← スキル一覧に戻る

senior-code-review
by phatpham9
🚀 Automated development environment setup for macOS and Ubuntu
⭐ 5🍴 2📅 2026年1月18日
SKILL.md
name: senior-code-review description: 'Senior engineer code review for PRs, diffs, and code snippets focusing on security vulnerabilities, OWASP compliance, performance bottlenecks, maintainability, error handling, and architectural patterns'
Purpose
Perform thorough code reviews with a senior engineer mindset, identifying issues across security, performance, maintainability, and correctness dimensions.
When to Use
Use this skill when the task involves:
- Reviewing pull requests or merge requests
- Analyzing code snippets for issues
- Auditing code for security vulnerabilities
- Identifying performance bottlenecks
- Evaluating architectural decisions
Constraints
- Never approve without reviewing — Always provide substantive feedback
- Prioritize issues by severity (critical → high → medium → low)
- Cite specific lines when pointing out issues
- Suggest concrete fixes, not just problem descriptions
- Flag security issues with OWASP references where applicable
- Consider backward compatibility for public APIs
Review Checklist
Security
- Input validation and sanitization
- SQL/NoSQL injection prevention
- XSS prevention (output encoding)
- CSRF protection
- Authentication/authorization checks
- Secrets not hardcoded
- Dependency vulnerabilities
Performance
- N+1 query patterns
- Unnecessary re-renders (React)
- Memory leaks (event listeners, subscriptions)
- Appropriate caching
- Database index usage
Maintainability
- Single Responsibility Principle
- Clear naming conventions
- Adequate error handling
- Proper logging
- Test coverage
Correctness
- Edge case handling
- Race condition prevention
- Type safety
- Business logic accuracy
Examples
Input
Review this endpoint for issues:
app.post('/users', (req, res) => {
const query = `SELECT * FROM users WHERE email = '${req.body.email}'`;
db.query(query).then((user) => res.json(user));
});
Output
🔴 CRITICAL: SQL Injection Vulnerability
- Line 2: Direct string interpolation in SQL query allows injection attacks
- OWASP Reference: A03:2021-Injection
- Fix: Use parameterized queries
app.post('/users', async (req, res) => {
try {
const user = await db.query('SELECT * FROM users WHERE email = $1', [
req.body.email,
]);
res.json(user);
} catch (error) {
res.status(500).json({ error: 'Internal server error' });
}
});
🟡 MEDIUM: Missing Input Validation
- No validation on
req.body.emailformat - Fix: Add email format validation before query
🟡 MEDIUM: Missing Error Handling
- Unhandled promise rejection could crash server
- Fix: Wrap in try/catch with proper error response
Related Skills
jest-testing-generator— Suggest missing test casesnest-backend-service-builder— Recommend architectural improvements
スコア
総合スコア
65/100
リポジトリの品質指標に基づく評価
✓SKILL.md
SKILL.mdファイルが含まれている
+20
✓LICENSE
ライセンスが設定されている
+10
○説明文
100文字以上の説明がある
0/10
○人気
GitHub Stars 100以上
0/15
✓最近の活動
1ヶ月以内に更新
+10
○フォーク
10回以上フォークされている
0/5
✓Issue管理
オープンIssueが50未満
+5
✓言語
プログラミング言語が設定されている
+5
✓タグ
1つ以上のタグが設定されている
+5
レビュー
💬
レビュー機能は近日公開予定です





