
preflight-checks
by charlesjones-dev
Automate developer busy work with AI-powered plugins for Claude Code.
SKILL.md
name: preflight-checks description: Comprehensive code quality verification system for running type checking, linting, and tests. Use when validating code quality, preparing commits, running CI checks locally, or when the user mentions preflight, verify, lint, typecheck, or test commands.
Preflight Code Quality Checks
This skill provides comprehensive guidance for discovering and running code quality checks across different project types.
Overview
Preflight checks are the quality gates that verify code before commits, PRs, or deployments. They typically include:
- Type Checking - Static type verification (TypeScript, MyPy, etc.)
- Linting - Code quality and style enforcement
- Formatting - Consistent code style
- Security Scanning - Dependency audits and static analysis (SAST)
- Testing - Unit, integration, and e2e tests
Quick Reference
Node.js / TypeScript Projects
| Check | Command | Auto-fix |
|---|---|---|
| TypeScript | npx tsc --noEmit | N/A (manual) |
| ESLint | npx eslint . | npx eslint . --fix |
| Biome | npx biome check . | npx biome check . --write |
| Prettier | npx prettier --check . | npx prettier --write . |
| Jest | npx jest | N/A |
| Vitest | npx vitest run | N/A |
Prefer npm scripts when available:
# Check package.json scripts first
npm run lint # if exists
npm run typecheck # if exists
npm run test # if exists
npm run check # often runs all checks
Python Projects
| Check | Command | Auto-fix |
|---|---|---|
| MyPy | mypy . | N/A (manual) |
| Ruff lint | ruff check . | ruff check . --fix |
| Ruff format | ruff format --check . | ruff format . |
| Black | black --check . | black . |
| isort | isort --check . | isort . |
| Pytest | pytest | N/A |
With pyproject.toml (modern Python):
# Check for [tool.X] sections
ruff check . && ruff format --check . # Ruff (fast, recommended)
mypy src/ # Type checking
pytest # Tests
.NET Projects
| Check | Command | Auto-fix |
|---|---|---|
| Build | dotnet build | N/A |
| Build strict | dotnet build --warnaserror | N/A |
| Format check | dotnet format --verify-no-changes | dotnet format |
| Tests | dotnet test | N/A |
| Analyzers | Configured in .editorconfig | N/A |
.NET specific considerations:
- Warnings as errors: Add
<TreatWarningsAsErrors>true</TreatWarningsAsErrors>to.csproj - Enable nullable:
<Nullable>enable</Nullable>for null safety - Analyzers run during build automatically
Go Projects
| Check | Command | Auto-fix |
|---|---|---|
| Build | go build ./... | N/A |
| Vet | go vet ./... | N/A |
| golangci-lint | golangci-lint run | golangci-lint run --fix |
| gofmt | gofmt -l . | gofmt -w . |
| Tests | go test ./... | N/A |
Rust Projects
| Check | Command | Auto-fix |
|---|---|---|
| Check | cargo check | N/A |
| Clippy | cargo clippy -- -D warnings | cargo clippy --fix |
| Format | cargo fmt --check | cargo fmt |
| Tests | cargo test | N/A |
Security Scanning (Cross-Platform)
| Tool | Purpose | Command |
|---|---|---|
| pnpm audit | Dependency CVE scan | pnpm audit or pnpm audit:check |
| npm audit | Dependency CVE scan | npm audit |
| yarn audit | Dependency CVE scan | yarn audit |
| eslint-plugin-security | JS/TS security patterns | Runs with ESLint |
| Semgrep | SAST scanning | semgrep scan --config auto |
| Semgrep (Docker) | SAST scanning | See platform-specific commands below |
| pip-audit | Python dependency scan | pip-audit |
| cargo-audit | Rust dependency scan | cargo audit |
IMPORTANT: If Semgrep is detected in CI workflows or config files, you MUST run it as part of preflight checks. Do not skip it.
Semgrep Detection Priority:
- Package.json scripts (e.g.,
pnpm run semgrep) - Config files:
.semgreprc.yml,.semgrep.yml,semgrep.yml,.semgrep/ - CI workflows:
.github/workflows/*.yml(extract--configflags) - README.md documentation - ALWAYS check this before trying generic Docker commands
- Local CLI:
semgrep --version - Docker fallback (see platform-specific commands below)
Semgrep Docker Commands (AUTOMATIC PLATFORM DETECTION):
CRITICAL: Detect the platform from environment context and use the correct command automatically.
- Windows (
win32): ALWAYS useMSYS_NO_PATHCONV=1prefix:MSYS_NO_PATHCONV=1 docker run --rm -v "$(pwd):/src" semgrep/semgrep semgrep scan --config auto /src - macOS (
darwin) / Linux: Standard command:docker run --rm -v "$(pwd):/src" semgrep/semgrep semgrep scan --config auto /src
Why MSYS_NO_PATHCONV=1 is required on Windows: Git Bash/MSYS2 auto-converts POSIX paths to Windows paths. Without this prefix, /src becomes C:/Program Files/Git/src, causing "Invalid scanning root" error. DO NOT try without the prefix first on Windows.
Discovery Strategy
Step 1: Identify Project Type(s)
Check for presence of key files:
# JavaScript/TypeScript
package.json, tsconfig.json, deno.json
# Python
pyproject.toml, setup.py, requirements.txt, Pipfile
# .NET
*.csproj, *.sln, *.fsproj
# Go
go.mod
# Rust
Cargo.toml
Step 2: Check for Configured Scripts/Tasks
package.json scripts (Node.js):
{
"scripts": {
"lint": "eslint .",
"typecheck": "tsc --noEmit",
"test": "vitest",
"check": "npm run lint && npm run typecheck && npm run test"
}
}
pyproject.toml (Python):
[tool.ruff]
line-length = 100
[tool.mypy]
strict = true
[tool.pytest.ini_options]
testpaths = ["tests"]
Makefile targets:
lint:
ruff check .
test:
pytest
check: lint test
Step 3: Detect CI Configuration
Check for CI files to align local checks with CI:
.github/workflows/*.yml- GitHub Actions (also check for semgrep jobs).gitlab-ci.yml- GitLab CIazure-pipelines.yml- Azure DevOpsJenkinsfile- Jenkins.circleci/config.yml- CircleCI
Step 4: Detect Security Tools
Check for security scanning configuration:
package.jsondevDependencies foreslint-plugin-securitypackage.jsonscripts containingauditorsemgrep- Semgrep config files:
.semgreprc.yml,.semgrep.yml,semgrep.yml - CI workflows for semgrep jobs (extract
--configflags for local replication) README.mdfor documented security commands (often in Security sections)- Lock files (
pnpm-lock.yaml,package-lock.json,yarn.lock) for audit support
Best Practices
Execution Order
Run checks in order of speed and feedback value:
- Format check (fastest, catches style issues)
- Type checking (fast, catches type errors)
- Linting (medium, catches quality issues)
- Security scanning (medium, catches vulnerabilities)
- Tests (slowest, catches logic errors)
This order provides fastest feedback on failures.
Handling Monorepos
For monorepos, check for workspace configuration:
pnpm-workspace.yamllerna.jsonpackage.jsonwithworkspacesfieldCargo.tomlwith[workspace]
Run checks at workspace root or iterate through packages.
CI Alignment
Ensure local preflight matches CI:
# Good: Use same commands as CI
npm run lint # Same as CI step
# Avoid: Different commands locally vs CI
eslint . --max-warnings=0 # If CI uses npm run lint
Exit Codes
Respect exit codes for CI integration:
0- Success, no issues1- Failure, issues found2- Configuration error
Caching
For faster subsequent runs:
- ESLint: Uses
.eslintcachewith--cacheflag - TypeScript: Uses
tsconfig.tsbuildinfowithincremental: true - Pytest: Uses
.pytest_cache - Rust: Uses
target/directory
Error Messages Reference
TypeScript Common Errors
TS2339: Property 'x' does not exist on type 'Y'
-> Add property to interface or use type assertion
TS2322: Type 'X' is not assignable to type 'Y'
-> Check type definitions, may need union type
TS7006: Parameter 'x' implicitly has an 'any' type
-> Add explicit type annotation
ESLint Common Errors
@typescript-eslint/no-unused-vars
-> Remove unused variable or prefix with _
@typescript-eslint/no-explicit-any
-> Replace 'any' with specific type
import/order
-> Auto-fixable: eslint --fix
Python Common Errors
mypy: Incompatible return value type
-> Check return type annotation matches actual return
ruff: E501 Line too long
-> Auto-fixable or configure line-length
ruff: F401 Module imported but unused
-> Remove unused import
Integration with Pre-commit Hooks
Preflight checks can be configured as pre-commit hooks:
.pre-commit-config.yaml:
repos:
- repo: local
hooks:
- id: preflight
name: Preflight Checks
entry: npm run check
language: system
pass_filenames: false
Husky (Node.js):
# .husky/pre-commit
npm run lint
npm run typecheck
When to Skip Checks
Some scenarios where partial checks are acceptable:
--no-verifyfor emergency fixes (use sparingly)- WIP commits on feature branches
- Exploratory/spike work
Always run full preflight before:
- Opening PRs
- Merging to main/master
- Deploying to production
スコア
総合スコア
リポジトリの品質指標に基づく評価
SKILL.mdファイルが含まれている
ライセンスが設定されている
100文字以上の説明がある
GitHub Stars 100以上
1ヶ月以内に更新
10回以上フォークされている
オープンIssueが50未満
プログラミング言語が設定されている
1つ以上のタグが設定されている
レビュー
レビュー機能は近日公開予定です

