Claude-skill-registry code-analyze
Analyze codebase for patterns, issues, and improvements. Enforces analysis standards while incorporating user-specific requirements.
install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/code-analyze" ~/.claude/skills/majiayu000-claude-skill-registry-code-analyze && rm -rf "$T"
manifest:
skills/data/code-analyze/SKILL.mdsource content
Code Analyzer Skill
What This Skill Does
Performs standardized code analysis with user context:
- Analyzes codebase structure and patterns
- Identifies technical debt and issues
- Suggests improvements and refactoring
- Enforces coding standards
- Generates actionable reports
When Claude Should Use This
Use this skill when the user:
- Says "analyze the code" or "review the codebase"
- Wants to find bugs or issues
- Needs architecture review
- Mentions code quality or technical debt
- Requests security or performance analysis
Analysis Workflow
1. Gather User Context
Ask the user: 1. Focus areas? (security, performance, architecture, all) 2. Specific concerns? 3. Depth of analysis? (quick scan, standard, deep dive) 4. Output format? (report, tasks, PR comments)
2. Standardized Analysis Process
Phase 1: Structure Analysis
# Map codebase structure find . -type f -name "*.ts" -o -name "*.js" | head -20 # Count lines of code cloc . --exclude-dir=node_modules,dist,out # Identify entry points grep -r "export.*function\|export.*class" --include="*.ts" | head -10
Phase 2: Pattern Detection
# Find potential issues grep -r "TODO\|FIXME\|HACK\|XXX" --include="*.ts" # Identify deprecated patterns grep -r "deprecated\|@deprecated" --include="*.ts" # Find console.logs (potential debug code) grep -r "console\." --include="*.ts" --exclude-dir=node_modules
Phase 3: Dependency Analysis
# Check for outdated packages npm outdated # Audit for vulnerabilities npm audit # Analyze bundle size npm ls --depth=0
3. Automated Report Generation
Generate
analysis/ANALYSIS_[DATE].md:
# Code Analysis Report ## Summary - **Date**: YYYY-MM-DD - **Scope**: [User specified focus] - **Health Score**: X/100 ## Critical Issues 1. [Issue]: [Description] - File: [path:line] - Severity: High/Medium/Low - Fix: [Recommendation] ## Architecture Review - **Patterns Found**: [List] - **Anti-patterns**: [List] - **Suggestions**: [List] ## Technical Debt - **Total**: X hours estimated - **Priority Items**: [List] ## Action Items - [ ] Fix critical security issues - [ ] Refactor deprecated patterns - [ ] Update dependencies
4. Integration with Git Workflow
For Issues Found:
# Create issue branch git checkout -b fix/[issue-name] # For refactoring needs git checkout -b refactor/[component-name] # For security fixes git checkout -b security/[vulnerability-name]
5. Enforcement Rules
Must Fix (Blocking):
- Security vulnerabilities (High/Critical)
- Breaking changes in dependencies
- Memory leaks
- Exposed secrets/credentials
Should Fix (Warning):
- Deprecated API usage
- Performance bottlenecks
- Code duplication > 50 lines
- Circular dependencies
Consider Fixing (Info):
- TODO/FIXME comments
- Missing documentation
- Complex functions (cyclomatic > 10)
- Long files (> 500 lines)
Analysis Types
1. Security Analysis
# Check for secrets grep -r "api[_-]key\|password\|secret\|token" --include="*.ts" # Review authentication grep -r "authenticate\|authorize\|jwt\|session" --include="*.ts" # Check HTTPS usage grep -r "http://" --include="*.ts"
2. Performance Analysis
# Find potential bottlenecks grep -r "for.*for\|while.*while" --include="*.ts" # Check for synchronous operations grep -r "readFileSync\|execSync" --include="*.ts" # Identify heavy operations grep -r "sort\|filter.*map\|reduce" --include="*.ts"
3. Architecture Analysis
- Component coupling
- Layer violations
- Dependency cycles
- Interface segregation
- Single responsibility
Output Actions
1. Create Fix Branches
For each critical issue:
git checkout -b fix/[issue-id] echo "Fix plan" > fixes/[issue-id].md
2. Generate Tasks
Create
tasks/FIXES_[DATE].md:
## Critical Fixes Required ### HIGH Priority - [ ] Fix SQL injection in [file:line] - [ ] Remove hardcoded credentials in [file:line] ### MEDIUM Priority - [ ] Refactor [component] to reduce complexity - [ ] Update deprecated [package] usage ### LOW Priority - [ ] Add missing documentation - [ ] Clean up TODO comments
3. PR Templates
Generate
.github/PULL_REQUEST_TEMPLATE/fix.md:
## Fix for: [Issue ID] ### What was wrong? [Description] ### How was it fixed? [Approach] ### Testing - [ ] Unit tests pass - [ ] Integration tests pass - [ ] Security scan clean
Integration with User Intent
The analyzer combines:
- User's specific concerns (from prompt)
- Standardized checks (always run)
- Codebase context (patterns, history)
- Best practices (industry standards)
Example:
- User: "Check our API for security issues"
- Analyzer: Runs standard checks + deep API security scan
Protection Against Breaking Changes
Allowed Fixes:
- Security patches that don't change interfaces
- Performance improvements with same behavior
- Bug fixes with tests
- Documentation updates
Requires Approval:
- API changes
- Database schema changes
- Configuration changes
- Dependency major version updates
Never Auto-Fix:
- Core business logic
- Authentication/Authorization
- Payment processing
- Data migrations
Success Metrics
Analysis succeeds when:
- All critical issues identified
- Report generated with actionable items
- Fix branches created for issues
- Team understands findings
- Clear path to resolution