Install
openclaw skills install ai-code-review-expertAI-powered code review assistant — perform deep static analysis, identify security vulnerabilities, enforce coding standards, suggest refactoring patterns, and generate PR review comments. Supports Python, JavaScript, TypeScript, Java, Go, Rust, and more. Integrates with GitHub PR workflows. Keywords: code review, static analysis, security scanning, refactoring, PR review, code quality, SAST, CodeRabbit, CodiumAI, code smell, best practices, AI code reviewer, CI/CD, 代码审查, 代码质量, 代码重构, 安全扫描, pull request, 静态分析, 代码规范.
openclaw skills install ai-code-review-expertAutomated, opinionated, actionable — code reviews that actually ship better software.
In 2026, AI code review tools (CodeRabbit, CodiumAI/Qodo, GitHub Copilot PR Review) have become table stakes for engineering teams. Yet developers still need expert-level guidance on how to act on findings, explain changes to stakeholders, and write review comments that teach rather than just flag. This skill:
Code review, PR review, review my code, check this code, static analysis, code smell, refactor, security scan, find bugs, SAST, pull request feedback, code quality check, 代码审查, 审查代码, 代码检查, 代码质量, 重构建议, 安全漏洞, review this PR, 帮我看看代码
Step 2 新增技术评估(2026):
Step 2 新增技术评估(2026):
Ask the user for (or infer from the code):
Analyze the provided code across these dimensions:
For each finding, output a structured review comment:
📍 Location: [filename:line_number] or [function_name]
🔴/🟡/🟢 Severity: [Critical / Warning / Suggestion]
📝 Issue: [Clear description of the problem]
💡 Why it matters: [Impact on security / performance / maintainability]
✅ Recommended fix:
[code block with the corrected implementation]
| Dimension | Score (1–10) | Notes |
|---|---|---|
| Correctness | — | Logic & edge case handling |
| Security | — | OWASP, secrets, auth |
| Performance | — | Time/space complexity, DB queries |
| Readability | — | Naming, structure, comments |
| Testability | — | Modular, injectable dependencies |
| Overall | — | Weighted average |
Generate a ready-to-paste GitHub PR description:
## Code Review Summary
**Reviewed by:** AI Code Review Expert
**Date:** [today]
**Overall:** ⭐⭐⭐⭐ (4/5 — Minor issues found)
### Critical Issues (0)
No blocking issues found. ✅
### Warnings (2)
- `user_service.py:45` — Potential SQL injection via raw query concatenation
- `auth.py:12` — JWT secret read from environment variable without validation
### Suggestions (3)
- Consider extracting the validation logic into a shared utility
- Add docstrings to public methods
- Use `dataclasses` instead of plain dicts for `UserProfile`
### Positive Highlights 🌟
- Excellent use of dependency injection in `UserController`
- Clear separation of concerns between service and repository layers
User:
def get_user(user_id):
query = "SELECT * FROM users WHERE id = " + user_id
return db.execute(query)
Skill response:
🔴 Critical — SQL Injection (
get_userfunction) Issue: String concatenation in SQL queries allows attackers to inject malicious SQL. Impact: Complete database compromise (data theft, deletion, admin escalation). Fix:def get_user(user_id: int) -> dict | None: query = "SELECT * FROM users WHERE id = %s" return db.execute(query, (user_id,))
User: "Review this TypeScript React component for performance issues"
Skill response: Identifies missing useMemo/useCallback wrappers, unnecessary re-renders, missing key props in lists, and suggests a refactor to a presentational/container pattern.
Python, JavaScript, TypeScript, Java, Kotlin, Go, Rust, C/C++, C#, Ruby, PHP, Swift, SQL, Shell/Bash, Terraform/HCL, Dockerfile, YAML/JSON configs