Internal skill. Use cc10x-router for all development tasks.
View on GitHubSelect agents to install to:
npx add-skill https://github.com/romiluz13/cc10x/blob/main/plugins/cc10x/skills/code-review-patterns/SKILL.md -a claude-code --skill code-review-patternsInstallation paths:
.claude/skills/code-review-patterns/# Code Review Patterns ## Overview Code reviews catch bugs before they ship. But reviewing code quality before functionality is backwards. **Core principle:** First verify it works, THEN verify it's good. ## Quick Review Checklist (Reference Pattern) **For rapid reviews, check these 8 items:** - [ ] Code is simple and readable - [ ] Functions and variables are well-named - [ ] No duplicated code - [ ] Proper error handling - [ ] No exposed secrets or API keys - [ ] Input validation implemented - [ ] Good test coverage - [ ] Performance considerations addressed ## The Iron Law ``` NO CODE QUALITY REVIEW BEFORE SPEC COMPLIANCE ``` If you haven't verified the code meets requirements, you cannot review code quality. ## Two-Stage Review Process ### Stage 1: Spec Compliance Review **Does it do what was asked?** 1. **Read the Requirements** - What was requested? - What are the acceptance criteria? - What are the edge cases? 2. **Trace the Implementation** - Does the code implement each requirement? - Are all edge cases handled? - Does it match the spec exactly? 3. **Test Functionality** - Run the tests - Manual test if needed - Verify outputs match expectations **Gate:** Only proceed to Stage 2 if Stage 1 passes. ### Stage 2: Code Quality Review **Is it well-written?** Review in priority order: 1. **Security** - Vulnerabilities that could be exploited 2. **Correctness** - Logic errors, edge cases missed 3. **Performance** - Unnecessary slowness 4. **Maintainability** - Hard to understand or modify 5. **UX** - User experience issues (if UI involved) 6. **Accessibility** - A11y issues (if UI involved) ## Security Review Checklist **Reference:** [OWASP Top 10](https://owasp.org/www-project-top-ten/) - Check against industry standard vulnerabilities. | Check | Looking For | Example Vulnerability | |-------|-------------|----------------------| | Input validation | Unvalidated user input | SQL injection, XSS | | Authentication |