code-review
Scannednpx machina-cli add skill radkomih/claude-code-ext/code-review --openclawCode Review Skill
Comprehensive code review framework based on Clean Code principles and industry best practices.
When to Use This Skill
- Reviewing pull requests or merge requests
- Analyzing code quality in existing codebases
- Checking recent code changes for issues
- Ensuring adherence to best practices
- Identifying technical debt
Review Approach
Two-Pass Strategy
- High-level architecture pass: Overall design, structure, dependencies, modularity
- Low-level implementation pass: Individual classes, functions, naming, logic line-by-line
Core Review Areas
1. Naming Quality
- Intent-revealing names that explain why, what, and how
- No misleading or ambiguous names
- Pronounceable and searchable names
- Avoid noise words and abbreviations
- Consistent naming conventions
2. Function Design
- Functions are small (20-30 lines maximum)
- Single Responsibility Principle (one thing well)
- Minimal arguments (0-2 ideal, max 3)
- No flag arguments (split into separate functions)
- Command-query separation
- Descriptive function names
3. Code Structure
- Small, focused classes with single responsibility
- High cohesion (related code together)
- Proper organization and proximity
- Clear separation of concerns
- Files are reasonably sized (200-500 lines)
4. Error Handling
- Use exceptions, not error codes
- Extracted try/catch blocks
- Functions handling errors do nothing else
- Informative exception messages
5. Comments
- Prefer self-documenting code over comments
- Remove redundant, misleading, or outdated comments
- No commented-out code (use version control)
- Acceptable: legal notices, complex algorithm explanations, TODOs
6. SOLID Principles
- Single Responsibility: One reason to change
- Open/Closed: Open for extension, closed for modification
- Liskov Substitution: Subtypes are substitutable
- Interface Segregation: No forced unused interfaces
- Dependency Inversion: Depend on abstractions
7. Testing
- Test quality matches production code quality
- Clear test structure and intent
- Good coverage of boundary conditions
- Fast execution
8. Security & Performance
- No exposed secrets or credentials
- Input validation at boundaries
- No SQL injection, XSS vulnerabilities
- Efficient algorithms and data structures
- No N+1 query problems
Output Format
Organize findings by priority:
Critical (Must fix before merge)
- Security vulnerabilities
- Data loss risks
- Breaking changes
- Major architectural violations
High (Should fix)
- Performance issues
- SOLID principle violations
- Missing error handling
- Insufficient test coverage
Medium (Consider fixing)
- Code style inconsistencies
- Minor naming improvements
- Missing documentation
- Code duplication
Low (Nice to have)
- Minor refactoring opportunities
- Additional test cases
- Code clarity enhancements
Feedback Structure
For each issue:
- Location:
file_path:line_number - Issue: What's wrong and which principle is violated
- Impact: Why it matters
- Solution: How to fix it
- Example: Show before/after code (when applicable)
Additional Resources
- CHECKLIST.md - Complete Clean Code checklist with all rules
- Use git commands to focus on recent changes:
git diff,git log
Review Process
- Understand scope: Determine what code to review (recent changes vs full codebase)
- Examine changed files: Use
git difforgit logto identify modified files - Apply checklist: Use CHECKLIST.md for thorough analysis
- Document findings: Provide specific file:line references
- Suggest improvements: Include actionable recommendations with examples
- Prioritize: Categorize by severity (Critical/High/Medium/Low)
- Verify: Double-check for false positives before reporting
Best Practices
- Focus on code, not the person who wrote it
- Be specific with file paths and line numbers
- Provide constructive feedback with examples
- Explain the "why" behind recommendations
- Acknowledge good practices when seen
- Suggest concrete improvements, not just problems
- Keep feedback objective and professional
Source
git clone https://github.com/radkomih/claude-code-ext/blob/master/plugins/code-quality/skills/code-review/SKILL.mdView on GitHub Overview
Code-review skill provides a comprehensive framework for assessing quality, security, maintainability, and adherence to Clean Code principles. It guides reviewers through a two-pass approach and a set of core areas to ensure consistent, actionable feedback.
How This Skill Works
Primarily uses a Two-Pass Strategy: a high-level architecture pass followed by a low-level implementation pass. Review focuses on core areas such as naming quality, function design, code structure, error handling, comments, SOLID principles, testing, and security/performance, with findings documented by file and line references.
When to Use It
- Reviewing pull requests or merge requests
- Analyzing code quality in existing codebases
- Checking recent code changes for issues
- Ensuring adherence to Clean Code and best practices
- Identifying technical debt and improvement opportunities
Quick Start
- Step 1: Identify scope with git diff and determine changed files
- Step 2: Run the two-pass review on the changes, starting with architecture and then detail
- Step 3: Document findings with precise file_path:line_number and propose fixes
Best Practices
- Follow the Two-Pass Strategy for every review
- Prioritize intent-revealing naming and small, clear functions (20-30 lines) with 0-2 arguments and no flag args
- Keep code organized with high cohesion, proper structure, and clear separation of concerns
- Favor self-documenting code over excessive comments; remove outdated or redundant comments
- Ensure SOLID principles, solid testing, secure inputs, and efficient algorithms
Example Use Cases
- Review a PR introducing a new payment feature, checking for clear naming, small functions, and security validations
- Audit an existing module for N+1 queries and refactor data access for efficiency
- Inspect a refactor for adherence to Open/Closed and Dependency Inversion principles
- Evaluate error handling improvements in a failure-prone service and ensure informative messages
- Assess test coverage and boundary condition handling for a new API endpoint