This skill should be used when performing exhaustive code reviews using multi-agent analysis, ultra-thinking, and worktrees.
From soleurnpx claudepluginhub jikig-ai/soleur --plugin soleurThis skill uses the workspace's default tool permissions.
references/review-e2e-testing.mdreferences/review-todo-structure.md<command_purpose> Perform exhaustive code reviews using multi-agent analysis, ultra-thinking, and Git worktrees for deep local inspection. </command_purpose>
<role>Senior Code Review Architect with expertise in security, performance, architecture, and quality assurance</role>
Load project conventions:
# Load project conventions
if [[ -f "CLAUDE.md" ]]; then
cat CLAUDE.md
fi
Read CLAUDE.md if it exists - apply project conventions during review.
<review_target> #$ARGUMENTS </review_target>
<thinking> First, I need to determine the review target type and set up the code for analysis. </thinking><task_list>
skill: git-worktree with branch namegh pr view --json for title, body, files, linked issuesEnsure that the code is ready for analysis (either in worktree or on current branch). ONLY then proceed to the next step.
</task_list>
<parallel_tasks>
Run ALL or most of these agents at the same time:
</parallel_tasks>
<conditional_agents>
These agents are run ONLY when the PR matches specific criteria. Check the PR files list and project structure to determine if they apply:
If project is a Rails app (Gemfile AND config/routes.rb exist at repo root):
When to run Rails review agents:
Gemfile and config/routes.rbWhat these agents check:
kieran-rails-reviewer: Strict Rails conventions, naming clarity, controller complexity, Turbo patternsdhh-rails-reviewer: Rails philosophy adherence, JavaScript framework contamination, unnecessary abstractionIf PR contains database migrations (db/migrate/*.rb files) or data backfills:
When to run migration agents:
db/migrate/*.rbWhat these agents check:
data-migration-expert: Verifies hard-coded mappings match production reality (prevents swapped IDs), checks for orphaned associations, validates dual-write patternsdeployment-verification-agent: Produces executable pre/post-deploy checklists with SQL queries, rollback procedures, and monitoring plansIf PR contains test files:
When to run test review agent:
*_test.rb, *_spec.rbtest_*.py, *_test.py*.test.ts, *.test.js, *.spec.ts, *.spec.js*_test.go*_test.swift, *Tests.swift__tests__/ or spec/ or test/ directoriesWhat this agent checks:
test-design-reviewer: Scores tests against Farley's 8 properties, produces a weighted Test Quality Score with letter grade and top 3 improvement recommendationsIf semgrep CLI is installed (which semgrep succeeds) and PR modifies source code files:
When to run SAST agent:
which semgrep returns 0 (semgrep binary found in PATH)What this agent checks:
semgrep-sast: Known vulnerability signatures (CWE patterns), hardcoded secrets, insecure function calls, taint analysis. Complements security-sentinel's LLM-based architectural review with deterministic rule-based scanning.</conditional_agents>
<decision_gate>
After all parallel and conditional agents complete, check their outputs:
This is a binary gate: all-failed triggers the fallback; any-succeeded means continue.
</decision_gate>
<ultrathink_instruction> For each phase below, spend maximum cognitive effort. Think step by step. Consider all angles. Question assumptions. And bring all reviews in a synthesis to the user.</ultrathink_instruction>
<deliverable> Complete system context map with component interactions </deliverable><thinking_prompt> ULTRA-THINK: Put yourself in each stakeholder's shoes. What matters to them? What are their pain points? </thinking_prompt>
<stakeholder_perspectives>
Developer Perspective <questions>
Operations Perspective <questions>
End User Perspective <questions>
Security Team Perspective <questions>
Business Perspective <questions>
<thinking_prompt> ULTRA-THINK: Explore edge cases and failure scenarios. What could go wrong? How does the system behave under stress? </thinking_prompt>
<scenario_checklist>
Run the Task code-simplicity-reviewer() to see if we can simplify the code.
<critical_requirement> ALL findings MUST be stored as GitHub issues via gh issue create. Create issues immediately after synthesis - do NOT present findings for user approval first. Every issue must include --milestone (AGENTS.md Guard 5). </critical_requirement>
<synthesis_tasks>
</synthesis_tasks>
<critical_instruction> Create GitHub issues for ALL findings immediately using gh issue create with --body-file. Do NOT present findings one-by-one asking for user approval. Create all issues, then summarize results to user. </critical_instruction>
Read plugins/soleur/skills/review/references/review-todo-structure.md now for the complete GitHub issue creation flow: label prerequisite, issue body template, --body-file pattern, label/milestone selection, duplicate detection, error handling, and batch strategy.
After creating all GitHub issues, present comprehensive summary:
## Code Review Complete
**Review Target:** PR #XXXX - [PR Title] **Branch:** [branch-name]
### Findings Summary
- **Total Findings:** [X]
- **P1 CRITICAL:** [count] - BLOCKS MERGE
- **P2 IMPORTANT:** [count] - Should Fix
- **P3 NICE-TO-HAVE:** [count] - Enhancements
### Created GitHub Issues
**P1 - Critical (BLOCKS MERGE):**
- #NNN - review: {description}
- #NNN - review: {description}
**P2 - Important:**
- #NNN - review: {description}
- #NNN - review: {description}
**P3 - Nice-to-Have:**
- #NNN - review: {description}
**Failed (if any):**
- {description} - Error: {error message}
### Review Agents Used
- security-sentinel
- performance-oracle
- architecture-strategist
- agent-native-reviewer
- [other agents]
### Next Steps
1. **Address P1 Findings**: CRITICAL - must be fixed before merge
- Review each P1 issue in detail
- Implement fixes or request exemption
- Verify fixes before merging PR
2. **View All Review Issues**:
```bash
gh issue list --label code-review # View all review findings
```
3. **Resolve Issues**: Fix each issue on its branch, referencing the GitHub issue number in the commit
P1 (Critical - Blocks Merge):
P2 (Important - Should Fix):
P3 (Nice-to-Have):
Read plugins/soleur/skills/review/references/review-e2e-testing.md now for project type detection, testing offers (Web/iOS/Hybrid), and subagent procedures for browser and Xcode testing.
Review agent suggestions that modify workflow if conditions or event filters must be smoke tested against the full user journey (not just the reduced trigger case) before shipping -- agents optimize locally and can break flows they don't fully model.
Any P1 (CRITICAL) findings must be addressed before merging the PR. Present these prominently and ensure they're resolved before accepting the PR.