Exunit Code Review

v1.2.0

Reviews ExUnit test code for proper patterns, boundary mocking with Mox, and test adapter usage. Use when reviewing _test.exs files or test helper configurat...

0· 89·0 current·0 all-time
byKevin Anderson@anderskev
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the instructions and included reference docs. All guidance is about ExUnit patterns, Mox, Bypass, Swoosh, Oban, and Ecto — consistent with a test-review helper.
Instruction Scope
Runtime instructions are narrowly scoped to reviewing _test.exs and test helper configuration and to producing findings in the specified format. One minor issue: SKILL.md instructs the agent to "Load and follow [review-verification-protocol](../review-verification-protocol/SKILL.md) before reporting any issue," but that file is not included in the bundle; ensure the agent will not be directed to fetch or execute an external/unreviewed document.
Install Mechanism
No install spec — instruction-only skill. Nothing will be written to disk or installed by the skill itself.
Credentials
The skill declares no environment variables, credentials, or config paths. The guidance does not request secrets or unrelated credentials.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request elevated or persistent presence beyond normal skill invocation.
Assessment
This skill appears internally consistent and low-risk: it only contains review instructions and reference docs for ExUnit/Mox/testing adapters and asks for no credentials or installs. Before installing, check whether your agent platform will attempt to fetch the referenced "../review-verification-protocol/SKILL.md" (not included here). If that file exists on the platform or a remote location, review it to ensure it doesn't introduce external network calls or data-exfiltration steps. Also confirm your agent's reporting workflow (where findings are sent) so you know whether review results will be stored or transmitted to external services.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cn3evshscwk2s0yj1xknd4s83beqf

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments