From tw93-claude-health
Reviews code diffs after implementation, auto-fixes safe issues, runs security and architecture reviewers on large diffs, and triages GitHub issues/PRs.
npx claudepluginhub tw93/wazaThis skill uses the workspace's default tool permissions.
Prefix your first line with 🥷 inline, not as its own paragraph.
Performs code reviews for PRs, audits, and changes using Codex MCP. Outputs severity-grouped findings and merge gates. Variants: fast (diff), full (lint/build checks), branch.
Runs parallel multi-agent code review assessing six tenants—architecture, simplicity, maintainability, correctness, test coverage, documentation—then triages findings and applies auto/manual fixes.
Share bugs, ideas, or general feedback.
Prefix your first line with 🥷 inline, not as its own paragraph.
Read the diff, find the problems, fix what can be fixed safely, ask about the rest. Done means verification ran in this session and passed.
Get the full diff between the current branch and the base branch. If unclear, ask. If already on the base branch, ask which commits to review.
Activate when the user mentions: issue, PR, "review all", triage, "batch", or "批量处理". Skip the diff flow and run this instead.
Flow:
gh issue list -R <repo> --state open --limit 20 and gh pr list -R <repo> --state open to pull pending items.git tag --sort=-version:refname | head -1 # latest tag
git log --oneline <tag>..HEAD | grep -i "<keyword>" # merged but unreleased?
Three outcomes: already shipped (close with note), merged but unreleased (reply "已修复,等下一个版本 release", close), or no fix (analyze).~/www/CLAUDE.md. Do not copy the definitions here; read them from that file.gh issue comment or any GitHub write operation.gh issue list -R <repo> --state closed --limit 50 and look for recurring themes, fixes closed without resolution, and deferred features with demand. Produce a short per-project summary with Fix candidates and Feature candidates. Do not implement without approval.Sign-off line (append to standard sign-off):
triage: N reviewed, N closed, N deferred
Measure the diff and classify depth:
| Depth | Criteria | Reviewers |
|---|---|---|
| Quick | Under 100 lines, 1-5 files | Base review only |
| Standard | 100-500 lines, or 6-10 files | Base + conditional specialists |
| Deep | 500+ lines, 10+ files, or touches auth/payments/data mutation | Base + all specialists + adversarial pass |
State the depth before proceeding.
Before reading code, check scope drift: do the diff and the stated goal match? Label: on target / drift / incomplete.
Drift signals (examples, not exhaustive -- any one is enough to label drift):
Examples, not exhaustive -- flag any diff that could cause irreversible harm if merged unreviewed.
grep -r "name" . -- no results outside the diff = does not exist.Load references/persona-catalog.md to determine which specialists activate. Launch all activated specialists in parallel via the environment's agent or sub-agent facility when available, passing the full diff. If no parallel reviewer facility exists, run the specialist passes sequentially in the same session.
Merge findings: when two specialists flag the same code location, keep the higher severity and note cross-reviewer agreement. Findings on different code locations are never duplicates even if they share a theme.
| Class | Definition | Action |
|---|---|---|
safe_auto | Unambiguous, risk-free: typos, missing imports, style inconsistencies | Apply immediately |
gated_auto | Likely correct but changes behavior: null checks, error handling additions | Batch into one user confirmation block |
manual | Requires judgment: architecture, behavior changes, security tradeoffs | Present in sign-off |
advisory | Informational only | Note in sign-off |
Apply all safe_auto fixes first. Batch all gated_auto into one confirmation block. Never ask separately about each one.
"If I were trying to break this system through this specific diff, what would I exploit?" Four angles (see references/persona-catalog.md): assumption violation, composition failures, cascade construction, abuse cases. Suppress findings below 0.60 confidence.
Use gh CLI for all GitHub interactions, not MCP or raw API. Confirm CI passes before merging.
Run bash "${CLAUDE_SKILL_DIR:-$HOME/.agents/skills/check}/scripts/run-tests.sh" or the project's known verification command. Paste the full output.
If the script exits non-zero or prints (no test command detected): halt. Do not claim done. Ask the user for the verification command before proceeding. If the user also cannot provide one, document this explicitly in the sign-off as verification: none -- no command available and flag it as a structural gap, not a pass.
For bug fixes: a regression test that fails on the old code must exist before the fix is done.
If any of these phrases appear in your reasoning, stop and run verification first:
| What happened | Rule |
|---|---|
| Commented on #249 when discussing #255 | Run gh issue view N to confirm title before acting |
| PR comment sounded like a report | 1-2 sentences, natural, like a colleague. Not structured, not AI-sounding. |
| PR comment used bullet points | Write as paragraphs; thank the contributor first |
| article.en.md inside _posts_en/ doubled the suffix | Check naming convention of existing files in the target directory first |
| Deployed without env vars set | Run vercel env ls before deploying; diff against local keys |
| Push failed from auth mismatch | Run git remote -v before the first push in a new project |
Activate when: PDF, document, release notes, white paper, final version, or "check this document"
Review checklist:
/write skill for detection rules)./write skill's bilingual rules.Lorem ipsum, TODO, [TBD]), style violations, font fallbacks, broken image links.Output format: same as code review sign-off, but replace verification: with privacy: clear / N issues found.
files changed: N (+X -Y)
scope: on target / drift: [what]
review depth: quick / standard / deep
hard stops: N found, N fixed, N deferred
specialists: [security, architecture] or none
new tests: N
verification: [command] -> pass / fail