Code Reviewer Skill
A comprehensive code review skill for identifying security vulnerabilities and best practices violations.
Overview
The code-reviewer skill provides automated code review capabilities covering:
- Security Analysis: OWASP Top 10, CWE Top 25, language-specific vulnerabilities
- Code Quality: Naming conventions, complexity, duplication, dead code
- Performance: N+1 queries, inefficient algorithms, memory leaks
- Maintainability: Documentation, test coverage, dependency health
Quick Start
Basic Usage
# Review entire codebase
/code-reviewer
# Review specific directory
/code-reviewer --scope src/auth
# Focus on security only
/code-reviewer --focus security
# Focus on best practices only
/code-reviewer --focus best-practices
Advanced Options
# Review with custom severity threshold
/code-reviewer --severity critical,high
# Review specific file types
/code-reviewer --languages typescript,python
# Generate detailed report
/code-reviewer --report-level detailed
# Resume from previous session
/code-reviewer --resume
Features
Security Analysis
✅ OWASP Top 10 2021 Coverage
- Injection vulnerabilities (SQL, Command, XSS)
- Authentication & authorization flaws
- Sensitive data exposure
- Security misconfiguration
- And more...
✅ CWE Top 25 Coverage
- Cross-site scripting (CWE-79)
- SQL injection (CWE-89)
- Command injection (CWE-78)
- Input validation (CWE-20)
- And more...
✅ Language-Specific Checks
- JavaScript/TypeScript: prototype pollution, eval usage
- Python: pickle vulnerabilities, command injection
- Java: deserialization, XXE
- Go: race conditions, memory leaks
Best Practices Review
✅ Code Quality
- Naming convention compliance
- Cyclomatic complexity analysis
- Code duplication detection
- Dead code identification
✅ Performance
- N+1 query detection
- Inefficient algorithm patterns
- Memory leak detection
- Resource cleanup verification
✅ Maintainability
- Documentation coverage
- Test coverage analysis
- Dependency health check
- Error handling review
Output
The skill generates comprehensive reports in .code-review/ directory:
.code-review/
├── inventory.json # File inventory with metadata
├── security-findings.json # Security vulnerabilities
├── best-practices-findings.json # Best practices violations
├── summary.json # Summary statistics
├── REPORT.md # Comprehensive markdown report
└── FIX-CHECKLIST.md # Actionable fix checklist
Report Contents
REPORT.md includes:
- Executive summary with risk assessment
- Quality scores (Security, Code Quality, Performance, Maintainability)
- Detailed findings organized by severity
- Code examples with fix recommendations
- Action plan prioritized by urgency
- Compliance status (PCI DSS, HIPAA, GDPR, SOC 2)
FIX-CHECKLIST.md provides:
- Checklist format for tracking fixes
- Organized by severity (Critical → Low)
- Effort estimates for each issue
- Priority assignments
Configuration
Create .code-reviewer.json in project root:
{
"scope": {
"include": ["src/**/*", "lib/**/*"],
"exclude": ["**/*.test.ts", "**/*.spec.ts", "**/node_modules/**"]
},
"security": {
"enabled": true,
"checks": ["owasp-top-10", "cwe-top-25"],
"severity_threshold": "medium"
},
"best_practices": {
"enabled": true,
"code_quality": true,
"performance": true,
"maintainability": true
},
"reporting": {
"format": "markdown",
"output_path": ".code-review/",
"include_snippets": true,
"include_fixes": true
}
}
Workflow
Phase 1: Code Discovery
- Discover and categorize code files
- Extract metadata (LOC, complexity, framework)
- Prioritize files (Critical, High, Medium, Low)
Phase 2: Security Analysis
- Scan for OWASP Top 10 vulnerabilities
- Check CWE Top 25 weaknesses
- Apply language-specific security patterns
- Generate security findings
Phase 3: Best Practices Review
- Analyze code quality issues
- Detect performance problems
- Assess maintainability concerns
- Generate best practices findings
Phase 4: Report Generation
- Consolidate all findings
- Calculate quality scores
- Generate comprehensive reports
- Create actionable checklists
Integration
Pre-commit Hook
Block commits with critical/high issues:
#!/bin/bash
# .git/hooks/pre-commit
staged_files=$(git diff --cached --name-only --diff-filter=ACMR)
ccw run code-reviewer --scope "$staged_files" --severity critical,high
if [ $? -ne 0 ]; then
echo "❌ Code review found critical/high issues. Commit aborted."
exit 1
fi
CI/CD Integration
# .github/workflows/code-review.yml
name: Code Review
on: [pull_request]
jobs:
review:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- name: Run Code Review
run: |
ccw run code-reviewer --report-level detailed
ccw report upload .code-review/report.md
Examples
Example 1: Security-Focused Review
# Review authentication module for security issues
/code-reviewer --scope src/auth --focus security --severity critical,high
Output: Security findings with OWASP/CWE mappings and fix recommendations
Example 2: Performance Review
# Review API endpoints for performance issues
/code-reviewer --scope src/api --focus best-practices --check performance
Output: N+1 queries, inefficient algorithms, memory leak detections
Example 3: Full Project Audit
# Comprehensive review of entire codebase
/code-reviewer --report-level detailed --output .code-review/audit-2024-01.md
Output: Complete audit with all findings, scores, and action plan
Compliance Support
The skill maps findings to compliance requirements:
- PCI DSS: Requirement 6.5 (Common coding vulnerabilities)
- HIPAA: Technical safeguards and access controls
- GDPR: Article 32 (Security of processing)
- SOC 2: Security controls and monitoring
Architecture
Execution Mode
Sequential - Fixed phase order for systematic review:
- Code Discovery → 2. Security Analysis → 3. Best Practices → 4. Report Generation
Tools Used
mcp__ace-tool__search_context- Semantic code searchmcp__ccw-tools__smart_search- Pattern matchingRead- File content accessWrite- Report generation
Quality Standards
Scoring System
Overall Score = (
Security Score × 0.4 +
Code Quality Score × 0.25 +
Performance Score × 0.2 +
Maintainability Score × 0.15
)
Score Ranges
- A (90-100): Excellent - Production ready
- B (80-89): Good - Minor improvements needed
- C (70-79): Acceptable - Some issues to address
- D (60-69): Poor - Significant improvements required
- F (0-59): Failing - Major issues, not production ready
Troubleshooting
Large Codebase
If review takes too long:
# Review in batches
/code-reviewer --scope src/module-1
/code-reviewer --scope src/module-2 --resume
# Or use parallel execution
/code-reviewer --parallel 4
False Positives
Configure suppressions in .code-reviewer.json:
{
"suppressions": {
"security": {
"sql-injection": {
"paths": ["src/legacy/**/*"],
"reason": "Legacy code, scheduled for refactor"
}
}
}
}
File Structure
.claude/skills/code-reviewer/
├── SKILL.md # Main skill documentation
├── README.md # This file
├── phases/
│ ├── 01-code-discovery.md
│ ├── 02-security-analysis.md
│ ├── 03-best-practices-review.md
│ └── 04-report-generation.md
├── specs/
│ ├── security-requirements.md
│ ├── best-practices-requirements.md
│ └── quality-standards.md
└── templates/
├── security-finding.md
├── best-practice-finding.md
└── report-template.md
Version
v1.0.0 - Initial release
License
MIT License