← Back to list

review-code-quality
by trash-panda-v91-beta
A modular and declarative dotfiles configuration using Nix Flakes, Home Manager, and nix-darwin.
⭐ 1🍴 0📅 Jan 22, 2026
SKILL.md
name: review-code-quality description: Use when reviewing code for quality, security vulnerabilities, and best practices
Code Quality & Security Review
Guidelines for comprehensive code review covering quality, security, and best practices.
When to Use
- Code review before merge
- Security assessment of changes
- After implementing authentication/authorization
- When handling sensitive data
- Dependency updates
Review Methodology
- Identify questionable or improvable areas
- Dig deeper - Examine ripple effects, dependencies, related code
- Play devil's advocate - Consider invalidating evidence
- Document reasoning before conclusions
- Surface only high-confidence suggestions
Quality Checklist
Code Quality
- Logic correctness and error handling
- Resource management and cleanup
- Naming conventions and readability
- Function complexity < 10 cyclomatic
- No duplication (DRY principle)
- Code coverage > 80%
Security Review
- Input validation and sanitization
- Authentication/authorization checks
- No injection vulnerabilities (SQL, XSS, command)
- Proper cryptographic practices
- Sensitive data handled securely
- Dependencies scanned for vulnerabilities
Performance
- Algorithm efficiency appropriate
- No N+1 query problems
- Memory usage reasonable
- Async patterns used correctly
- Caching considered where beneficial
Design
- SOLID principles followed
- Appropriate abstraction levels
- Low coupling, high cohesion
- Interface contracts clear
Security Principles
- Defense in Depth - Multiple redundant controls
- Least Privilege - Minimum necessary access
- Never Trust Input - Validate all external input
- Fail Securely - Default to secure state on error
- Secure Error Handling - No sensitive info in errors
Common Vulnerabilities
Injection
- SQL: Use parameterized queries
- XSS: Sanitize output, use CSP
- Command: Avoid shell; use safe APIs
Authentication
- Session fixation: Regenerate on login
- Credential storage: Use bcrypt/argon2
- Token handling: Validate expiry, signature
Data Exposure
- Encrypt at rest and in transit
- Mask sensitive data in logs
- Implement proper access controls
Output Format
Number all suggestions. Each entry:
- Reasoning: Step-by-step exploration with references to files/functions, including counterarguments considered
- Conclusion: If justified, state the actionable recommendation
Example
1.
- Reasoning: Examined calculateTotal() null-safety. Traced usages
in services/baz.ts. Constructor always sets value.
- Conclusion: No change needed; code is safe.
2.
- Reasoning: Observed duplicate logic in calculateTotal() and
sumOrderAmounts(). Confirmed identical logic, abstraction viable.
- Conclusion: Refactor into shared helper function.
Severity Levels
| Level | Description | Action |
|---|---|---|
| Critical | Exploitable vulnerability, data loss risk | Block merge |
| High | Significant security/quality issue | Must fix |
| Medium | Should be addressed | Fix recommended |
| Low | Improvement opportunity | Optional |
Language-Specific Checks
- TypeScript: Strict mode, no
any, proper null handling - Python: Type hints, PEP 8, no mutable defaults
- Nix: No
withstatements, nixfmt-rfc-style - Go: Idiomatic error handling, proper defer
- Rust: Ownership patterns, lifetime management
- Shell: Proper quoting, safe practices
Feedback Style
- Specific: Reference exact lines with examples
- Actionable: Suggest concrete improvements
- Prioritized: Critical issues first
- Constructive: Acknowledge good practices
- Educational: Explain the "why"
Score
Total Score
55/100
Based on repository quality metrics
✓SKILL.md
SKILL.mdファイルが含まれている
+20
○LICENSE
ライセンスが設定されている
0/10
○説明文
100文字以上の説明がある
0/10
○人気
GitHub Stars 100以上
0/15
✓最近の活動
1ヶ月以内に更新
+10
○フォーク
10回以上フォークされている
0/5
✓Issue管理
オープンIssueが50未満
+5
✓言語
プログラミング言語が設定されている
+5
✓タグ
1つ以上のタグが設定されている
+5
Reviews
💬
Reviews coming soon


