code-review
Scannednpx machina-cli add skill PaulRBerg/agent-skills/code-review --openclawCode Review
Objective
Find high-impact defects in changed code with evidence. Prioritize security, correctness, and regressions over style nits.
Arguments
--fix: After reporting findings, apply all suggested fixes automatically in severity order (CRITICAL -> HIGH -> MEDIUM -> LOW), then rerun targeted checks and report exactly what changed.- Default: Report findings and wait for confirmation before editing.
Scope Resolution
- Verify repository context:
git rev-parse --git-dir. If this fails, stop and tell the user to run from a git repository. - If user provides file paths/patterns or a commit/range, scope is exactly those targets.
- Otherwise, scope is only session-modified files. Do not include other uncommitted changes.
- If there are no session-modified files, fall back to all uncommitted tracked + untracked files:
- tracked:
git diff --name-only --diff-filter=ACMR - untracked:
git ls-files --others --exclude-standard - combine both lists and de-duplicate.
- tracked:
- Exclude generated/low-signal files unless requested: lockfiles, minified bundles, build outputs, vendored code.
- If scope still resolves to zero files, report and stop.
Workflow
- Resolve scope and read diffs plus minimal surrounding context.
- Classify files by domain/risk.
- Load
references/profiles/core.mdplus only the domain profiles that match the current diff. - Generate findings with: location, impact, evidence, confidence, and concrete fix.
- Assign severity with the model below.
- Default behavior: report and wait.
- With
--fix: apply all suggested fixes in severity order, then run targeted verification. - Report using
references/output-schema.md.
Profile Dispatch
references/profiles/security.md: auth, external input, secrets, crypto, public network surfaces, unsafe parsing.references/profiles/configuration.md: env/config, timeouts, retries, pools, limits, resource tuning, rollout controls.references/profiles/typescript-react.md: TypeScript/JavaScript/React/Node files.references/profiles/python.md: Python services, scripts, async workloads.references/profiles/shell.md: shell scripts, CI command blocks, deployment scripts.references/profiles/smart-contracts.md: Solidity/Solana/on-chain protocol code.references/profiles/data-formats.md: CSV/JSON/YAML/binary ingestion/export/parsing.references/profiles/naming.md: naming/intent clarity (after correctness and security pass).
Load only profiles relevant to touched files. Prefer no more than three domain profiles per pass unless the user requests a deep audit.
Severity Model
- CRITICAL: exploitable security flaw, data loss path, or outage risk on critical paths.
- HIGH: logic defect or performance failure that can break core behavior.
- MEDIUM: maintainability/reliability issue likely to cause near-term defects.
- LOW: localized clarity/style/documentation improvements.
Evidence Rules
- Never fabricate line numbers.
- Tie each finding to concrete code evidence.
- Explain blast radius and failure mode succinctly.
- Prefer targeted fixes over broad rewrites.
Verification
Run the narrowest checks that validate touched behavior:
- formatter/lint on touched files,
- targeted tests for impacted modules,
- typecheck when relevant.
If checks cannot run, state exactly what was skipped and why.
Stop Conditions
Stop and ask for direction when:
- fixes require API/contract redesign,
- behavior intent is too ambiguous to classify severity,
- required validation tooling is unavailable and risk is high.
Source
git clone https://github.com/PaulRBerg/agent-skills/blob/main/skills/code-review/SKILL.mdView on GitHub Overview
Code Review finds high-impact defects in changed code with evidence, prioritizing security, correctness, and regression risk over style. It scopes to session-modified files, loads relevant profiles, and reports findings with concrete fixes. With --fix, it can automatically apply fixes in severity order and re-validate.
How This Skill Works
Starting from the Git scope, the tool classifies touched files by domain/risk, loads matching profiles (up to three domains), and generates findings that include location, impact, evidence, confidence, and concrete fixes. Severity is assigned per the model, and verification follows; with --fix, fixes are applied in severity order and then re-checked.
When to Use It
- Review a pull request or diff for defects, security issues, or regressions
- Audit changed code for correctness and potential risk in session-modified files
- Scope review to specific files/paths provided by the user
- Run targeted formatter/linters on touched modules during a review cycle
- Apply fixes automatically with --fix and re-verify the changes
Quick Start
- Step 1: Resolve scope and read diffs plus minimal surrounding context
- Step 2: Classify files by domain/risk, load matching profiles, and generate findings with evidence
- Step 3: If --fix is used, apply fixes in severity order and re-run targeted checks
Best Practices
- Always verify repository context (e.g., git rev-parse --git-dir) before starting
- Limit scope to session-modified files unless the user asks for broader audit
- Load only relevant domain profiles (prefer up to three) to reduce noise
- Tie every finding to concrete code evidence with location and line references
- Prefer targeted fixes in severity order and re-run checks after applying
Example Use Cases
- A TS/JS diff introduces a risky null/undefined path; reviewer flags exact line and provides a fix with reasoning
- A Python change could cause a race condition around file writes; reviewer logs impact and suggests synchronization
- A shell script modification lacks set -e or proper error handling; reviewer marks failure paths with concrete steps
- Untrusted input parsing in a PR triggers a security finding with evidence and remediation
- Config change alters timeouts/retries; reviewer notes potential outage risk and suggests tuning