By emasoft
Six-phase PR review pipeline and 10-phase codebase audit pipeline for Claude Code. PR review: code correctness swarm, claim verification, skeptical external review, security analysis with deduplication. Includes iterative fix loop for automated resolution. Codebase audit: file inventory, grep triage, parallel discovery swarm, verification, gap-fill, per-domain consolidation, security scan, TODO generation, and optional fix loop with verification.
npx claudepluginhub emasoft/emasoft-plugins --plugin code-auditor-agentRun a full codebase audit against a reference standard. Discovers all files, triages with grep, audits in parallel batches, verifies findings, fills gaps, consolidates per-domain, and generates actionable TODO files. Optionally applies fixes with verification loop.
Run an incremental audit of only the files changed since a previous audit or commit. Finds changed files via git diff, traces their dependents, and audits only that subset. Merges delta findings with a previous full audit report. NOT a substitute for full audit.
Extracts every factual claim from the PR description and commit message, then verifies each one against the actual code. This agent catches the #1 source of missed bugs: the gap between what the author thinks they did and what the code actually does. Born from a real incident where "fromLabel/toLabel population via registry lookup" was claimed in the PR description but never implemented in convertAMPToMessage().
Per-domain code correctness auditor. Spawned as a SWARM — one instance per file group or domain. Checks type safety, logic bugs, API contracts, test coverage, security, and shell script correctness. This agent is the microscope: excellent at finding per-file bugs but structurally blind to cross-file inconsistencies and PR-level claim mismatches.
Merges multiple audit/verification/gap-fill reports for a single domain into one consolidated report. De-duplicates findings by file+line+violation_type. Separates RECORD_KEEPING items. HARD LIMIT: max 5 input reports per invocation. If more reports exist, the orchestrator must split them into sub-groups.
Deduplicates code review findings from the merged CAA report. Handles same-line-different-bug cases with semantic analysis. Produces final report with accurate counts and verdict.
Per-batch codebase auditor for compliance/decoupling audits. Spawned as a SWARM — one instance per file batch (3-4 files max). Audits files against a reference standard document to find violations such as hardcoded API calls, hardcoded governance rules, direct dependency coupling, and other compliance issues. HARD LIMIT: never processes more than 4 files per invocation.
Applies fixes from TODO files to source code. Processes 3-4 files max per invocation. Uses checkpoint-based recovery to resume after crashes. Re-reads each file after fixing to verify no syntax errors. Makes MINIMAL changes — only what the TODO specifies.
Re-audits fixed files to confirm fixes are correct and no regressions were introduced. Checks each fixed file against the reference standard and the original TODO that prompted the fix. Reports PASS or FAIL with specific remaining issues.
Deep security review agent that analyzes code for vulnerabilities, attack surfaces, injection vectors, secrets exposure, dependency risks, and compliance with latest security practices. Checks against OWASP Top 10, CWE/SANS 25, and recent CVEs. Simulates attacker perspective to identify exploitable paths. This agent is the shield: focused exclusively on security, unlike the correctness agent which treats security as one checklist item among many.
Holistic PR reviewer that reads the entire diff as a hostile external maintainer would. Not checking individual correctness but the big picture: UX concerns, breaking changes, cross-file consistency, missing implementations, design judgment, and documentation accuracy. This is the telescope that sees what the microscope (correctness swarm) misses.
Converts consolidated violation reports into actionable TODO files with dependency ordering, priority classification, and exact change instructions. Each TODO includes file, line range, current code, required change, and verification steps.
Cross-checks audit reports against actual code. Spawned per audit report (ONE report per agent). Verifies that every violation claim is real (file exists, line exists, code matches evidence). Verifies that every "CLEAN" claim is accurate (quick-checks with grep patterns). Detects missed files by diffing the report's file list against the full domain inventory.
Trigger with /audit-codebase, 'audit the codebase', 'compliance audit', 'codebase audit'. Use when auditing a codebase for compliance violations, generating TODOs, or applying automated fixes.
Trigger with "review and fix the PR", "audit and fix the PR", "pre-merge review and fix". Use when reviewing and fixing PRs with automated iterative resolution.
Trigger with "review the PR", "check the PR", "audit the PR", "pre-merge review". Use when reviewing PRs, auditing code, or running pre-merge quality gates.
Uses power tools
Uses Bash, Write, or Edit tools
Share bugs, ideas, or general feedback.
Own this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimOwn this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimMulti-lens code review pipeline: deep review (Claude or Codex), automated fix loop, interactive walkthrough, manual promote, external-finding injection.
Automated code review for pull requests using multiple specialized agents with confidence-based scoring
Review pull requests with structured analysis and approve with confidence
Comprehensive PR review agents specializing in comments, tests, error handling, type design, code quality, and code simplification
AI-powered code review in Claude Code, powered by CodeRabbit
Battle-tested Claude Code plugin for engineering teams — 50 agents, 188 skills, 68 legacy command shims, production-ready hooks, and selective install workflows evolved through continuous real-world use
Version: 3.4.2 License: MIT Author: Emasoft
Six-phase PR review pipeline and 10-phase codebase audit pipeline for Claude Code. PR review: code correctness swarm, claim verification, skeptical external review, security analysis with deduplication. Includes iterative fix loop for automated resolution. Codebase audit: file inventory, grep triage, parallel discovery swarm, verification, gap-fill, per-domain consolidation, TODO generation, and optional fix loop with verification.
Requirements: Claude Code v2.1.94 or later.
Install from the emasoft-plugins marketplace:
/plugin install code-auditor-agent@emasoft-plugins
After installing, run /reload-plugins to activate without restarting.
Choose an installation scope:
| Scope | Command | Use case |
|---|---|---|
| User (default) | /plugin install code-auditor-agent@emasoft-plugins | Personal use across all projects |
| Project | claude plugin install code-auditor-agent@emasoft-plugins --scope project | Shared with team via .claude/settings.json |
| Local | claude plugin install code-auditor-agent@emasoft-plugins --scope local | Project-specific, gitignored |
To uninstall: /plugin uninstall code-auditor-agent@emasoft-plugins. Use --keep-data to preserve persistent audit state in ${CLAUDE_PLUGIN_DATA}.
For local development, launch Claude Code with the plugin directory:
claude --plugin-dir /path/to/code-auditor-agent
Add the marketplace to your project's .claude/settings.json so team members get prompted to install it automatically:
{
"extraKnownMarketplaces": {
"emasoft-plugins": {
"source": {
"source": "github",
"repo": "Emasoft/emasoft-plugins"
}
}
},
"enabledPlugins": {
"code-auditor-agent@emasoft-plugins": true
}
}
allowed-tools declarationsdisallowedTools frontmatter — all 10 read-only agents are blocked from using Edit/NotebookEdit, preventing accidental source code modificationUSE_WORKTREES=true for concurrent agent swarms (discouraged: default per-group dispatch already prevents conflicts without worktree overhead)${CLAUDE_PLUGIN_DATA} for audit state (Fix Dispatch Ledger, agent checkpoints) that survives plugin updates and context compactionsfind_symbol, find_referencing_symbols), Grepika (search, refs, outline), and TLDR (structure, search) when available for semantic code navigation instead of raw file readingThese variables are referenced inside the plugin (skills, agents, hooks):
| Variable | Purpose |
|---|---|
${CLAUDE_PLUGIN_ROOT} | Absolute path to plugin installation directory. Used to reference bundled scripts and configs. Changes on plugin update. |
${CLAUDE_PLUGIN_DATA} | Persistent directory for plugin state (~/.claude/plugins/data/code-auditor-agent/). Survives plugin updates. Used for Fix Dispatch Ledger, agent checkpoints. Deleted on uninstall unless --keep-data is passed. |
${CLAUDE_SKILL_DIR} | Absolute path to the current skill's directory. Used in SKILL.md to reference references/ subdirectories. |
${CLAUDE_SESSION_ID} | Current Claude Code session ID. Useful for session-scoped report filenames. |