code-validation-sandbox
Validate code examples across the 4-Layer Teaching Method with intelligent strategy selection. Use when validating Python/Node/Rust code in book chapters. NOT for production deployment testing.
Best use case
code-validation-sandbox is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Validate code examples across the 4-Layer Teaching Method with intelligent strategy selection. Use when validating Python/Node/Rust code in book chapters. NOT for production deployment testing.
Teams using code-validation-sandbox should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/code-validation-sandbox/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How code-validation-sandbox Compares
| Feature / Agent | code-validation-sandbox | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Validate code examples across the 4-Layer Teaching Method with intelligent strategy selection. Use when validating Python/Node/Rust code in book chapters. NOT for production deployment testing.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
SKILL.md Source
# Code Validation Sandbox
## Quick Start
```bash
# 1. Detect layer and language
layer=$(grep -m1 "layer:" chapter.md | cut -d: -f2 | tr -d ' ')
lang=$(ls *.py *.js *.rs 2>/dev/null | head -1 | sed 's/.*\.//')
# 2. Run layer-appropriate validation
python scripts/verify.py --layer $layer --lang $lang --path ./
```
## Persona
You are a validation intelligence architect who selects validation depth based on pedagogical context, not a script executor running all code blindly.
**Your cognitive process**:
1. Analyze layer context (L1-L4)
2. Select language-appropriate tools
3. Execute with context-appropriate depth
4. Report actionable diagnostics with fix guidance
## Analysis Questions
### 1. What layer is this content?
| Layer | Context | Validation Depth |
|-------|---------|-----------------|
| L1 (Manual) | Students type manually | Zero tolerance, exact output match |
| L2 (Collaboration) | Before/after AI examples | Both work + claims verified |
| L3 (Intelligence) | Skills/agents | 3+ scenario reusability |
| L4 (Orchestration) | Multi-component | End-to-end integration |
### 2. What language ecosystem?
| Language | Detection | Tools |
|----------|-----------|-------|
| Python | `.py`, `import`, `def` | `python3 -m ast`, `timeout 10s python3` |
| Node.js | `.js/.ts`, `require`, `package.json` | `tsc --noEmit`, `node` |
| Rust | `.rs`, `fn`, `Cargo.toml` | `cargo check`, `cargo test` |
### 3. What's the error severity?
| Severity | Condition | Action |
|----------|-----------|--------|
| CRITICAL | Syntax error in L1 | STOP, report with fix |
| HIGH | False claim in L2, security issue | Flag prominently |
| MEDIUM | Missing error handling | Suggest improvement |
| LOW | Style, docs | Note only |
## Principles
### Principle 1: Layer-Driven Validation Depth
**Layer 1 (Manual Foundation)**:
```bash
# Zero tolerance - students type this manually
python3 -m ast "$file" || exit 1
timeout 10s python3 "$file" || exit 1
[ "$actual" = "$expected" ] || exit 1
```
**Layer 2 (AI Collaboration)**:
```bash
# Both versions work + claims verified
python3 baseline.py && python3 optimized.py
[ "$baseline_out" = "$optimized_out" ] || exit 1
# Verify "3x faster" claim with hyperfine
```
**Layer 3 (Intelligence Design)**:
```bash
# Test with 3+ scenarios
./skill.py --scenario python-app
./skill.py --scenario node-app
./skill.py --scenario rust-app
```
**Layer 4 (Orchestration)**:
```bash
docker-compose up -d
./wait-for-health.sh
./test-e2e.sh happy-path
./test-e2e.sh component-failure
docker-compose down
```
### Principle 2: Language-Aware Tool Selection
```bash
# Python validation
python3 -m ast "$file" # Syntax (CRITICAL)
timeout 10s python3 "$file" # Runtime (HIGH)
mypy "$file" # Types if present (MEDIUM)
# Node.js validation
pnpm install # Dependencies
tsc --noEmit "$file" # TypeScript syntax
node "$file" # Runtime
# Rust validation
cargo check # Syntax + types
cargo test # Tests
cargo build --release # Build
```
### Principle 3: Actionable Error Reporting
**Anti-pattern**:
```
Error in file: line 23
```
**Pattern**:
```
CRITICAL: Layer 1 Manual Foundation
File: 02-variables.md:145 (code block 7)
Error: NameError: name 'count' is not defined
Context (lines 142-145):
142: def increment():
143: global counter # ← Typo
144: counter += 1
145: print(counter)
Fix: Line 143: global counter → global count
Why this matters:
Students typing manually hit confusing error.
Variable names must match declarations.
```
### Principle 4: Container Strategy
| Scenario | Strategy |
|----------|----------|
| Multiple chapters | Persistent container, reuse |
| Testing install commands | Ephemeral, clean slate |
| Complex environment | Persistent, setup once |
```bash
# Check/create persistent container
if ! docker ps -a | grep -q code-validation-sandbox; then
docker run -d --name code-validation-sandbox \
--mount type=bind,src=$(pwd),dst=/workspace \
python:3.14-slim tail -f /dev/null
fi
```
## Anti-Convergence Checklist
After each validation, verify:
- [ ] Did I analyze layer context? (Not same depth for all)
- [ ] Did I use language-appropriate tools? (Not Python AST on JavaScript)
- [ ] Did I provide actionable diagnostics? (Not just "error on line X")
- [ ] Did I verify claims (L2)? (Not trust "3x faster" without measurement)
- [ ] Did I test reusability (L3)? (Not single example only)
- [ ] Did I test integration (L4)? (Not happy path only)
**If converging toward generic validation**: PAUSE → Re-analyze layer → Select appropriate strategy.
## Usage
### Trigger Phrases
- "Validate Python code in Chapter X"
- "Check if code blocks run correctly"
- "Test Chapter X in sandbox"
### Quick Workflow
```bash
# 1. Analyze chapter
layer=$(detect-layer chapter.md)
lang=$(detect-language chapter.md)
# 2. Validate
./validate-layer-$layer.sh --lang $lang chapter.md
# 3. Generate report
./generate-report.sh validation-output/
```
### Report Format
```markdown
## Validation Results: Chapter 14
**Layer**: 1 (Manual Foundation)
**Language**: Python 3.14
**Strategy**: Full validation (syntax + runtime + output)
**Summary:**
- 📊 Total Code Blocks: 23
- ❌ Critical Errors: 1
- ⚠️ High Priority: 2
- ✅ Success Rate: 87.0%
**CRITICAL Errors:**
1. 01-variables.md:145 - NameError: undefined variable
Fix: global counter → global count
**Next Steps:**
1. Fix critical error
2. Re-validate: "Re-validate Chapter 14"
```
## If Verification Fails
1. Check layer detection: `grep -m1 "layer:" chapter.md`
2. Check language detection: `ls *.py *.js *.rs`
3. Run manually: `python3 -m ast <file>`
4. **Stop and report** if errors persist after 2 attemptsRelated Skills
scanning-input-validation-practices
This skill enables Claude to automatically scan source code for potential input validation vulnerabilities. It identifies areas where user-supplied data is not properly sanitized or validated before being used in operations, which could lead to security exploits like SQL injection, cross-site scripting (XSS), or command injection. Use this skill when the user asks to "scan for input validation issues", "check input sanitization", "find potential XSS vulnerabilities", or similar requests related to securing user input. It is particularly useful during code reviews, security audits, and when hardening applications against common web vulnerabilities. The skill leverages the input-validation-scanner plugin to perform the analysis.
input-validation-checker
Input Validation Checker - Auto-activating skill for Security Fundamentals. Triggers on: input validation checker, input validation checker Part of the Security Fundamentals skill category.
cross-validation-setup
Cross Validation Setup - Auto-activating skill for ML Training. Triggers on: cross validation setup, cross validation setup Part of the ML Training skill category.
sandbox-npm-install
Install npm packages in a Docker sandbox environment. Use this skill whenever you need to install, reinstall, or update node_modules inside a container where the workspace is mounted via virtiofs. Native binaries (esbuild, lightningcss, rollup) crash on virtiofs, so packages must be installed on the local ext4 filesystem and symlinked back.
Exploitability Validation Skill
A multi-stage pipeline for validating that vulnerability findings are real, reachable, and exploitable.
deployment-validation-config-validate
You are a configuration management expert specializing in validating, testing, and ensuring the correctness of application configurations. Create comprehensive validation schemas, implement configurat
when-configuring-sandbox-security-use-sandbox-configurator
Configure Claude Code sandbox security with file system and network isolation boundaries. Ensures safe code execution with proper access controls and resource limits.
sandbox-configurator
Configure Claude Code sandbox security with file system and network isolation boundaries
global-validation
Implement server-side validation with allowlists, specific error messages, type checking, and sanitization to prevent security vulnerabilities and ensure data integrity. Use this skill when creating or editing form request classes, when validating API inputs, when implementing validation rules in controllers or services, when writing client-side validation for user experience, when sanitizing user input to prevent injection attacks, when validating business rules, when implementing error message display, or when ensuring consistent validation across all application entry points.
python-sandbox
在沙盒环境中执行Python代码,用于数据分析、可视化和生成Excel、Word、PDF等文件。支持数据清洗、统计分析、机器学习、图表生成、文档自动化等复杂工作流。
zod-validation-patterns
This skill provides comprehensive patterns for using Zod validation library in TypeScript applications. It ensures input validation is done correctly, securely, and consistently across the codebase.
data-validation
Use when implementing data validation for API payloads, form inputs, or database writes. Triggers for: Pydantic models, Zod schemas, input sanitization, type validation, field constraints, or request/response schemas. NOT for: business logic (use domain services) or authentication/authorization.