Comprehensive Go code review skill for PR reviews, architecture assessment, and test quality analysis. Use when reviewing Go code to ensure adherence to Go best practices, security standards, and project-specific patterns. Applies to full PR reviews, single file/function reviews, architecture evaluation, and test code quality checks.
Performs comprehensive Go code reviews for PRs, architecture, and tests against project patterns and security standards.
/plugin marketplace add teetsh-org/claude-skills/plugin install code-review@teetsh-claudeThis skill inherits all available tools. When active, it can use any tool Claude has access to.
references/common-mistakes.mdreferences/effective-go.mdreferences/security.mdreferences/teetsh-patterns.mdPerform thorough Go code reviews incorporating both external Go best practices and project-specific patterns.
Before reviewing, gather context:
Based on the review type, read appropriate references:
references/teetsh-patterns.md for project-specific patternsreferences/effective-go.md for Go best practicesreferences/common-mistakes.md for antipatternsreferences/security.mdFull PR Review: Check all aspects - architecture, implementation, tests, security
Architecture Review: Focus on package structure, interfaces, separation of concerns, domain boundaries
Test Review: Focus on test quality, coverage, behavior vs implementation testing
Single Function/File: Focus on implementation quality, naming, error handling
Organize feedback by priority:
Security vulnerabilities, data loss risks, concurrency bugs, resource leaks
Architecture problems, missing error handling, incorrect business logic, test gaps
Code clarity, performance optimizations, idiomatic Go patterns
Well-designed patterns, good test coverage, clear naming
For each issue, provide:
Check adherence to Teetsh patterns:
pkg/externals/tracker/client.goFor auth, payments, user input, external API code:
t.Error, t.Fatal, t.Errorf)Structure your review as:
## Critical Issues
[Issues that must be fixed before merge]
## Important Issues
[Issues that should be fixed]
## Suggestions
[Optional improvements]
## Positive Feedback
[What was done well]
For each issue:
### [Area]: [Brief description]
**Problem**: [What's wrong and why it matters]
**Current code**:
```go
[Show problematic code]
Suggested fix:
[Show corrected code]
Reference: [Link to specific pattern/practice]
## Example Review Snippets
### Function Design Issue
Problem: Function mixes high-level flow with low-level details, making it hard to understand intent
Current code:
func GetUserData(id int) (*User, error) {
query := "SELECT * FROM users WHERE id = ?"
row := db.QueryRow(query, id)
var user User
err := row.Scan(&user.ID, &user.Name, &user.Email)
if err != nil {
return nil, err
}
// ... more low-level operations
}
Suggested fix:
func GetUserData(id int) (*User, error) {
user, err := findUserByID(id)
if err != nil {
return nil, fmt.Errorf("failed to get user data: %w", err)
}
return user, nil
}
func findUserByID(id int) (*User, error) {
query := "SELECT * FROM users WHERE id = ?"
row := db.QueryRow(query, id)
var user User
if err := row.Scan(&user.ID, &user.Name, &user.Email); err != nil {
return nil, err
}
return &user, nil
}
Reference: See references/teetsh-patterns.md - Function Design
### Testing Issue
Problem: Project uses vanilla Go testing for better stack traces and no external dependencies
Current code:
assert.Equal(t, expected, result)
assert.NotNil(t, user)
Suggested fix:
if result != expected {
t.Errorf("Expected %v, got %v", expected, result)
}
if user == nil {
t.Fatal("user should not be nil")
}
Reference: See references/teetsh-patterns.md - Testing Patterns
### Security Issue
Problem: User input concatenated into SQL query allows SQL injection attacks
Current code:
query := "SELECT * FROM users WHERE email = '" + email + "'"
db.Query(query)
Suggested fix:
query := "SELECT * FROM users WHERE email = $1"
db.Query(query, email)
Reference: See references/security.md - SQL Injection Prevention
## When NOT to Comment
Avoid feedback on:
- Trivial formatting issues (gofmt handles this)
- Personal style preferences not in project patterns
- Nitpicks that don't affect functionality or maintainability
- Issues already addressed in other comments
## Multi-file Review Strategy
For PRs with many files:
1. Start with architecture overview (new packages, major changes)
2. Review core business logic files first
3. Review tests for core logic
4. Review supporting files (handlers, viewmodels)
5. Summarize overall assessment
## After Review
If significant issues found:
- Summarize the most important themes
- Suggest whether changes are required before merge
- Offer to explain any patterns or practices in detail
This skill should be used when the user asks about libraries, frameworks, API references, or needs code examples. Activates for setup questions, code generation involving libraries, or mentions of specific frameworks like React, Vue, Next.js, Prisma, Supabase, etc.
Applies Anthropic's official brand colors and typography to any sort of artifact that may benefit from having Anthropic's look-and-feel. Use it when brand colors or style guidelines, visual formatting, or company design standards apply.
Creating algorithmic art using p5.js with seeded randomness and interactive parameter exploration. Use this when users request creating art using code, generative art, algorithmic art, flow fields, or particle systems. Create original algorithmic art rather than copying existing artists' work to avoid copyright violations.