From agentops
Reviews PRs, diffs, local changes, or agent output for correctness, risks, hidden assumptions, and standards adherence.
npx claudepluginhub boshu2/agentops --plugin agentopsThis skill uses the workspace's default tool permissions.
> **Quick Ref:** `/review <PR>` reviews a PR, `/review --diff` reviews local changes, `/review --agent <path>` reviews agent output with extra scrutiny.
Creates isolated Git worktrees for feature branches with prioritized directory selection, gitignore safety checks, auto project setup for Node/Python/Rust/Go, and baseline verification.
Executes implementation plans in current session by dispatching fresh subagents per independent task, with two-stage reviews: spec compliance then code quality.
Dispatches parallel agents to independently tackle 2+ tasks like separate test failures or subsystems without shared state or dependencies.
Quick Ref:
/review <PR>reviews a PR,/review --diffreviews local changes,/review --agent <path>reviews agent output with extra scrutiny.
YOU MUST EXECUTE THIS WORKFLOW. Do not just describe it.
This skill is for reviewing OTHER people's or agents' changes. For validating your own code quality, use /vibe instead.
/review 42 # PR mode — review PR #42
/review https://github.com/o/r/pull/42 # PR mode — review by URL
/review --diff # Diff mode — review unstaged/staged changes
/review --diff --staged # Diff mode — staged only
/review --agent .agents/crank/ # Agent mode — review agent-generated output
/review --agent ./output.patch # Agent mode — review a patch file
/review --deep 42 # Deep mode — spawns council for second opinion
Determine the review mode from arguments:
--diff flag present.--agent <path> flag present.Load language-specific conventions from /standards based on file extensions in the diff. If ao is available, pull prior review context:
ao lookup --query "code review patterns $(basename "$PWD")" --limit 3 2>/dev/null || true
Apply retrieved knowledge (mandatory when results returned):
If learnings are returned, do NOT just load them as passive context. For each returned item:
known_risk — state the pattern, what to look for, and whether the diff exhibits itAfter applying, record the citation:
ao metrics cite "<learning-path>" --type applied 2>/dev/null || true
Skip silently if ao is unavailable or returns no results.
Load the behavioral discipline standard from /standards before reviewing the diff. Use it to answer four questions:
If any answer is weak, record the problem as a finding. Hidden assumptions, speculative abstractions, drive-by edits, and weak verification are review defects, not style preferences.
gh pr view "$PR_REF" --json title,body,author,baseRefName,headRefName,labels,reviewDecision,commits
gh pr diff "$PR_REF"
gh pr diff "$PR_REF" --name-only
If the PR has more than 500 changed lines, prioritize: security-sensitive files, high-complexity changes, new files, then test files.
git diff HEAD # unstaged + staged
git diff --cached # staged only (with --staged flag)
git diff HEAD --name-only # changed file list
# Directory: find all generated files
find "$AGENT_PATH" -type f \( -name '*.go' -o -name '*.py' -o -name '*.ts' -o -name '*.sh' -o -name '*.md' \)
# Patch file: inspect stats
git apply --stat "$AGENT_PATH"
Understand the intent behind the changes before reviewing the code:
fixes #, closes #), read commit messages.git log --oneline -5, branch name, open issues via bd list --status open..agents/rpi/ artifacts.Output a one-line intent summary before proceeding:
INTENT: <what the change is trying to accomplish>
If intent is unclear, flag it: "PR description does not explain the purpose of this change."
Review every changed file against the SCORED checklist. For each category, actively look for problems. Do not skim -- read each changed line.
When reviewing agent-generated code, apply additional scrutiny for common agent failure modes:
!= nil or != "")cov*_test.go naming pattern (coverage-padding anti-pattern)Create a review artifact:
REVIEW_DIR=".agents/review"
mkdir -p "$REVIEW_DIR"
REVIEW_FILE="$REVIEW_DIR/$(date +%Y-%m-%d)-review-$(echo "$PR_REF" | tr '/' '-').md"
# Review: <PR title or change description>
**Date:** YYYY-MM-DD | **Verdict:** APPROVE | REQUEST_CHANGES | COMMENT
**Target:** PR #N / local diff / agent output at <path>
## Intent
<one-line summary>
## SCORED Assessment
| Category | Rating | Notes |
|----------|--------|-------|
| Security | pass/warn/fail | ... |
| Correctness | pass/warn/fail | ... |
| Observability | pass/warn/fail | ... |
| Readability | pass/warn/fail | ... |
| Efficiency | pass/warn/fail | ... |
| Design | pass/warn/fail | ... |
## Findings
### Critical (must fix)
- **[file:line]** Issue. Suggested fix: ...
### Warning (should fix)
- **[file:line]** Issue. Suggested fix: ...
### Suggestion / Nit
- **[file:line]** Description.
## Missing
<expected but absent: tests, docs, error handling, migration>
If reviewing a PR and the verdict is REQUEST_CHANGES or COMMENT, offer to post the review:
# Post review comment on the PR
gh pr review "$PR_REF" --comment --body "$(cat "$REVIEW_FILE")"
# Or for blocking review
gh pr review "$PR_REF" --request-changes --body "$(cat "$REVIEW_FILE")"
Only post if the user confirms. Never auto-post a review without explicit approval.
When --deep is specified, after the initial SCORED pass, spawn a council for a second opinion:
/council validate "Review these changes for issues I might have missed: <summary of changes>"
Merge council findings into the review document under a "## Council Findings" section.
| Skill | Relationship |
|---|---|
/vibe | Self-review (your own code). /review is for others' code. |
/council | Optional second opinion via --deep flag. |
/standards | Auto-loaded for language-specific rules. |
/bug-hunt | /review does a structured pass; /bug-hunt does deep investigation of suspected bugs. |
/pr-validate | PR-specific validation (isolation, scope creep). Complementary to /review. |