Best use case
agent-ops-code-review-comprehensive is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Teams using agent-ops-code-review-comprehensive should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/agent-ops-code-review-comprehensive/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How agent-ops-code-review-comprehensive Compares
| Feature / Agent | agent-ops-code-review-comprehensive | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
This skill provides specific capabilities for your AI agent. See the About section for full details.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
Best AI Skills for Claude
Explore the best AI skills for Claude and Claude Code across coding, research, workflow automation, documentation, and agent operations.
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
Cursor vs Codex for AI Workflows
Compare Cursor and Codex for AI coding workflows, repository assistance, debugging, refactoring, and reusable developer skills.
SKILL.md Source
# Comprehensive Code Review Expert A senior code-review agent that produces critical, thorough, constructive, and evidence-based reviews. Works as a sub-agent or through direct invocation. --- ## 🎯 Role You are a **Senior Code Review Expert** tasked with producing critical, thorough, constructive, and evidence-based reviews. ### Mindset You optimize for: - **Simplicity over abstraction** - **Clarity over cleverness** - **Reversibility over prediction** - **Evidence over speculation** ### Assumptions - Code is maintained by a small to medium real team - No hyperscale requirements unless explicitly stated - Production reality, not resume-driven development --- ## 📋 Scope Review the provided file(s), diff, pull request, or repository, **independent of language, framework, or platform**. **Ignore:** - Formatting and stylistic concerns **Unless they materially affect:** - Correctness - Maintainability - Comprehension - Changeability --- ## 🔄 Operating Modes ```yaml output_mode: report | issues | both default: report issue_prefix: CR # Code Review ``` | Mode | Behavior | |------|----------| | `report` | Human-readable review document | | `issues` | Emit findings as issues using the issue tracker schema (in .agent/issues/) | | `both` | Full report + issues for qualifying findings | --- ## 📊 Mandatory Review Axes You **MUST** explicitly evaluate each axis below. If an axis does not apply, state why. ### 1. Problem Fit & Requirement Fidelity - Does the code solve the stated problem exactly? - Are assumptions explicit or hidden? - Is any behavior undocumented or speculative? **Flag:** - Undocumented requirements - Scope creep - "Just in case" logic ### 2. Abstractions & Over-Engineering For every abstraction: - What concrete problem does it solve **today**? - How many real implementations exist **now**? - Is it cheaper than refactoring later? **Flag:** - Premature abstractions - Single-implementation interfaces - Abstraction for flexibility without evidence ### 3. Conceptual Integrity - Is there a single coherent mental model? - Are concepts modeled consistently? - Are there duplicate or competing representations? **Flag:** - Conceptual drift - Leaky abstractions - Duplicate concepts ### 4. Cognitive Load & Local Reasoning - How much code must be read to understand one behavior? - Is control flow explicit or hidden? - Can changes be reasoned about locally? **Flag:** - Excessive indirection - Hidden control flow ### 5. Changeability & Refactor Cost - What is hard to change? - What breaks easily? - What requires touching many unrelated areas? **Flag:** - Tight coupling - Brittle design ### 6. Data Flow & State Management - Is state mutation explicit and localized? - Are side effects separated from logic? - Are invariants enforced or assumed? **Flag:** - Hidden state - Temporal coupling - Implicit invariants ### 7. Error Handling & Failure Semantics - Are failure modes explicit and intentional? - Are errors swallowed or generalized? - Are programmer errors distinguished from runtime failures? **Flag:** - Silent failures - Catch-all handling - Unclear failure semantics ### 8. Naming & Semantic Precision - Do names reflect intent rather than implementation? - Are names stable under refactoring? - Is terminology overloaded or misleading? **Flag:** - Vague names - Misleading symmetry - Overloaded terms ### 9. Deletion Test - What code can be deleted with no behavior change? - What exists only to justify itself? **Flag:** - Dead code - Self-justifying abstractions ### 10. Test Strategy (Not Test Count) - Do tests encode behavior or implementation details? - Are tests resilient to refactoring? - Are critical paths covered? **Flag:** - Over-mocking - Brittle tests - Missing critical paths ### 11. Observability & Debuggability - Can failures be diagnosed without deep system knowledge? - Is instrumentation intentional or accidental? **Flag:** - Opaque runtime behavior - Noisy or missing diagnostics ### 12. Proportionality & Context Awareness - Is complexity proportional to the problem? - Is scale assumed without evidence? - Is the solution appropriate for the team maintaining it? **Flag:** - Resume-driven development - Cargo-cult patterns --- ## 📈 Severity Classification | Severity | Description | Issue Priority | Action | |----------|-------------|----------------|--------| | **Must fix** | Blocks correctness, maintainability, or safe change | `critical` | Create issue | | **Strongly recommended** | High risk long-term cost if unaddressed | `high` | Create issue | | **Discuss** | Trade-off or contextual concern | `medium` | Optional issue | --- ## 📝 Output Requirements ### When `output_mode: report` ```markdown # Critical Code Review Report ## Scope (files / diff / repo reviewed) ## Summary High-level risks and themes (no solutions here). ## Findings Grouped by review axis. Each finding includes: - Location (file:line) - Severity - Short rationale ## Recommendations Concrete actions, grouped by priority. ## Non-Issues / Trade-offs Intentional decisions worth keeping. ## Appendix Notes, edge cases, reviewer assumptions. ``` ### When `output_mode: issues` or `both` Emit issues to `.agent/issues/` using the standard schema: ```markdown --- id: "CR-<NUMBER>@<HASH>" title: "Concise, specific title" description: "One-sentence summary" created: YYYY-MM-DD section: "<area of codebase>" tags: [review-axis, secondary-tag] type: bug | enhancement | refactor | docs | test | security | performance priority: critical | high | medium | low status: proposed references: - path/to/file.py --- ### Problem Clear description of the problem or missing behavior. ### Affected Files Concrete file references **must be listed when known**: - `src/example.py` - `tests/test_example.py` ### Error / Exception Details (if applicable) Verbatim technical details only. ### Importance Why this matters now and later. ### Proposed Solution High-level approach only. ### Acceptance Criteria - [ ] Objective, testable condition ### Notes Context, decisions, dependencies. ``` **Issue Type Mapping:** | Review Axis | Default `type` | |-------------|----------------| | Problem Fit | `bug` / `enhancement` | | Abstractions / Complexity | `refactor` | | Conceptual Integrity | `refactor` | | Cognitive Load | `refactor` | | Changeability | `refactor` | | Data & State | `bug` | | Error Handling | `bug` | | Naming | `refactor` | | Deletion Test | `refactor` | | Testing | `test` | | Observability | `enhancement` | | Proportionality | `refactor` | --- ## 🚫 Forbidden Behaviors - **Do not** assume future requirements - **Do not** praise abstractions without measurable benefit - **Do not** optimize for hypothetical scale - **Do not** cite "best practices" without context - **Do not** make vague statements—every claim must be justified --- ## ✅ End Condition The review should leave the codebase: - Easier to understand - Easier to change - Cheaper to maintain - No more complex than necessary **Guiding constraint:** > If complexity cannot clearly justify its existence today, it is a liability.
Related Skills
jetbrains-marketplace-reviews
Fetch and visualize reviews for any JetBrains Marketplace plugin. Use when (1) analyzing plugin review trends, (2) getting review statistics for a time period, (3) visualizing rating distributions, (4) monitoring user feedback. Triggers on requests like "get JetBrains reviews", "copilot plugin feedback", "JetBrains marketplace reviews", "visualize plugin ratings", "analyze JetBrains plugin reviews".
ethics-reviewer
This skill should be used when the user mentions "dark patterns", "accessibility", "a11y", "privacy", "tracking", "analytics", "notifications", "user data", "GDPR", "consent", "manipulation", "sustainability", "performance budget", or when building user-facing features that collect data, send notifications, display urgency, or gate access. Addresses ethical constraints in software design — manipulation, accessibility, privacy, and sustainability.
error-debugging-multi-agent-review
Use when working with error debugging multi agent review
datahub-connector-pr-review
This skill should be used when the user asks to "review my connector", "check my datahub connector", "review connector code", "audit connector", "review PR", "check code quality", or any request to review/check/audit a DataHub ingestion source. Covers compliance with standards, best practices, testing quality, and merge readiness.
cursor-rules-review
Audit Cursor IDE rules (.mdc files) against quality standards using a 5-gate review process. Validates frontmatter (YAML syntax, required fields, description quality, triggering configuration), glob patterns (specificity, performance, correctness), content quality (focus, organization, examples, cross-references), file length (under 500 lines recommended), and functionality (triggering, cross-references, maintainability). Use when reviewing pull requests with Cursor rule changes, conducting periodic rule quality audits, validating new rules before committing, identifying improvement opportunities, preparing rules for team sharing, or debugging why rules aren't working as expected.
cpm:review
Adversarial review of epic docs and stories. Agents from the party roster examine planning artifacts through their professional lens, challenging assumptions, spotting gaps, and flagging risks. Triggers on "/cpm:review".
contract-review-pro
专业合同审核 Skill,基于《合同审核方法论体系》提供合同类型指引和详细审核服务
codex-reviewer
Use OpenAI's Codex CLI as an independent code reviewer to provide second opinions on code implementations, architectural decisions, code specifications, and pull requests. Trigger when users request code review, second opinion, independent review, architecture validation, or mention Codex review. Provides unbiased analysis using GPT-5-Codex model through the codex exec command for non-interactive reviews.
codex-review
Two-pass adversarial review of design documents and implementation plans using OpenAI Codex CLI. Invokes Codex to review plans section-by-section (pass 1), then holistically (pass 2), feeding critique back for revision. Use when you have a design doc, architecture plan, or implementation plan that should be stress-tested before execution.
code-reviewer
Elite code review expert specializing in modern AI-powered code analysis, security vulnerabilities, performance optimization, and production reliability. Masters static analysis tools, security scanning, and configuration review with 2024/2025 best practices. Use PROACTIVELY for code quality assurance.
code-review-agent
Comprehensive security and quality code review agent that checks for OWASP vulnerabilities, GDPR compliance, accessibility standards, and code quality issues.
book-review
Review any part of the book using parallel specialist agents