails:
with pytest.raises(ValidationError) as exc:
create_user(invalid_email, "password123")
assert "email" in str(exc.value).lower()
assert "invalid" in str(exc.value).lower()
def test_user_creation_with_weak_password_raises_validation_error(): """Creating a user with weak password should raise ValidationError""" weak_passwords = [ "123", # Too short "password", # No numbers "12345678", # No letters "", # Empty ]
for weak_password in weak_passwords:
with pytest.raises(ValidationError) as exc:
create_user("test@example.com", weak_password)
assert "password" in str(exc.value).lower()
Risk Level: 🔴 CRITICAL Action: ❌ BLOCK - Core functionality not tested Estimated Fix Time: 30 minutes
Test 2: test_login()
Claimed Intent: Test login Actually Tests: Function call completes
Issues Found
🔴 CRITICAL: Worthless Assertion
assert result # Line 11
-
Passes with any truthy value
-
Doesn't verify session/token
-
Doesn't verify user authentication state
🔴 CRITICAL: Missing Negative Tests
-
No test for wrong password
-
No test for non-existent user
-
No test for locked account
-
No test for expired credentials
🟠 HIGH: No Session Verification
-
Doesn't verify authentication token
-
Doesn't verify session expiry
-
Doesn't verify user context in session
🟡 MEDIUM: Test Depends on Previous Test
-
Creates user in this test
-
Should use fixture or setup
-
Tests should be independent
Suggested Improvements
@pytest.fixture def registered_user(): """Fixture providing a registered user for login tests""" user = create_user("test@example.com", "SecurePass123!") yield user # Cleanup if needed User.delete(user.id)
def test_login_with_valid_credentials_returns_authenticated_session(registered_user): """Logging in with correct email and password should: 1. Return authentication token/session 2. Set authenticated state 3. Include user context 4. Set appropriate expiry """ session = login(registered_user.email, "SecurePass123!")
assert session is not None, "Login should return session"
assert session.is_authenticated is True, "Session should be authenticated"
assert session.user_id == registered_user.id, "Session should contain user ID"
assert session.token is not None, "Session should have authentication token"
assert session.expires_at > datetime.now(), "Session should have future expiry"
assert (session.expires_at - datetime.now()).seconds >= 3600, "Session should last at least 1 hour"
def test_login_with_wrong_password_raises_authentication_error(registered_user): """Logging in with incorrect password should raise AuthenticationError""" with pytest.raises(AuthenticationError) as exc: login(registered_user.email, "WrongPassword")
assert "Invalid credentials" in str(exc.value)
assert "password" in str(exc.value).lower()
def test_login_with_nonexistent_email_raises_authentication_error(): """Logging in with non-existent email should raise AuthenticationError""" with pytest.raises(AuthenticationError) as exc: login("doesnotexist@example.com", "password")
assert "Invalid credentials" in str(exc.value)
# Note: Don't reveal if email exists (security)
def test_login_with_locked_account_raises_account_locked_error(registered_user): """Logging in to locked account should raise AccountLockedError""" lock_account(registered_user.id)
with pytest.raises(AccountLockedError) as exc:
login(registered_user.email, "SecurePass123!")
assert registered_user.email in str(exc.value)
def test_login_with_empty_password_raises_validation_error(registered_user): """Logging in with empty password should raise ValidationError""" with pytest.raises(ValidationError) as exc: login(registered_user.email, "")
assert "password" in str(exc.value).lower()
assert "required" in str(exc.value).lower()
Risk Level: 🔴 CRITICAL Action: ❌ BLOCK - Authentication not actually tested Estimated Fix Time: 45 minutes
Test 3: test_duplicate_email()
Claimed Intent: Test duplicate email handling Actually Tests: Second user creation succeeds (WRONG!)
Issues Found
🔴 CRITICAL: Test is Backwards
user2 = create_user("test@example.com", "password456") assert user2 # Line 17
-
This test expects duplicate creation to SUCCEED
-
It should expect it to FAIL with an error
-
Test passes when it should fail
-
This is testing the opposite of what's needed
🔴 CRITICAL: False Confidence
-
Production bug: duplicate emails are allowed
-
Test claims to verify duplicate prevention
-
Test actually verifies duplicates work
-
QA might approve thinking it's covered
🟡 MEDIUM: Same Email Issue as Other Tests
- If this fixed to expect error, needs all improvements from Test 1
Suggested Fix
def test_create_user_with_duplicate_email_raises_integrity_error(): """Creating a user with an email that already exists should: 1. Raise IntegrityError or ValidationError 2. Not create duplicate user in database 3. Preserve existing user data """ email = "test@example.com"
# Create first user
user1 = create_user(email, "FirstPassword123!")
initial_count = User.count()
# Attempt to create duplicate
with pytest.raises((IntegrityError, ValidationError)) as exc:
create_user(email, "SecondPassword456!")
assert "email" in str(exc.value).lower()
assert "duplicate" in str(exc.value).lower() or "exists" in str(exc.value).lower()
# Verify no new user created
assert User.count() == initial_count, "User count should not increase"
# Verify original user unchanged
original_user = User.get_by_email(email)
assert original_user.id == user1.id, "Original user should be intact"
assert original_user.verify_password("FirstPassword123!"), "Original password should work"
assert not original_user.verify_password("SecondPassword456!"), "New password should not work"
Risk Level: 🔴 CRITICAL Action: ❌ BLOCK - Test verifies opposite of requirement Estimated Fix Time: 20 minutes
Summary Report
Overall Assessment
Test Suite Quality: 🔴 FAILING
Critical Issues: 3
-
Test 1: Doesn't actually test user creation
-
Test 2: Doesn't actually test authentication
-
Test 3: Tests opposite of requirement
Total Tests: 3 Effective Tests: 0 Coverage: High (claims) Protection: None (reality)
Risk Assessment
Production Risk: 🔴 EXTREME
Current test suite provides zero protection against:
-
Data corruption in user creation
-
Authentication bypass
-
Duplicate email registration
-
Password security issues
-
Database integrity issues
Confidence Level: 0% - Tests passing means nothing
Required Actions
Immediate (Block Merge)
-
Rewrite all three tests with proper assertions
-
Add negative test cases (12+ tests needed)
-
Verify tests catch intentional bugs
-
Add fixture for test user management
Follow-up (Required for completion)
-
Add edge case tests (15+ additional tests)
-
Add integration tests for full registration flow
-
Add security tests (SQL injection, XSS, etc.)
-
Add performance tests for registration endpoint
Estimated Timeline
-
Fix critical issues: 2-3 hours
-
Complete test suite: 1 day
-
Review and iteration: 0.5 days
Total: 1.5-2 days for proper test coverage
Recommendation
❌ BLOCK MERGE
Do not approve this PR. Tests provide false confidence and mask critical bugs.
Evidence:
-
All tests would pass with completely broken functionality
-
Duplicate email test verifies the opposite of requirements
-
No actual behavior is verified
Next Steps:
-
Engineer rewrites tests following examples above
-
QA re-inspects rewritten tests
-
QA verifies tests catch intentional bugs
-
Only then approve merge
Lessons for Engineer
What Went Wrong
-
Wrote tests after code - Led to tests that just confirm code runs
-
Weak assertions - "assert x" proves nothing
-
No mental debugging - Didn't verify tests catch bugs
-
No negative testing - Only tested happy path
-
Misunderstood duplicate test - Test verified opposite
How to Improve
-
Write tests first (TDD) - Prevents these issues
-
Specific assertions - Verify exact values
-
Mental debugging - Break code, ensure test fails
-
Test failures explicitly - Every success needs failure test
-
Read test name carefully - Test what you claim to test
TDD Would Have Prevented This
If tests were written first:
Write this FIRST (it will fail):
def test_user_creation_with_valid_data_persists_to_database(): user = create_user("test@example.com", "password") assert user.email == "test@example.com" # Will fail until create_user works ...
Then implement create_user to make it pass
See the Test-Driven Development skill for complete TDD workflow (available in the skill library for comprehensive TDD guidance).
Sign-off
QA Inspector: [Your name] Date: [Date] Status: ❌ REJECTED Reason: Tests provide zero protection, must be rewritten Re-inspection Required: Yes
This is what thorough test inspection looks like. Better to catch these issues now than in production.