Code Review

v1.0.0

Code review best practices and workflow skill. Use when: reviewing pull requests, performing peer code review, setting up code review standards, or improving...

0· 128·0 current·0 all-time
byBingWang@sydpz

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for sydpz/codereview-assistant.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Code Review" (sydpz/codereview-assistant) from ClawHub.
Skill page: https://clawhub.ai/sydpz/codereview-assistant
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install codereview-assistant

ClawHub CLI

Package manager switcher

npx clawhub@latest install codereview-assistant
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (code review best practices) match the contents: checklists, templates, per-language notes, and workflows. The skill requests no binaries, env vars, or installs that would be unnecessary for a documentation/template skill.
Instruction Scope
SKILL.md directs the reviewer to read PR descriptions, diffs, linked docs, and run standard review steps — all expected for a code-review assistant. It does not instruct reading unrelated files, accessing credentials, or sending data to external endpoints.
Install Mechanism
No install spec and no code files that execute — lowest-risk pattern for a skill composed of guidance and reference documents.
Credentials
The skill declares no required environment variables, credentials, or config paths, which is proportional to a documentation-only code-review helper.
Persistence & Privilege
always:false and normal user-invocable/autonomous-invocation defaults. The skill does not request persistent system presence or modify other skills; this is appropriate for its purpose.
Assessment
This skill is documentation-only and internally consistent with its stated purpose, so technical risk is low. Before installing, consider: (1) the source is unknown and there's no homepage — if provenance matters to you, review the files yourself; (2) adapt templates to your team's policies and sensitive-data handling rules (the guides remind reviewers to check for secrets, but avoid pasting private secrets into review comments); and (3) because it's instruction-only, it won't run code or exfiltrate data itself, but be cautious if you copy templates into automation that might call external services.

Like a lobster shell, security has layers — review code before you run it.

latestvk9750da7qs7enwf271ydwm511s83q698
128downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

Code Review Skill

A structured approach to code review that balances thoroughness with efficiency.

Core Principles

  1. Review the code, not the author — Assume good intent, focus on the work.
  2. Be specific and constructive — Every comment should have a clear action.
  3. Prioritize by severity — Not all issues are equal.
  4. Approve with confidence — Don't approve code you wouldn't want to maintain.

Review Focus Areas

🔴 Critical — Must Fix Before Merge

  • Security vulnerabilities (SQL injection, auth bypass, secrets in code)
  • Data loss risks (missing validations, unguarded deletions)
  • Race conditions and concurrency bugs
  • Breaking production failures

🟡 Important — Should Fix Before Merge

  • Error handling gaps
  • Performance issues (N+1 queries, missing indexes, memory leaks)
  • Missing test coverage for critical paths
  • Inconsistent error responses
  • Code that violates team conventions

🟢 Nit — Consider Fixing

  • Naming that could be clearer
  • Commented-out code
  • Minor formatting inconsistencies
  • Overly complex one-liners

Review Workflow

Step 1: Understand the Context

  1. Read the PR description and linked issues/tickets
  2. Check what the PR is trying to accomplish
  3. Understand the scope of changes

Step 2: Scan First Pass

Quick scan for:

  • Obvious bugs or logic errors
  • Security concerns
  • Missing tests
  • Breaking changes

Step 3: Deep Review

For each changed file:

  1. Read the diff carefully
  2. Cross-reference with design documents
  3. Check for side effects on existing functionality
  4. Verify test coverage

Step 4: Classify and Comment

For each issue found, classify:

[🔴 CRITICAL] <title>
Description of the issue.
Suggested fix: <action>
[🟡 IMPORTANT] <title>
Description of the issue.
Suggested fix: <action>
[🟢 NIT] <title>
Optional suggestion.

Step 5: Make a Decision

ConditionDecision
No critical issues, minor nitsApprove
Important issues need fixing🔄 Request Changes
Critical issues foundRequest Changes (block merge)
Need context/clarification💬 Comment (don't approve yet)

PR Description Checklist

A good PR description should have:

  • What — Brief summary of the change
  • Why — Business or technical motivation
  • How — High-level approach taken
  • Testing — How the change was tested
  • Screenshots — UI changes (before/after)
  • Breaking Changes — Any API or contract changes
  • Related Issues — Links to tickets

Review Comment Templates

Starting a Review

I've reviewed this PR. Here's my feedback:

**Looking at:** [files/modules]
**Tested locally:** [yes/no with details]

Approving

✅ **Approve** — Code looks good, ready to merge.
Minor suggestions (non-blocking):
- [nit 1]
- [nit 2]

Requesting Changes

🔄 **Request Changes** — Please address the following before merging:

**Critical:**
1. [issue] — [fix suggestion]

**Important:**
2. [issue] — [fix suggestion]

Blocking Merge

❌ **Blocking Merge** — This PR introduces a critical issue that must be resolved:

[Detailed description of the critical issue]

Per-Language/Framework Notes

Go

  • Check error handling on every function call
  • Verify context.Context propagation
  • Look for defer resource cleanup
  • Check goroutine leaks (use go vet)
  • Review SQL query construction (avoid string concatenation)

TypeScript/Node.js

  • Check async/await error handling
  • Verify input validation on API handlers
  • Look for memory leak patterns (event listeners not removed)
  • Check dependency injection patterns
  • Review any type usage

Python

  • Check exception handling
  • Verify database connection cleanup
  • Look for proper with statement usage
  • Review decorator usage for side effects
  • Check type hints completeness

Java/Kotlin

  • Check exception handling and logging
  • Verify resource cleanup (try-with-resources)
  • Review Spring annotations usage
  • Look for thread safety issues
  • Check transaction boundaries

Automation Complement

Code review augments (not replaces) automated tools:

  • Linters — Formatting, style conventions
  • Type checkers — Type safety
  • SAST scanners — Security vulnerability detection
  • Coverage tools — Test coverage metrics

Always verify what the automation missed.

File Structure

code-review/
├── SKILL.md
└── references/
    ├── review-checklist.md
    ├── comment-templates.md
    ├── severity-classification.md
    └── per-language-notes/
        ├── go.md
        ├── typescript.md
        ├── python.md
        └── java.md

Comments

Loading comments...