Performs structured code reviews checking requirements, quality, and security standards after changes or before merge. Uses git diffs, context snapshots, and blast radius for scope.
npx claudepluginhub repozy/superpowers-optimizedThis skill uses the workspace's default tool permissions.
Request review early to catch issues before they spread.
Creates isolated Git worktrees for feature branches with prioritized directory selection, gitignore safety checks, auto project setup for Node/Python/Rust/Go, and baseline verification.
Executes implementation plans in current session by dispatching fresh subagents per independent task, with two-stage reviews: spec compliance then code quality.
Dispatches parallel agents to independently tackle 2+ tasks like separate test failures or subsystems without shared state or dependencies.
Request review early to catch issues before they spread.
BASE_SHA -> HEAD_SHA).context-snapshot.json at the project root:
git rev-parse HEAD and compare to git_hash in the file.
changed_files and blast_radius as the review scope. Inject this summary into the code-reviewer prompt: "Changed files: [list]. Also referenced by: [blast_radius callers]."changed_files as a starting point but do not rely on blast_radius.git diff --name-only BASE_SHA..HEAD_SHA directly.superpowers-optimized:code-reviewer using requesting-code-review/code-reviewer.md.When changes touch security-relevant areas, the code review must include a security pass. This is not a separate step — it's part of every review where applicable.
Triggers automatically when changes touch:
Security checklist:
Severity enforcement:
For changes involving complex logic, concurrency, state management, or critical data paths, dispatch superpowers-optimized:red-team in parallel with the code reviewer.
Triggers when changes touch:
The red team agent finds concrete failure scenarios (specific inputs, race conditions, state corruption, resource exhaustion) that checklist-based review misses. It does NOT duplicate the security review — its focus is adversarial logic analysis, not OWASP/CWE compliance.
Red team critical findings block merge alongside security critical findings.
When the red team report contains Critical or High findings, run the auto-fix pipeline. The pipeline is ASI-guided and iterative — fix one finding at a time, starting from the red team's designated ASI, then re-assess before proceeding. This prevents fixes from conflicting with each other when findings touch shared code.
Iteration loop:
After the loop completes:
Skip conditions:
Review must include severity, file references, security findings (if applicable), and merge readiness verdict.