From core
Orchestrates parallel multi-agent code reviews with ≥80% confidence filtering for quality, security, and auto-detected discipline-specific issues via git diffs.
npx claudepluginhub thebushidocollective/han --plugin coreThis skill uses the workspace's default tool permissions.
han-core:review - Multi-agent code review with confidence-based filtering
Orchestrates parallel execution of specialized code review agents for security, architecture, and performance analysis with decision tracking to avoid redundancy. Use for comprehensive reviews of large changesets.
Reviews code changes using parallel personas for correctness, testing, maintainability, and conditional areas like security, performance, APIs. Merges into P0-P3 severity reports for PR prep and iterative feedback.
Performs multi-agent code reviews for security, quality, and architecture on Go, Python, JS/TS/HTML/CSS changes detected via git diff. Use for 'review code' requests.
Share bugs, ideas, or general feedback.
han-core:review - Multi-agent code review with confidence-based filtering
/review [arguments]
Multi-agent code review with confidence-based filtering
Automated multi-agent code review with confidence-based filtering. Runs parallel specialized review agents to identify high-confidence issues across quality, security, and discipline-specific concerns.
This command orchestrates multiple review agents in parallel to provide comprehensive code review:
Key Features:
Gathers context about the changes:
# Review scope of changes
git diff --stat main...HEAD
# Get full diff
git diff main...HEAD
# Check recent commits
git log main...HEAD --oneline
Launches multiple independent agents in parallel (single message, multiple Task calls):
han-core:code-reviewer skillsecurity:security-engineerAuto-detection based on changed files:
| File Pattern | Agent | Focus |
|---|---|---|
*.tsx, *.jsx, *.css | frontend:presentation-engineer | UI/UX, accessibility, responsiveness |
**/api/**, **/controllers/** | backend:backend-architect | API design, scalability, error handling |
**/db/**, **/*schema* | databases:database-designer | Query optimization, migrations, indexes |
**/test/**, **/*.test.* | quality:test-architect | Test quality, coverage, patterns |
**/infra/**, *.tf | infrastructure:devops-engineer | Infrastructure, deployment, configuration |
Manual override: Specify agent explicitly if auto-detection is incorrect.
Merges findings from all agents:
Presents consolidated findings:
## Review Summary
Total files changed: X
Lines added: +X, removed: -X
Review agents: 3 (Core, Security, Frontend)
---
## Findings
### 🔴 Critical Issues (Must Fix)
**[Issue]** - `file.ts:42` - **Confidence: 95%**
- Problem: ...
- Impact: ...
- Fix: ...
### 🟡 Important Issues (Should Fix)
**[Issue]** - `file.ts:89` - **Confidence: 85%**
- Problem: ...
- Impact: ...
- Suggestion: ...
---
## Verification Status
- [ ] All automated checks passed
- [ ] Security review: 1 critical issue
- [ ] Quality review: 0 issues
- [ ] Frontend review: 2 important issues
---
## Decision: REQUEST CHANGES
Critical issues must be resolved before approval.
---
## Next Actions
1. Fix SQL injection vulnerability at `services/user.ts:42`
2. Add error handling to `components/UserForm.tsx:89`
3. Re-run /review after fixes
/review
Reviews all changes from main branch to HEAD.
/review pr 123
Uses gh CLI to fetch PR #123 and review changes.
/review --agents security,performance
Override auto-detection and run only specified agents.
/review src/services/payment.ts
Review only specified files instead of entire diff.
All findings include confidence scores to reduce noise:
| Score | Meaning | Action |
|---|---|---|
| 100% | Absolutely certain | Always report (linter errors, type errors, failing tests) |
| 90-99% | Very high confidence | Always report (clear violations, obvious bugs) |
| 80-89% | High confidence | Report (pattern violations, missing tests) |
| <80% | Medium-low confidence | Do not report (speculative, subjective) |
Filtering rules:
Dimensions:
Red flags (never approve):
Focus areas:
Severity levels:
Each specialized agent brings domain expertise:
Frontend (presentation-engineer):
Backend (backend-architect):
Database (database-designer):
Phase 6: Review (from /feature-dev)
↓
Calls /review command
↓
Reports findings
↓
User fixes issues
↓
Re-run /review until clean
# Make changes
git add .
# Review before commit
/review
# Fix issues
# Review again
/review
# If clean, commit
/commit
# Fetch PR
gh pr checkout 123
# Review changes
/review
# Comment on PR
gh pr comment 123 --body "$(cat review-findings.md)"
For high-risk changes (auth, payments, security), run redundant reviewers:
/review --redundant
This runs:
Consensus logic: Report issue only if ≥2 reviewers agree (reduces false positives).
Include git history analysis:
/review --with-history
Adds:
Define custom agent combinations:
/review --team security-critical
Uses pre-defined team from .claude/review-teams.json:
{
"security-critical": [
"han-core:code-reviewer",
"security:security-engineer",
"security:security-engineer", // redundant
"infrastructure:devops-engineer"
]
}
{
"review": {
"confidenceThreshold": 80,
"autoSelectAgents": true,
"enableRedundancy": false,
"includeHistory": false,
"maxIssuesPerCategory": 10
}
}
Review agents check these files for project standards:
CLAUDE.md - Project-specific guidelinesCONTRIBUTING.md - Contribution standards.github/PULL_REQUEST_TEMPLATE.md - PR requirementsLikely causes:
Solutions:
--confidence-threshold 70 to see filtered issuesLikely causes:
Solutions:
Normal: Different perspectives are valuable
Resolution:
/feature-dev - Full feature development workflow (includes review)/commit - Smart commit after review passeshan-core:code-reviewer - Core review skill documentationsecurity - Security agent details