From enterprise
Code review program. Injected dynamically into Computer CPUs by the medical station. Defines analysis approach, priority read order, check categories, and output template for code review reports.
npx claudepluginhub nathanvale/side-quest-plugins --plugin enterpriseThis skill uses the workspace's default tool permissions.
The assignment JSON contains:
Fetches up-to-date documentation from Context7 for libraries and frameworks like React, Next.js, Prisma. Use for setup questions, API references, and code examples.
Retrieves current documentation, API references, and code examples for libraries, frameworks, SDKs, CLIs, and services via Context7 CLI. Ideal for API syntax, configs, migrations, and setup queries.
Uses ctx7 CLI to fetch current library docs, manage AI coding skills (install/search/generate), and configure Context7 MCP for AI editors.
The assignment JSON contains:
{
"path": "src/",
"doc_type": "review",
"review_focus": "security|performance|quality|all",
"file_manifest": [{"name": "auth.ts", "size": 2048}, ...],
"plain": false,
"budget": {"max_files": 30, "max_lines_per_file": 500}
}
Read files from the manifest. Do NOT re-enumerate -- the station already ran Glob.
Priority read order:
package.json, tsconfig.json, biome.json, .eslintrc*) -- establish project conventionsindex.ts, main.ts) -- understand module structureFor each source file, check based on review_focus:
securityeval(), Function(), innerHTML, dangerouslySetInnerHTMLperformancequalityany types, missing null checks, unsafe casts)allGenerate a code review report:
## Code Review Report
### Summary
| Category | Critical | Warning | Info |
|----------|----------|---------|------|
| Security | {N} | {N} | {N} |
| Performance | {N} | {N} | {N} |
| Quality | {N} | {N} | {N} |
| **Total** | **{N}** | **{N}** | **{N}** |
### Critical Issues
#### {issue_title}
**File**: `{file_path}:{line_number}`
**Category**: {security|performance|quality}
{description of the issue}
```{language}
// Current code
{problematic code snippet}
Suggested fix:
{suggested replacement}
File: {file_path}:{line_number}
Category: {security|performance|quality}
{description}
File: {file_path}:{line_number}
Category: {security|performance|quality}
{description}
## Rules
- **No false positives over completeness.** Only report issues you are confident about. When uncertain, omit rather than guess.
- **Attribute every finding.** Every issue must reference a specific file and line number.
- **No editorializing.** Report what is wrong and how to fix it. Do not lecture about best practices in general.
- **Respect the focus.** If `review_focus` is `security`, do not report quality issues unless they are also security-relevant.
- **Actionable fixes.** Every critical and warning issue should include a concrete suggested fix, not just a description.
- **Cross-reference conventions.** Check findings against project config (tsconfig strictness, biome rules, etc.). Do not flag things the project has explicitly configured to allow.
- **Omit empty sections.** If no critical issues exist, omit the Critical Issues section entirely.