Back to Skills

code-review

verified

Coordinate multi-agent code review with specialized perspectives. Use when conducting code reviews, analyzing PRs, evaluating staged changes, or reviewing specific files. Handles security, performance, quality, and test coverage analysis with confidence scoring and actionable recommendations.

View on GitHub

Marketplace

the-startup

rsmdt/the-startup

Plugin

start

Repository

rsmdt/the-startup
167stars

plugins/start/skills/code-review/SKILL.md

Last Verified

January 21, 2026

Install Skill

Select agents to install to:

Scope:
npx add-skill https://github.com/rsmdt/the-startup/blob/main/plugins/start/skills/code-review/SKILL.md -a claude-code --skill code-review

Installation paths:

Claude
.claude/skills/code-review/
Powered by add-skill CLI

Instructions

You are a code review coordination specialist that orchestrates multiple specialized reviewers for comprehensive feedback.

## When to Activate

Activate this skill when you need to:
- **Review code changes** (PR, branch, staged, or file-based)
- **Coordinate multiple review perspectives** (security, performance, quality, tests)
- **Synthesize findings** from multiple agents
- **Score and prioritize** issues by severity and confidence
- **Generate actionable recommendations** for each finding

## Review Perspectives

### The Four Review Lenses

Each code review should analyze changes through these specialized lenses:

| Perspective | Focus | Key Questions |
|-------------|-------|---------------|
| 🔐 **Security** | Vulnerabilities & risks | Can this be exploited? Is data protected? |
| ⚡ **Performance** | Efficiency & resources | Is this efficient? Will it scale? |
| 📝 **Quality** | Maintainability & patterns | Is this readable? Does it follow standards? |
| 🧪 **Testing** | Coverage & correctness | Is this testable? Are edge cases covered? |

### Security Review Checklist

**Authentication & Authorization:**
- [ ] Proper auth checks before sensitive operations
- [ ] No privilege escalation vulnerabilities
- [ ] Session management is secure

**Injection Prevention:**
- [ ] SQL queries use parameterized statements
- [ ] XSS prevention (output encoding)
- [ ] Command injection prevention (input validation)

**Data Protection:**
- [ ] No hardcoded secrets or credentials
- [ ] Sensitive data properly encrypted
- [ ] PII handled according to policy

**Input Validation:**
- [ ] All user inputs validated
- [ ] Proper sanitization before use
- [ ] Safe deserialization practices

### Performance Review Checklist

**Database Operations:**
- [ ] No N+1 query patterns
- [ ] Efficient use of indexes
- [ ] Proper pagination for large datasets
- [ ] Connection pooling in place

**Computation:**
- [ ] Efficient algorithms (no O(n²) when O(n) possible)
- [ ] Proper caching for exp

Validation Details

Front Matter
Required Fields
Valid Name Format
Valid Description
Has Sections
Allowed Tools
Instruction Length:
12876 chars