From harness-claude
Chains mechanical verification (typecheck, lint, test), security scan, design/accessibility checks, and AI code review into consolidated pass/fail report for pre-PR or milestone gates.
npx claudepluginhub intense-visions/harness-engineering --plugin harness-claudeThis skill uses the workspace's default tool permissions.
> Unified integrity gate — single invocation chains mechanical verification with AI-powered code review and produces a consolidated pass/fail report.
Pre-commit quality gate validating logic correctness, error handling, regressions, and completeness in code changes. Auto-fires before commit via cook or on large diffs.
Reviews and verifies code before merge via triage-first checks (up to 16 parallel agents). Pipeline mode verifies vs plans; general mode for PRs/branches/staged changes. Flags findings only.
Runs structured quality review before shipping code at PRs, releases, or milestones. Catches integration boundary failures where AI-generated code breaks between components.
Share bugs, ideas, or general feedback.
Unified integrity gate — single invocation chains mechanical verification with AI-powered code review and produces a consolidated pass/fail report.
harness-verify for quick post-task checks)harness-verification for that)| Skill | What It Does | Scope | Time |
|---|---|---|---|
| harness-verify | Mechanical only: typecheck, lint, test | Exit codes | ~30s |
| harness-code-review | AI only: change-type-aware review | LLM analysis | ~2min |
| harness-integrity (this) | Both: verify + code-review unified | Full pipeline | ~3min |
| harness-verification | Deep audit: architecture, patterns, edge cases | Thorough investigation | ~5min |
harness-integrity is the standard pre-PR gate. It runs the fast mechanical checks first, then layers on AI review, and produces a single consolidated report.
Invoke harness-verify to run the mechanical quick gate.
harness-verify — typecheck, lint, test.Run the built-in security scanner as a mechanical check between verification and AI review.
run_security_scan MCP tool against the project root (or changed files if available).When the project has design configured in harness.config.json:
harness-design in review mode to check existing components against design intent and anti-patterns.harness-accessibility in scan+evaluate mode to check WCAG compliance.strict mode only. In standard and permissive modes, design findings do not block.design block exists, skip this phase entirely.When the project has i18n.enabled: true in harness.config.json:
harness-i18n in scan mode to detect hardcoded strings, missing translations, locale-sensitive formatting issues, and RTL violations.i18n.strictness)strict mode only. In standard and permissive modes, i18n findings do not block.i18n block exists or i18n.enabled is false, skip this phase entirely.Run change-type-aware AI review using harness-code-review.
feature, bugfix, refactor, or docs.harness-code-review with the detected change type.Produce a unified integrity report in this exact format:
Integrity Check: [PASS/FAIL]
- Tests: [PASS/FAIL/SKIPPED]
- Lint: [PASS/FAIL/SKIPPED]
- Types: [PASS/FAIL/SKIPPED]
- Security: [PASS/WARN/FAIL] ([count] errors, [count] warnings)
- Design: [PASS/WARN/FAIL/SKIPPED] ([count] errors, [count] warnings)
- i18n: [PASS/WARN/FAIL/SKIPPED] ([count] errors, [count] warnings)
- Review: [PASS/FAIL] ([count] suggestions, [count] blocking)
Overall: [PASS/FAIL]
Rules:
PASS requires: all non-skipped mechanical checks pass AND zero blocking review findings AND zero blocking design findings (strict mode only) AND zero blocking i18n findings (strict mode only).FAIL.check_traceability — Include as part of the integrity gate to verify requirement coverage (every spec requirement maps to an implemented artifact and test).validate_cross_check — Run against the plan to verify plan-to-implementation alignment before producing the final report..harness/integrity-report.md for CI integrationharness-design and harness-accessibility for design health when design config existsharness-i18n for i18n compliance when i18n.enabled is true in config. i18n strictness controls whether findings block the overall result.These are common rationalizations that sound reasonable but lead to incorrect results. When you catch yourself thinking any of these, stop and follow the documented process instead.
| Rationalization | Why It Is Wrong |
|---|---|
| "All three mechanical checks failed, but I should still run the AI review to get useful feedback" | When ALL three checks fail, stop immediately. Do not proceed to Phase 2. AI review on code that does not compile is wasted effort. |
| "The security scanner found a warning but it is not high severity, so it should not affect the overall result" | Error-severity security findings are blocking. The distinction is severity, not the agent's opinion of importance. |
| "The AI review flagged an architectural concern as blocking, so the integrity check should fail" | Only runtime errors, data loss, and security vulnerabilities count as blocking review findings. Architectural concerns are noted but do not block. |
Integrity Check: PASS
- Tests: PASS (42/42)
- Lint: PASS (0 warnings)
- Types: PASS
- Security: PASS (0 errors, 0 warnings)
- Design: PASS (0 errors, 0 warnings)
- i18n: PASS (0 errors, 0 warnings)
- Review: 1 suggestion (0 blocking)
Integrity Check: FAIL
- Tests: PASS (42/42)
- Lint: PASS
- Types: PASS
- Security: FAIL (1 error, 0 warnings)
- [SEC-INJ-002] src/auth/login.ts:42 — SQL query built with string concatenation
- Design: WARN (0 errors, 2 warnings)
- i18n: SKIPPED
- Review: 3 findings (1 blocking)
Blocking: [SEC-INJ-002] SQL injection — user input passed directly to query without parameterization.
harness-verify. Phase 2 has a 180-second timeout for the AI review.harness-verify or harness-code-review skills are unavailable, report the missing dependency and mark the corresponding phase as ERROR.