Code Review Gate
Perform code review with quality scoring and configurable threshold enforcement.
Best use case
Code Review Gate is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Perform code review with quality scoring and configurable threshold enforcement.
Teams using Code Review Gate should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/code-review-gate/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How Code Review Gate Compares
| Feature / Agent | Code Review Gate | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Perform code review with quality scoring and configurable threshold enforcement.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
Best AI Skills for Claude
Explore the best AI skills for Claude and Claude Code across coding, research, workflow automation, documentation, and agent operations.
Cursor vs Codex for AI Workflows
Compare Cursor and Codex for AI coding workflows, repository assistance, debugging, refactoring, and reusable developer skills.
SKILL.md Source
# Code Review Gate Perform code review with quality scoring and configurable threshold enforcement. ## Agent Code Reviewer - `automaker-code-reviewer` ## Workflow 1. Review all changed files for correctness 2. Check for security vulnerabilities 3. Identify performance issues 4. Verify test coverage adequacy 5. Check code style consistency 6. Detect dead code and debug artifacts 7. Verify no secrets in code 8. Assign quality score (0-100) 9. Make approve/reject decision 10. Enforce quality threshold gate ## Inputs - `projectName` - Project name - `featureId` - Feature identifier - `branch` - Feature branch name - `changedFiles` - Files to review - `reviewPolicy` - Policy: 'auto', 'manual', 'hybrid' - `qualityThreshold` - Minimum score (0-100) ## Outputs - Review with approval, score, comments, security issues, quality gate pass/fail ## Process Files - `automaker-orchestrator.js` - Phase 4 - `automaker-review-ship.js` - Stages 1-2
Related Skills
api-gateway-configurator
Configure API gateways for SDK traffic management
systematic-review
Conduct comprehensive literature searches, quality assessments, evidence synthesis, and meta-analyses
quality-assurance-review
Conduct systematic quality reviews of instructional materials using established rubrics (Quality Matters) and design standards
peer-review-simulator
Skill for simulating peer review feedback on manuscripts
dfm-review
Skill for design for manufacturing review and optimization
design-review
Skill for formal design review preparation and execution (PDR/CDR)
design-review-facilitator
Design review planning and execution skill for structured design phase gate reviews per 21 CFR 820.30
clinical-literature-reviewer
Systematic literature review skill for clinical evaluation supporting regulatory submissions
performance-review
Generate performance review documentation and facilitate evaluation processes
requesting-code-review
Use when completing tasks, implementing major features, or before merging to verify work meets requirements.
receiving-code-review
Use when receiving code review feedback, before implementing suggestions. Requires technical rigor and verification, not blind implementation.
security-review
Security vulnerability assessment identifying OWASP risks, injection vectors, authentication issues, and data exposure with severity classification.