From code-foundations
Verifies implemented code correctness with checklists for requirements coverage, concurrency safety, error handling, resource management, and boundary conditions. Use for pre-commit checks.
npx claudepluginhub ryanthedev/code-foundationsThis skill uses the workspace's default tool permissions.
**Design quality ≠ correctness.** Well-designed code can still have bugs, missing requirements, or safety issues.
Verifies completed work before committing: identifies task from context/git diff, runs project build/test/lint commands, manually checks requirements, scans for debug code and common issues.
Evaluates code for logical validity, boundary conditions, invariant preservation, concurrency correctness, and state management in reviews.
Suggests `/verify` for complex software engineering tasks prone to subtle bugs, like async patterns, security flows, architectural decisions, and bug investigations.
Share bugs, ideas, or general feedback.
Design quality ≠ correctness. Well-designed code can still have bugs, missing requirements, or safety issues.
Run ALL dimension checks before claiming done. "I think I covered everything" without explicit mapping is a red flag.
For each dimension: detect if it applies, then verify.
Detect: Were requirements stated? (explicit list, user request, spec)
If YES, verify:
Red flag: "I think I covered everything" without explicit mapping
Detect: Any of these present?
If YES, verify:
Red flag: "It's probably fine" or "Python GIL handles it"
Detect: Can any operation fail?
If YES, verify:
except: or except Exception: passRed flag: "Errors are rare" or "caller handles it" without checking caller
Detect: Does code acquire resources?
If YES, verify:
Red flag: "It cleans up eventually" or daemon threads without shutdown
Detect: Does code handle variable-size input?
If YES, verify:
[], "", None, 0?Red flag: "Nobody would pass that" or "that's an edge case"
Detect: Does code handle untrusted input?
If YES, verify:
../ exploitation)Red flag: "It's internal only" (internals get exposed)
Before "done", answer YES to all that apply:
| Dimension | Detection Trigger | Verified? |
|---|---|---|
| Requirements | Requirements were stated | [ ] Each mapped to code |
| Concurrency | Shared state exists | [ ] All access protected |
| Errors | Operations can fail | [ ] All failures handled |
| Resources | Resources acquired | [ ] All released (incl. errors) |
| Boundaries | Variable-size input | [ ] Edge cases handled |
| Security | Untrusted input | [ ] Input validated |
When verifying, output:
## Correctness Verification
### Requirements: [PASS/FAIL/N/A]
- Requirement 1 → implemented in X
- Requirement 2 → implemented in Y
### Concurrency: [PASS/FAIL/N/A]
- Shared state: [list]
- Protection: [how]
### Errors: [PASS/FAIL/N/A]
- Failure points: [list]
- Handling: [approach]
### Resources: [PASS/FAIL/N/A]
- Acquired: [list]
- Released: [how]
### Boundaries: [PASS/FAIL/N/A]
- Edge cases: [list]
- Handling: [approach]
### Security: [PASS/FAIL/N/A]
- Untrusted input: [list]
- Validation: [approach]
**Verdict:** [DONE / NOT DONE - list blockers]
| Skill | Focus | When |
|---|---|---|
| aposd-designing-deep-modules | Design quality | FIRST—during design |
| aposd-verifying-correctness | Actual correctness | BEFORE "done" |
| cc-quality-practices | Testing/debugging | Throughout |
Order: Design → Implement → Verify (this skill) → Done
| After | Next |
|---|---|
| All dimensions pass | Done (pre-commit gate) |