From claude-impl-tools
Performs immediate code review on Git diffs at task/PR completion, matching against TASKS.md context, running hook gates, spec compliance, security checks, and optional AI multi-review.
npx claudepluginhub insightflo/claude-impl-tools --plugin claude-impl-toolsThis skill uses the workspace's default tool permissions.
> **Purpose**: Perform an immediate code review at task/PR completion to catch and fix issues early.
Reviews code diffs after implementation, auto-fixes safe issues, runs security and architecture reviewers on large diffs, and triages GitHub issues/PRs.
Reviews and verifies code before merge via triage-first checks (up to 16 parallel agents). Pipeline mode verifies vs plans; general mode for PRs/branches/staged changes. Flags findings only.
Spawns 3 specialized reviewers to audit all changed files through security, correctness, and spec compliance lenses. For thorough cross-file review after cw-validate (requires CLAUDE_CODE_TASK_LIST_ID).
Share bugs, ideas, or general feedback.
Purpose: Perform an immediate code review at task/PR completion to catch and fix issues early.
Core features:
- Auto-detect Git Diff
- Auto-extract TASKS.md context
- Auto-invoke
/security-review- Hook gate + fix guide
/checkpointAuto-detect: Git Diff (latest commit)
Auto-extract: TASKS.md → match related tasks
Hook integration: policy-gate, standards-validator
Enhanced security: /security-review auto-invoked
AI multi-review: /multi-ai-review optional invocation
Result: Pass/Warning/Fail + concrete fix guide
/checkpoint
↓
┌─────────────────────────────────────────┐
│ Step 1: Auto-detect Git Diff │
│ • git diff HEAD~1 HEAD auto-run │
│ • Extract list of changed files │
└─────────────────────────────────────────┘
↓
┌─────────────────────────────────────────┐
│ Step 2: Extract TASKS.md context │
│ • Match changed files ↔ tasks │
│ • Auto-identify related requirements │
└─────────────────────────────────────────┘
↓
┌─────────────────────────────────────────┐
│ Step 3: 2-Stage Review │
│ • Stage 1: Spec Compliance │
│ • Stage 2: Code Quality │
└─────────────────────────────────────────┘
↓
┌─────────────────────────────────────────┐
│ Step 4: Enhanced Analysis (integrations)│
│ • /impact (change impact) │
│ • /deps (dependencies) │
│ • /security-review (security) │
│ • /multi-ai-review (optional AI) │
└─────────────────────────────────────────┘
↓
┌─────────────────────────────────────────┐
│ Step 5: Hook Gate │
│ • policy-gate (permissions + standards│
│ • standards-validator (rules) │
└─────────────────────────────────────────┘
↓
┌─────────────────────────────────────────┐
│ Result: Pass / Warning / Fail │
│ • Generate fix guide │
│ • Provide /recover path │
└─────────────────────────────────────────┘
Checklist:
Requirements match:
- Does the changed file's functionality match what is defined in TASKS.md?
- Does it match the Mini-PRD / Socrates requirements?
Missing checks:
- Has the specified error handling been implemented?
- Are edge cases handled?
YAGNI violations:
- Are there unnecessary features not in the spec?
- Is there over-engineering?
Checklist:
Architecture:
- SOLID principles
- Separation of concerns
- Dependency injection
Code quality:
- Clear naming
- Complexity (Cyclomatic, Cognitive)
- Code duplication (DRY)
- Magic numbers/strings removed
Error handling:
- All error cases handled
- Meaningful error messages
- Appropriate logging
Testing:
- Sufficient coverage
- Edge case tests
- Tests against real behavior, not just mocks
| Grade | Condition | Action |
|---|---|---|
| Fail | 1+ Critical issue OR 3+ Important issues | Immediate fix required |
| Warning | 1–2 Important issues OR many Minor issues | Review before proceeding |
| Pass | No issues OR Minor only | Proceed to next step |
/agile (task complete)
↓
/checkpoint auto-invoked
↓
Based on result:
- Pass → next task
- Warning → user confirmation then proceed
- Fail → fix then re-checkpoint
/team-orchestrate (task complete)
↓
/checkpoint auto-invoked (post-task gate)
↓
Proceed to next task after Hook gate passes
# Auto-invoked from Git Hook
pre-commit: /checkpoint --mode=quick # Quick check
pre-push: /checkpoint --mode=full # Full check
/security-review invocation conditions:
- Changes to auth, payment, or user-related files
- Changes to .env or config files
- API routing changes
Based on result:
- Vulnerability found → Fail + fix guide
- None → Continue to next stage
User prompt: "Would you like to include an AI review?"
If selected:
/multi-ai-review
├── Gemini: code readability, improvement suggestions
└── Codex: SOLID, pattern analysis
Results integrated into checkpoint report
## Checkpoint Report
### Overview
- **Task**: T1.2 - User authentication API implementation
- **Date**: 2026-03-03 15:30
- **Commit**: abc123d
### Change Scope
- **Changed files**: 3
- `src/domains/auth/auth.service.ts` (+45, -12)
- `src/api/auth.routes.ts` (+23, -5)
- `src/middleware/auth.middleware.ts` (+18)
### Stage 1: Spec Compliance ✅
- Requirements match: ✅
- Missing features: ✅
- YAGNI violations: ✅
### Stage 2: Code Quality ⚠️
- Architecture: ⚠️ Warning
- auth.service.ts: Single Responsibility over-scoped
- Code quality: ✅
- Testing: ⚠️ Warning
- Insufficient edge case coverage
### Integration Analysis
- **/impact**: Medium risk (auth-related)
- **/deps**: No circular dependencies
- **/security-review**: ✅ Passed
### Final Verdict
- **Result**: Warning
- **Action**: Review then proceed
### Fix Guide
1. Split auth.service.ts into Service + Repository
2. Add edge case tests
# Basic usage
/checkpoint
# Specify file scope
/checkpoint --files src/auth/*.ts
# Include AI multi-review
/checkpoint --ai-review
# Quick mode (Spec only)
/checkpoint --mode=spec
# Full mode
/checkpoint --mode=full
Last Updated: 2026-03-03 (v1.1.0 - Standalone independent mode complete)