Claude-code-workflows recipe-review
Design Doc compliance and security validation with optional auto-fixes
git clone https://github.com/shinpr/claude-code-workflows
T=$(mktemp -d) && git clone --depth=1 https://github.com/shinpr/claude-code-workflows "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/recipe-review" ~/.claude/skills/shinpr-claude-code-workflows-recipe-review && rm -rf "$T"
skills/recipe-review/SKILL.mdContext: Post-implementation quality assurance
Orchestrator Definition
Core Identity: "I am an orchestrator."
First Action: Register Steps 1-11 using TaskCreate before any execution.
Execution Method
- Compliance validation → performed by code-reviewer
- Security validation → performed by security-reviewer
- Fix implementation → performed by task-executor
- Quality checks → performed by quality-fixer
- Re-validation → performed by code-reviewer / security-reviewer
Orchestrator invokes sub-agents and passes structured JSON between them.
Design Doc (uses most recent if omitted): $ARGUMENTS
Execution Flow
Step 1: Prerequisite Check
# Identify Design Doc ls docs/design/*.md | grep -v template | tail -1 # Check implementation files git diff --name-only main...HEAD
Step 2: Execute code-reviewer
Invoke code-reviewer using Agent tool:
: "dev-workflows:code-reviewer"subagent_type
: "Code compliance review"description
: "Design Doc: [path]. Implementation files: [git diff file list]. Review mode: full. Validate Design Doc compliance and return structured JSON report."prompt
Store output as:
$STEP_2_OUTPUT
Step 3: Execute security-reviewer
Invoke security-reviewer using Agent tool:
: "dev-workflows:security-reviewer"subagent_type
: "Security review"description
: "Design Doc: [path]. Implementation files: [git diff file list]. Review security compliance."prompt
Store output as:
$STEP_3_OUTPUT
Step 4: Verdict and Response
If security-reviewer returned
: Stop immediately. Report the blocked finding and escalate to user. Do not proceed to fix steps.blocked
Code compliance criteria (considering project stage):
- Prototype: Pass at 70%+
- Production: 90%+ recommended
Security criteria:
orapproved
→ Passapproved_with_notes
→ Failneeds_revision
Report both results independently using subagent output fields only:
Code Compliance: [complianceRate from code-reviewer] Verdict: [verdict from code-reviewer] Identifier Match Rate: [identifierMatchRate from code-reviewer] Acceptance Criteria: - [fulfilled] [item] (confidence: [high/medium/low]) - [partially_fulfilled] [item]: [gap] — [suggestion] - [unfulfilled] [item]: [gap] — [suggestion] Identifier Mismatches: - [identifier]: DD=[designDocValue] Code=[codeValue] at [location] Quality Findings: - [category] [location]: [description] — [rationale] Security Review: [status from security-reviewer] Findings by category: - [confirmed_risk] [location]: [description] — [rationale] - [defense_gap] [location]: [description] — [rationale] - [hardening] [location]: [description] — [rationale] - [policy] [location]: [description] — [rationale] Notes: [notes from security-reviewer, if present] Execute fixes? (y/n):
If both pass and user selects
n: Skip Steps 5-10, proceed to Step 11.
Step 5: Execute Skill
Execute Skill: documentation-criteria (for task file template)
Step 6: Create Task File
Create task file at
docs/plans/tasks/review-fixes-YYYYMMDD.md
Include both code compliance issues and security requiredFixes.
Step 7: Execute Fixes
Invoke task-executor using Agent tool:
: "dev-workflows:task-executor"subagent_type
: "Execute review fixes"description
: "Task file: docs/plans/tasks/review-fixes-YYYYMMDD.md. Apply staged fixes (stops at 5 files)."prompt
Step 8: Quality Check
Invoke quality-fixer using Agent tool:
: "dev-workflows:quality-fixer"subagent_type
: "Quality gate check"description
: "Confirm quality gate passage for fixed files."prompt
Step 9: Re-validate code-reviewer
Invoke code-reviewer using Agent tool:
: "dev-workflows:code-reviewer"subagent_type
: "Re-validate compliance"description
: "Re-validate Design Doc compliance after fixes. Prior compliance issues: $STEP_2_OUTPUT. Verify each prior issue is resolved."prompt
Step 10: Re-validate security-reviewer
Invoke security-reviewer using Agent tool (only if security fixes were applied):
: "dev-workflows:security-reviewer"subagent_type
: "Re-validate security"description
: "Re-validate security after fixes. Prior findings: $STEP_3_OUTPUT. Design Doc: [path]. Implementation files: [file list]."prompt
Step 11: Final Report
Code Compliance: Initial: [X]% Final: [Y]% (if fixes executed) Security Review: Initial: [status] Final: [status] (if fixes executed) Notes: [notes from approved_with_notes, if any] Remaining issues: - [items requiring manual intervention]
Auto-fixable Items
- Simple unimplemented acceptance criteria
- Error handling additions
- Contract definition fixes
- Function splitting (length/complexity improvements)
- Security confirmed_risk and defense_gap fixes (input validation, auth checks, output encoding)
Non-fixable Items
- Fundamental business logic changes
- Architecture-level modifications
- Design Doc deficiencies
- Committed secrets (blocked → human intervention)
Scope: Design Doc compliance validation, security review, and auto-fixes.