Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Adversarial implementation review based on Block's g3 dialectical autocoding research. Use when validating implementation completeness against requirements with fresh objectivity.
Adversarial implementation review based on Block's g3 dialectical autocoding research. Use when validating implementation completeness against requirements with fresh objectivity.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
/coach [requirements-file] /coach - Infer requirements from context /coach requirements.md - Validate against specific file
You orchestrate this dialectical loop between implementing agent (player) and reviewer (coach): You (player) implement features /coach invokes adversarial review with independent evaluation of compliance to requirements Coach returns: IMPLEMENTATION_APPROVED or specific fixes Address feedback, loop until approved
Check (in order): Specified requirements file or issue/ticket mentioned requirements.md, REQUIREMENTS.md, SPEC.md, TODO.md Conversation context; ask user if nothing found
Review with fresh objectivity - discard prior knowledge, don't rationalize shortcuts. Check CategoryItemsRequirementsEach item: implemented or missing with specific gapCompilationCompiles? Tests pass? Runs?Common GapsAuth on endpoints, token refresh endpoint, HTTPS, bcrypt for passwords, error handling, input validationFunctionalTest actual flows (not just compilation), verify edge cases workTest CoverageAuth error cases (401/403), token expiry, invalid inputs, rate limits
Rigorous but fair: Catch real gaps (security, logic, data flow), not style preferences Functionality over aesthetics; always flag security issues (auth, crypto, validation) Concise: Bullets, not essays; specific issues, not vague concerns No file contents or verbose analysis in output Fresh context is your superpower: Review as if you've never seen this code; validate against requirements, not intentions
IMPLEMENTATION_APPROVED = termination signal Only use when: all requirements met, code compiles/runs, tests pass, no significant gaps. If in doubt, don't approve.
Paper: Adversarial Cooperation in Code Synthesis Implementation: g3 Key insight: Discard implementing agent's self-report; perform independent evaluation against requirements.
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.