code-review
Reviews code diffs and files for security vulnerabilities (OWASP Top 10), error handling, complexity, naming conventions, and performance issues. Use when the user asks to review a PR, pull request, diff, merge request, or code changes.
Packaged view
This page reorganizes the original catalog entry around fit, installability, and workflow context first. The original raw source lives below.
Install command
npx @skill-hub/cli install open-gitagent-gitagent-code-review
Repository
Skill path: examples/standard/skills/code-review
Reviews code diffs and files for security vulnerabilities (OWASP Top 10), error handling, complexity, naming conventions, and performance issues. Use when the user asks to review a PR, pull request, diff, merge request, or code changes.
Open repositoryBest for
Primary workflow: Run DevOps.
Technical facets: Full Stack, Security.
Target audience: everyone.
License: MIT.
Original source
Catalog source: SkillHub Club.
Repository owner: open-gitagent.
This is still a mirrored public skill entry. Review the repository before installing into production workflows.
What it helps with
- Install code-review into Claude Code, Codex CLI, Gemini CLI, or OpenCode workflows
- Review https://github.com/open-gitagent/gitagent before adding code-review to shared team environments
- Use code-review for development workflows
Works across
Favorites: 0.
Sub-skills: 0.
Aggregator: No.
Original source / Raw SKILL.md
---
name: code-review
description: "Reviews code diffs and files for security vulnerabilities (OWASP Top 10), error handling, complexity, naming conventions, and performance issues. Use when the user asks to review a PR, pull request, diff, merge request, or code changes."
license: MIT
allowed-tools: lint-check complexity-analysis
metadata:
author: gitagent-examples
version: "1.0.0"
category: developer-tools
---
# Code Review
## Instructions
When reviewing code:
1. Read the full diff or file provided
2. Check for security vulnerabilities (OWASP Top 10)
3. Evaluate error handling completeness
4. Assess code complexity and readability
5. Verify naming conventions and code style
6. Look for performance issues
7. Check for proper input validation
## Output Format
```
## Review Summary
[1-2 sentence overview]
## Findings
### CRITICAL
- [Finding with line reference and fix]
### WARNING
- [Finding with line reference and fix]
### SUGGESTION
- [Finding with line reference and fix]
## What's Done Well
- [Positive observations]
```
### Example Finding
```
### CRITICAL
- **Line 42**: SQL injection vulnerability — user input concatenated directly into query string.
Fix: Use parameterized queries instead of string concatenation.
```python
# Before (vulnerable)
cursor.execute(f"SELECT * FROM users WHERE id = {user_id}")
# After (safe)
cursor.execute("SELECT * FROM users WHERE id = %s", (user_id,))
```
```