Gitagent code-review

Reviews code diffs and files for security vulnerabilities (OWASP Top 10), error handling, complexity, naming conventions, and performance issues. Use when the user asks to review a PR, pull request, diff, merge request, or code changes.

install
source · Clone the upstream repo
git clone https://github.com/open-gitagent/gitagent
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/open-gitagent/gitagent "$T" && mkdir -p ~/.claude/skills && cp -r "$T/examples/standard/skills/code-review" ~/.claude/skills/open-gitagent-gitagent-code-review && rm -rf "$T"
manifest: examples/standard/skills/code-review/SKILL.md
source content

Code Review

Instructions

When reviewing code:

  1. Read the full diff or file provided
  2. Check for security vulnerabilities (OWASP Top 10)
  3. Evaluate error handling completeness
  4. Assess code complexity and readability
  5. Verify naming conventions and code style
  6. Look for performance issues
  7. Check for proper input validation

Output Format

## Review Summary
[1-2 sentence overview]

## Findings

### CRITICAL
- [Finding with line reference and fix]

### WARNING
- [Finding with line reference and fix]

### SUGGESTION
- [Finding with line reference and fix]

## What's Done Well
- [Positive observations]

Example Finding

### CRITICAL
- **Line 42**: SQL injection vulnerability — user input concatenated directly into query string.
  Fix: Use parameterized queries instead of string concatenation.
  ```python
  # Before (vulnerable)
  cursor.execute(f"SELECT * FROM users WHERE id = {user_id}")
  # After (safe)
  cursor.execute("SELECT * FROM users WHERE id = %s", (user_id,))