Last updated: May 17, 2021
A useful way to evaluate
app excellence
is to walk
through the workflows in your app and evaluate the smoothness and safety of the
app experience.
This checklist defines a set of core quality criteria and associated tests to help you assess the
quality of your app. Some of these criteria might be easy to miss, and the tests help you remember
to include them in your test plans.
The checklist highlights the minimum quality that all apps should meet. Your testing will likely
go well beyond what's described here.
Each item in the quality checklist has a unique ID which you might find helpful to use when you
communicate with your team. You can also
view the previous
version of these guidelines
.
Your app should provide standard Android visual design
and interaction patterns where appropriate, for a consistent and intuitive
user experience.
Area
|
ID
|
Tests
|
Description
|
Navigation
|
VX-N1
|
CR-3
|
The app supports standard
Back button navigation
and does not make use of any custom, on-screen "Back button" prompts.
|
VX-N2
|
CR-3
|
The app supports
gesture navigation
for going back / going to the home screen.
|
VX-N3
|
CR-1
CR-3
CR-5
|
The app correctly preserves and restores user or app state.
The app preserves user or app state when leaving the foreground and prevents accidental data loss due to back-navigation and other state changes.
When returning to the foreground, the app should restore the preserved state and any significant stateful transaction that was pending. Examples include: changes to editable fields, game progress, menus, videos, and other sections of the app or game.
- When the app is resumed from the Recents app switcher, the app returns the user to the exact state in which it was last used.
- When the app is resumed after the device wakes from the sleep (locked) state, the app returns the user to the exact state in which it was last used.
- When the app is relaunched from Home or All Apps, it should do one of the following, depending on how much time has passed since it was last used:
- If the app was last used a short time ago (minutes), restore the app state as close as possible to its previous state.
- If more time has passed since the app was last used, try to restore the app as close as possible to its previous state;
or start it from its home screen or some other default state.
|
Notifications
|
VX-S1
|
CR-9
|
Notifications follow design
guidelines
. In particular:
- Notifications are not used for cross-promotion or advertising another product, as this is strictly prohibited by the Play Store.
- Notification channels
are defined according to best practices, rather than serving all notifications from one channel.
- Selecting
the correct notification priority
.
- Multiple notifications are stacked into
a single notification group
, where possible.
- Set
timeouts
for notifications where appropriate.
- Notifications are persistent only if related to ongoing events, such as music playback or a phone call. For more information, see the
Functionality section
.
|
VX-S2
|
CR-9
|
For messaging apps, social apps and conversations:
- Use the
MessagingStyle
notifications for conversations.
- Support the
direct reply action
.
- Support
conversation shortcuts
, and implement best practices for getting the
best direct share ranking
.
- Support
bubbles
.
|
UI and Graphics
|
VX-U1
|
CR-5
|
The app supports landscape and portrait orientations and folded and unfolded device
states.
Orientations and fold states expose essentially the same features and actions and preserve
functional parity.
|
VX-U2
|
CR-5
|
App fills the app window in both orientations and is not letterboxed because of
configuration changes, including device folding and unfolding.
Minor letterboxing to compensate for small variations in screen geometry is acceptable.
|
VX-U3
|
CR-5
|
The app correctly handles rapid transitions between display orientations and device folding
and unfolding without display rendering problems and without losing state.
|
Visual quality
|
VX-V1
|
CR-all
|
The app displays graphics, text, images, and other UI elements without noticeable distortion, blurring, or pixelation.
- The app should use
vector drawables
where possible.
- The app provides high-quality graphics for all targeted screen sizes and form factors.
- No aliasing at the edges of menus, buttons, and other UI elements is visible.
|
VX-V2
|
CR-all
|
The app displays text and text blocks in an acceptable manner for each of the app’s supported languages.
- Composition is acceptable in all supported form factors.
- No cut-off letters or words are visible.
- No improper word wraps within buttons or icons are visible.
- There is sufficient spacing between text and surrounding elements.
|
VX-V3
|
CR-all
|
The app’s content, and all web contents referred to by the app, support
dark theme
.
|
Accessibility
|
VX-A1
|
CR-all
|
Touch targets should be at least 48dp in size.
Learn more
.
|
VX-A2
|
CR-all
|
The app’s text and foreground content should maintain a high enough color contrast ratio
with its background:
- 3.0:1 for large text / graphics
- 4.5:1 for small text (text smaller than 18pt, or if the text is bold and smaller than 14pt)
Learn more about
color and contrast
.
|
VX-A3
|
CR-all
|
Describe each UI element
,
except for
TextView
, using
contentDescription
.
|
Your app should implement the expected functional behavior.
Area
|
ID
|
Tests
|
Description
|
Audio
|
FN-A1
|
CR-1
CR-8
|
Audio resumes when the app returns to the foreground, or indicates to the user that playback is in a paused state.
|
FN-A2
|
CR-1
CR-2
CR-8
|
If audio playback is a core feature, the app should support
background playback
.
|
FN-A3
|
CR-0
|
When the user initiates audio playback, the app should do one of the following within one second:
- Start playing the audio.
- Provide a visual indicator that the audio data is being prepared.
|
FN-A4
|
CR-0
|
The app should request
audio focus
when audio starts playing and abandon audio focus when playback stops.
|
FN-A5
|
CR-0
|
The app should
handle other apps’ requests for audio focus
. For example, an app might reduce playback volume when another app plays speech.
|
Media
|
FN-M1
|
CR-0
CR-6
CR-8
|
If the app plays audio in the background, it must create a
Notification styled with MediaStyle
.
|
FN-M2
|
CR-0
|
If the app plays video, it should support
picture-in-picture
playback.
|
FN-M3
|
CR-0
|
If the app encodes video, it should do so using the HEVC video compression standard.
|
Sharing
|
FN-S1
|
CR-0
|
The app should use the
Android Sharesheet
when sharing content.
It can suggest targets that are unavailable to custom solutions.
|
Background Service
|
FN-B1
|
CR-6
|
The app avoids running unnecessarily long services in the background. To ensure the smooth running of the user’s device, the system applies various
restrictions on background services
. These are not considered good uses of background services:
- Maintaining a network connection for notifications
- Maintaining a Bluetooth connection
- Keeping the GPS powered-on
Learn how to
choose the right solution for your work
.
|
Your app should provide the performance, stability, compatibility, and
responsiveness expected by users.
Area
|
ID
|
Tests
|
Description
|
Stability
| PS-S1
|
CR-all
SD-1
|
The app does not
crash
or
block the UI thread
causing ANR (Android Not
Responding”) errors. Utilize
Google
Play’s pre-launch report
to identify potential stability issues. After deployment, pay
attention to the
Android Vitals
page in the Google
Play developer console.
|
Performance
|
PS-P1
|
CR-all
SD-1
|
The app loads quickly
or provides onscreen feedback to the user (a progress indicator or similar cue) if the app takes longer than two seconds to load.
|
PS-P2
|
CR-all
SD-1
|
Apps should render frames every 16ms to achieve 60 frames per second. Developers can use the
Profile HWUI rendering
option in testing. If there are issues, tools are available to help diagnose
slow rendering
.
|
PS-P3
|
PM-1
|
With StrictMode enabled (see
StrictMode Testing
, below), no red flashes (performance warnings from StrictMode) are visible when testing the app. Any red flashes indicate bad behaviors regarding storage, network access, or memory leaks.
|
SDK
|
PS-T1
|
CR-0
|
The app runs on the latest public version of the Android platform without crashing or severely impacting core functionality.
|
PS-T2
|
SP-1
|
The app
targets the latest Android SDK
needed to align with Google Play requirements by setting the
targetSdk
value.
|
PS-T3
|
SP-1
|
The app is built with the latest Android SDK by setting the
compileSdk
value.
|
PS-T4
|
SP-2
SP-3
|
Any Google or third-party SDKs used are up-to-date
. Any improvements to these SDKs, such as stability, compatibility, or security, should be available to users in a timely manner.
For Google SDKs, consider using SDKs powered by
Google Play services
, when available. These SDKs are backward compatible, receive automatic updates, reduce your app package size, and make efficient use of on-device resources.
The developer is accountable for the entire app’s codebase, inclusive of any third-party SDKs used.
|
PS-T5
|
SP-3
|
The app does not use
non-SDK interfaces
.
|
PS-T6
|
SP-2
|
No debug libraries are included in the production app. This can cause performance as well as security issues.
|
Battery
|
PS-B1
|
BA-1
|
The app properly supports the power management features that were introduced in Android 6.0 (Doze and App Standby). In the case where core functionality is disrupted by power management, only qualified apps may request an exemption. See
Support for other use cases
in Doze and App Standby.
During development, developers can test app standby and doze behavior using
these ADB commands
.
In terms of battery usage, developers can use the
Android Studio energy profiler
or the
Battery Historian
tool, combined with planned background work, to diagnose unexpected battery use.
|
Your app should handle user data and personal information safely,
with the appropriate level of permission.
In addition to this checklist, applications published on the Google Play
Store must also follow the
User Data
policies
to protect users' privacy.
Area
|
ID
|
Tests
|
Description
|
Permissions
|
SC-P1
|
SC-4
|
The app requests only the
absolute minimum
number of permissions that it needs to support its use case at hand. For some permissions such as location, use coarse location in place of fine location if possible.
|
SC-P2
|
|
The app requests permission to access sensitive data (such as
SMS, Call Log
, or
Location
)
or services that cost money (such as Dialer or SMS) only when directly related to the core
use cases of the apps. Implications related to these permissions should be prominently disclosed to the user.
Depending on how you are using the permissions, there might be an
alternative way
to fulfill your app's use case without relying on access to sensitive information. For example, instead of
requesting permissions related to a user’s contacts, it may be more appropriate to request access
by using an
implicit intent
.
|
SC-P3
|
CR-0
|
The app requests runtime permissions in context, when the functionality is requested, rather than upfront during app startup.
|
SC-P4
|
CR-0
|
The app clearly conveys why certain permissions are needed or follow the recommended flow to
explain why it needs a permission
.
|
SC-P5
|
CR-0
|
The app should
gracefully degrade
when
users deny or revoke a permission. The app should not prevent the user from accessing the app altogether.
|
Data & Files
|
SC-DF1
|
SC-1
|
All sensitive data is
stored in the app's internal storage
.
|
SC-DF2
|
SC-10
|
No personal or sensitive user data
is logged to the system log or an app-specific log.
|
SC-DF3
|
|
The app does not use any
non-resettable hardware IDs
, such as the IMEI, for identification purposes.
|
Identity
|
SC-ID1
|
CR-0
|
The app provides
hints to autofill
account credentials and other sensitive information, such as credit card info, physical address, and phone number.
|
SC-ID2
|
CR-0
|
Integrate
Credential Manager for Android
for a
seamless sign-in experience that unifies support for passkeys, federated identity, and
traditional passwords.
|
SC-ID3
|
CR-0
|
The app supports
biometric authentication
to protect financial transactions or sensitive information, such as important user documents.
|
App Components
|
SC-AC1
|
SC-5
|
The app sets the
android:exported
attribute explicitly for all
activities
,
services
,
broadcast receivers,
and especially
content providers
.
Only application components that
share data with other apps
, or components that
should be invoked by other apps
, are
exported
.
|
SC-AC2
|
CR-0
SC-4
|
All intents and broadcasts follow best practices:
- Use explicit intents
if the destination application is well defined.
- Use Intents to defer permissions to a different app that already has the permission.
- Share data securely across apps
.
- Intents that contain a payload are
verified before use
.
- If you need to pass an Intent to another app, so that the receiving app can invoke and expect a callback in the calling app, do not include a nested intent in the extras. Use a PendingIntent.
- When setting up your PendingIntents, explicitly set the
immutable flag
, where applicable.
|
SC-AC3
|
SC-3
|
All components that
share content between your apps
use
android:protectionLevel="signature"
for
custom permissions
. This includes
activities
,
services
,
broadcast receivers
, and especially
content providers
.
Apps should not rely on accessing a list of installed packages. The access has been restricted beginning in Android 11.
|
Networking
|
SC-N1
|
SC-9
|
All network traffic is sent over
SSL
.
|
SC-N2
|
SC-6
|
The application declares a
network security configuration
.
|
SC-N3
|
|
If the application uses Google Play services, the
security provider is initialized at application startup
.
|
WebViews
| SC-W1
|
SC-6
|
Do not use
setAllowUniversalAccessFromFileURLs()
for accessing local content. Instead, use
WebViewAssetLoader
.
|
SC-W2
|
SC-7
|
WebViews
should not use addJavaScriptInterface()
with untrusted content.
On Android 6.0 and above, use
HTML message channels
instead.
|
Execution
|
SC-E1
|
|
The app does not
dynamically load
code from outside the app's APK. Developers should use
Android App Bundles
, which includes
Play Feature Delivery
and
Play Asset Delivery
.
As of August 2021, the use of Android App Bundles is mandatory for all new apps in the Google
Play Store.
|
Cryptography
|
SC-C1
|
|
The app
uses strong, platform-provided cryptographic algorithms and a random number generator
. Also, the app does not implement custom algorithms.
|
Be sure that your apps can be published on Google Play.
Area
|
ID
|
Tests
|
Description
|
Policies
|
GP-P1
|
GP-all
|
The app strictly adheres to the terms of the
Google Play Developer Content Policy
and does not offer inappropriate content, does not use the intellectual property or brand of others, and so on.
|
GP-P2
|
GP-1
|
The app maturity level is set appropriately, based on the
Content Rating Guidelines
.
|
App Details Page
|
GP-D1
|
GP-1
GP-2
|
The app’s feature graphic follows the guidelines outlined in this
support article
. Make sure that:
- The app listing includes a high-quality feature graphic.
- The feature graphic does not contain device images, screenshots, or small text that will be illegible when scaled down and displayed on the smallest screen size that your app is targeting.
- The feature graphic does not resemble an advertisement.
|
GP-D2
|
GP-1
|
The app’s screenshots and videos do not show or reference non-Android devices.
|
GP-D3
|
GP-1
|
The app’s screenshots or videos do not represent the content and experience of your app in a misleading way.
|
|
User Support
|
GP-X1
|
GP-1
|
Common user-reported bugs in the Reviews tab of the Google Play page are addressed if they are reproducible and occur on many different devices. If a bug occurs on only a few devices, you should still address it if those devices are particularly popular or new.
|
For the purpose of setting up a test environment for this checklist, we recommend the following:
- Focused on emulator testing
- Android Emulator is a great way to test your app under different Android versions and screen resolutions. You should
set up emulated devices (AVDs)
to represent the most common form factors and hardware/software combinations for your target user base. In addition to testing for phones, we also recommend you test other form factors using the following emulators
at a minimum
:
- Foldables - 7.6” Fold-in with outer display (this is listed under phones in the AVD Manager).
- Tablet - Pixel C 9.94” (2,560px x 1,800px).
- For mobile app notification testing, pair a mobile device / emulator with Wear OS emulator - Wear OS Round 1.84”.
- Hardware devices
- Your test environment should include a small number of actual hardware devices that represent the key form factors and hardware/software combinations that are currently available to consumers. It's not necessary to test on
every
device that's on the market ? rather, you should focus on a small number of representative devices, even using one or two devices per form factor.
- Device test labs
- You can also use third party services, such as
Firebase Test Lab
, to test your app on a wider variety of devices.
- Test with the latest Android version
- In addition to testing representative Android versions for your target user base, you should always test against the latest version of Android (currently Android 14). This ensures that
the latest behavior changes
do not negatively impact your user’s experience.
For more comprehensive guidance on testing including unit testing, integration testing and UI testing, check out the
Android testing fundamentals
.
These test procedures help you discover various types of quality issues in
your app. You can combine the tests or integrate groups of tests together in
your own test plans. See the sections above for references that associate
criteria with these test procedures.
Type
|
Test
|
Description
|
Core Suite
|
CR-0
|
Navigate to all parts of the app ? all screens, dialogs, settings, and all user flows.
- If the application allows for editing or content creation, game play, or media playback, make sure to test those flows.
- While testing the app, introduce interruptions from other apps, such as receiving a notification or a phone call; and apply transient changes to device attributes, such as network connectivity, battery function, GPS availability, and system load.
- Enter and test all in-app purchase flows
|
CR-1
|
From each app screen, press the device's Home key or swipe up in gesture navigation, then re-launch the app from the All Apps screen.
|
CR-2
|
From each app screen, switch to another running app, and then return to the app under test using the Recents app switcher.
|
CR-3
|
From each app screen (and dialogs), press the Back button or use the back swipe gesture.
|
CR-5
|
From each app screen, rotate the device between landscape and portrait orientations and folded and unfolded states at least three times.
|
CR-6
|
Switch to another app to send the test app into the background. Go to Settings and check whether the test app has any services running while in the background. In Android 4.0 and higher, go to the Apps screen and find the app in the "Running" tab.
|
CR-7
|
Press the power button to put the device to sleep, then press the power button again to wake the screen.
|
CR-8
|
Set up a screen lock on the device. Press the power button to put the device to sleep (which locks the device). Then, press the power button again to wake the screen and unlock the device.
|
CR-9
|
Trigger and observe in the notifications drawer all types of notifications that the app can display. Expand notifications where applicable (Android 4.1 and higher), and tap on all available actions.
|
CR-10
|
Review Support for other use cases in Doze and App Standby.
|
Install on SD Card
|
SD-1
|
Repeat
Core Suite
with the app installed to a
device’s SD card
(if the app supports this installation method).
To move the app to SD card, you can use Settings > App Info > Move to SD Card.
|
Performance and Stability
|
SP-1
|
Review the Android manifest file and build configuration to ensure that the application is built against the
latest available SDK
(
targetSdk
and
compileSdk
).
|
SP-2
|
Review the
build.gradle
file for any outdated dependencies.
|
SP-3
|
Use the
Android Studio lint tool
to detect non-SDK interface usage.
Other alternative testing methods
also exist.
|
Performance Monitoring
|
PM-1
|
Repeat
Core Suite
with
StrictMode profiling enabled
.
Pay close attention to garbage collection and its impact on the user experience.
|
Battery
| BA-1
|
Repeat
Core Suite
across Doze and App Standby cycles.
Pay close attention to alarms, timers, notifications, syncs, and so on. See
Testing with Doze and App Standby
for requirements and guidelines.
|
Security
|
SC-1
|
Review all data stored in external storage.
|
SC-2
|
Review how the data that’s loaded from external storage is handled and processed.
|
SC-3
|
Review all content providers defined in the Android manifest file. Make sure each provider has an appropriate
protectionLevel
.
|
SC-4
|
Review all permissions that your app requires, in the manifest file, at runtime, and in the app settings screen (Settings > App Info) on the device.
|
SC-5
|
Review all
application components
defined in the Android manifest file for the appropriate export state. The exported property must be set explicitly for all components.
|
SC-6
|
Review the app's
Network Security configuration
, ensuring that no lint checks on the configuration fail.
|
SC-7
|
For each WebView, navigate to a page that requires JavaScript.
|
SC-8
|
In each WebView, attempt to navigate to sites and content that aren’t loaded directly by your app.
|
SC-9
|
Declare a Network Security Configuration that
disables cleartext traffic
, then test the app.
|
SC-10
|
Run the application and exercise all core functionality, while
observing the device log
. No private user information should be logged.
|
Google Play
|
GP-1
|
Sign into the
Google Play Developer Console
to review your developer profile, app description, screenshots, feature graphic, content rating and user feedback.
|
GP-2
|
Download your feature graphic and screenshots, and scale them down to match the display sizes on the devices and form factors that you are targeting.
|
GP-3
|
Review all graphical assets, media, text, code libraries, and other content that’s packaged in the app or expansion file download.
|
Testing with StrictMode
For performance testing, we recommend enabling
StrictMode
in your
app and using it to catch operations that could affect performance, network accesses, file
reads/writes, and so on. Look for potentially problematic operations both on the main thread and on
other threads.
You can set up a per-thread monitoring policy using
StrictMode.ThreadPolicy.Builder
and enable all supported monitoring in the
ThreadPolicy
using
detectAll()
.
Make sure to enable
visual notification
of policy violations for the
ThreadPolicy
using
penaltyFlashScreen()
.