adversarial-review
Adversarial code review using the opposite model. Spawns 1–3 reviewers on the opposing model (Claude spawns Codex, Codex spawns Claude) to challenge work from distinct critical lenses. Triggers: "adversarial review".
Best use case
adversarial-review is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Adversarial code review using the opposite model. Spawns 1–3 reviewers on the opposing model (Claude spawns Codex, Codex spawns Claude) to challenge work from distinct critical lenses. Triggers: "adversarial review".
Teams using adversarial-review should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/adversarial-review/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How adversarial-review Compares
| Feature / Agent | adversarial-review | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Adversarial code review using the opposite model. Spawns 1–3 reviewers on the opposing model (Claude spawns Codex, Codex spawns Claude) to challenge work from distinct critical lenses. Triggers: "adversarial review".
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
Best AI Skills for Claude
Explore the best AI skills for Claude and Claude Code across coding, research, workflow automation, documentation, and agent operations.
Cursor vs Codex for AI Workflows
Compare Cursor and Codex for AI coding workflows, repository assistance, debugging, refactoring, and reusable developer skills.
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
SKILL.md Source
# Adversarial Review Spawn reviewers on the **opposite model** to challenge work. Reviewers attack from distinct lenses grounded in brain principles. The deliverable is a synthesized verdict — do NOT make changes. **Hard constraint:** Reviewers MUST run via the opposite model's CLI (`codex exec` or `claude -p`). Do NOT use subagents, the Agent tool, or any internal delegation mechanism as reviewers — those run on *your own* model, which defeats the purpose. ## Step 1 — Load Principles Read `references/reviewer-lenses.md`. The three lenses (Skeptic, Architect, Minimalist) and their mapped principles govern reviewer judgments. If a `brain/principles.md` file exists, also read it and follow any `[[wikilink]]` references for additional principles. ## Step 2 — Determine Scope and Intent Identify what to review from context (recent diffs, referenced plans, user message). Determine the **intent** — what the author is trying to achieve. This is critical: reviewers challenge whether the work *achieves the intent well*, not whether the intent is correct. State the intent explicitly before proceeding. Assess change size: | Size | Threshold | Reviewers | |------|-----------|-----------| | Small | < 50 lines, 1–2 files | 1 (Skeptic) | | Medium | 50–200 lines, 3–5 files | 2 (Skeptic + Architect) | | Large | 200+ lines or 5+ files | 3 (Skeptic + Architect + Minimalist) | Read `references/reviewer-lenses.md` for lens definitions. ## Step 3 — Detect Model and Spawn Reviewers Create a temp directory for reviewer output: ```sh REVIEW_DIR=$(mktemp -d /tmp/adversarial-review.XXXXXX) ``` Determine which model you are, then spawn reviewers on the opposite: **If you are Claude** → spawn Codex reviewers via `codex exec`: ```sh codex exec --skip-git-repo-check -o "$REVIEW_DIR/skeptic.md" "prompt" 2>/dev/null ``` Use `--profile edit` only if the reviewer needs to run tests. Default to read-only. Run with `run_in_background: true`, monitor via `TaskOutput` with `block: true, timeout: 600000`. **If you are Codex** → spawn Claude reviewers via `claude` CLI: ```sh claude -p "prompt" > "$REVIEW_DIR/skeptic.md" 2>/dev/null ``` Run with `run_in_background: true`. Name each output file after the lens: `skeptic.md`, `architect.md`, `minimalist.md`. ### Reviewer prompt template Each reviewer gets a single prompt containing: 1. The stated intent (from Step 2) 2. Their assigned lens (full text from references/reviewer-lenses.md) 3. The principles relevant to their lens (file contents, not summaries) 4. The code or diff to review 5. Instructions: "You are an adversarial reviewer. Your job is to find real problems, not validate the work. Be specific — cite files, lines, and concrete failure scenarios. Rate each finding: high (blocks ship), medium (should fix), low (worth noting). Write findings as a numbered markdown list to your output file." Spawn all reviewers in parallel. ## Step 4 — Verify and Synthesize Verdict Before reading reviewer output, log which CLI was used and confirm the output files exist: ```sh echo "reviewer_cli=codex|claude" ls "$REVIEW_DIR"/*.md ``` If any output file is missing or empty, note the failure in the verdict — do not silently skip a reviewer. Read each reviewer's output file from `$REVIEW_DIR/`. Deduplicate overlapping findings. Produce a single verdict: ``` ## Intent <what the author is trying to achieve> ## Verdict: PASS | CONTESTED | REJECT <one-line summary> ## Findings <numbered list, ordered by severity (high → medium → low)> For each finding: - **[severity]** Description with file:line references - Lens: which reviewer raised it - Principle: which brain principle it maps to - Recommendation: concrete action, not vague advice ## What Went Well <1–3 things the reviewers found no issue with — acknowledge good work> ``` **Verdict logic:** - **PASS** — no high-severity findings - **CONTESTED** — high-severity findings but reviewers disagree on them - **REJECT** — high-severity findings with reviewer consensus ## Step 5 — Render Judgment After synthesizing the reviewers, apply your own judgment. Using the stated intent and brain principles as your frame, state which findings you would accept and which you would reject — and why. Reviewers are adversarial by design; not every finding warrants action. Call out false positives, overreach, and findings that mistake style for substance. Append to the verdict: ``` ## Lead Judgment <for each finding: accept or reject with a one-line rationale> ```
Related Skills
update-config
Update awesome-claude-code-config to the latest version. Checks remote for new releases, then re-runs the installer with the interactive selector. Use when user types /update-config or asks to update their Claude Code configuration.
paper-reading
Use when user asks to read, summarize, or analyze a research paper (PDF or text). Triggers on keywords like "read paper", "summarize paper", "paper summary", "literature review", "analyze this paper"
humanizer
Remove signs of AI-generated writing from text. Use when editing or reviewing text to make it sound more natural and human-written. Based on Wikipedia's comprehensive "Signs of AI writing" guide. Detects and fixes patterns including: inflated symbolism, promotional language, superficial -ing analyses, vague attributions, em dash overuse, rule of three, AI vocabulary words, negative parallelisms, and excessive conjunctive phrases.
humanizer-zh
去除文本中的 AI 生成痕迹。适用于编辑或审阅文本,使其听起来更自然、更像人类书写。 基于维基百科的"AI 写作特征"综合指南。检测并修复以下模式:夸大的象征意义、 宣传性语言、以 -ing 结尾的肤浅分析、模糊的归因、破折号过度使用、三段式法则、 AI 词汇、否定式排比、过多的连接性短语。
flutter-dart-code-review
库无关的Flutter/Dart代码审查清单,涵盖Widget最佳实践、状态管理模式(BLoC、Riverpod、Provider、GetX、MobX、Signals)、Dart惯用法、性能、可访问性、安全性和整洁架构。
security-review
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or implementing payment/sensitive features. Provides comprehensive security checklist and patterns.
addressing-pr-review-comments
Address all valid review comments on a PR for the current branch in the streamlit/streamlit repo. Covers both inline review comments and general PR (issue) comments. Use when a PR has reviewer feedback to address, including code changes, style fixes, and documentation updates.
lightning-architecture-review
Review Bitcoin Lightning Network protocol designs, compare channel factory approaches, and analyze Layer 2 scaling tradeoffs. Covers trust models, on-chain footprint, consensus requirements, HTLC/PTLC compatibility, liveness, and watchtower support.
gha-security-review
Find exploitable vulnerabilities in GitHub Actions workflows. Every finding MUST include a concrete exploitation scenario — if you can't build the attack, don't report it.
gh-review-requests
Fetch unread GitHub notifications for open PRs where review is requested from a specified team or opened by a team member. Use when asked to "find PRs I need to review", "show my review requests", "what needs my review", "fetch GitHub review requests", or "check team review queue".
fix-review
Verify fix commits address audit findings without new bugs
error-debugging-multi-agent-review
Use when working with error debugging multi agent review