# Send Code Review to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "code-review",
    "name": "Code Review",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/wpank/code-review",
    "canonicalUrl": "https://clawhub.ai/wpank/code-review",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/code-review",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=code-review",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "README.md",
      "SKILL.md"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "slug": "code-review",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-05-01T22:23:07.987Z",
      "expiresAt": "2026-05-08T22:23:07.987Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=code-review",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=code-review",
        "contentDisposition": "attachment; filename=\"code-review-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null,
        "slug": "code-review"
      },
      "scope": "item",
      "summary": "Item download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this item.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/code-review"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/code-review",
    "downloadUrl": "https://openagent3.xyz/downloads/code-review",
    "agentUrl": "https://openagent3.xyz/skills/code-review/agent",
    "manifestUrl": "https://openagent3.xyz/skills/code-review/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/code-review/agent.md"
  }
}
```
## Documentation

### Code Review Checklist

Thorough, structured approach to reviewing code. Work through each dimension systematically rather than scanning randomly.

### OpenClaw / Moltbot / Clawbot

npx clawhub@latest install code-review

### Review Dimensions

DimensionFocusPrioritySecurityVulnerabilities, auth, data exposureCriticalPerformanceSpeed, memory, scalability bottlenecksHighCorrectnessLogic errors, edge cases, data integrityHighMaintainabilityReadability, structure, future-proofingMediumTestingCoverage, quality, reliability of testsMediumAccessibilityWCAG compliance, keyboard nav, screen readersMediumDocumentationComments, API docs, changelog entriesLow

### Security Checklist

Review every change for these vulnerabilities:

SQL Injection — All queries use parameterized statements or an ORM; no string concatenation with user input
 XSS — User-provided content is escaped/sanitized before rendering; dangerouslySetInnerHTML or equivalent is justified and safe
 CSRF Protection — State-changing requests require valid CSRF tokens; SameSite cookie attributes are set
 Authentication — Every protected endpoint verifies the user is authenticated before processing
 Authorization — Resource access is scoped to the requesting user's permissions; no IDOR vulnerabilities
 Input Validation — All external input (params, headers, body, files) is validated for type, length, format, and range on the server side
 Secrets Management — No API keys, passwords, tokens, or credentials in source code; secrets come from environment variables or a vault
 Dependency Safety — New dependencies are from trusted sources, actively maintained, and free of known CVEs
 Sensitive Data — PII, tokens, and secrets are never logged, included in error messages, or returned in API responses
 Rate Limiting — Public and auth endpoints have rate limits to prevent brute-force and abuse
 File Upload Safety — Uploaded files are validated for type and size, stored outside the webroot, and served with safe Content-Type headers
 HTTP Security Headers — Content-Security-Policy, X-Content-Type-Options, Strict-Transport-Security are set

### Performance Checklist

N+1 Queries — Database access patterns are batched or joined; no loops issuing individual queries
 Unnecessary Re-renders — Components only re-render when their relevant state/props change; memoization is applied where measurable
 Memory Leaks — Event listeners, subscriptions, timers, and intervals are cleaned up on unmount/disposal
 Bundle Size — New dependencies are tree-shakeable; large libraries are loaded dynamically; no full-library imports for a single function
 Lazy Loading — Heavy components, routes, and below-the-fold content use lazy loading / code splitting
 Caching Strategy — Expensive computations and API responses use appropriate caching (memoization, HTTP cache headers, Redis)
 Database Indexing — Queries filter/sort on indexed columns; new queries have been checked with EXPLAIN
 Pagination — List endpoints and queries use pagination or cursor-based fetching; no unbounded SELECT *
 Async Operations — Long-running tasks are offloaded to background jobs or queues rather than blocking request threads
 Image & Asset Optimization — Images are properly sized, use modern formats (WebP/AVIF), and leverage CDN delivery

### Correctness Checklist

Edge Cases — Empty arrays, empty strings, zero values, negative numbers, and maximum values are handled
 Null/Undefined Handling — Nullable values are checked before access; optional chaining or guards prevent runtime errors
 Off-by-One Errors — Loop bounds, array slicing, pagination offsets, and range calculations are verified
 Race Conditions — Concurrent access to shared state uses locks, transactions, or atomic operations
 Timezone Handling — Dates are stored in UTC; display conversion happens at the presentation layer
 Unicode & Encoding — String operations handle multi-byte characters; text encoding is explicit (UTF-8)
 Integer Overflow / Precision — Arithmetic on large numbers or currency uses appropriate types (BigInt, Decimal)
 Error Propagation — Errors from async calls and external services are caught and handled; promises are never silently swallowed
 State Consistency — Multi-step mutations are transactional; partial failures leave the system in a valid state
 Boundary Validation — Values at the boundaries of valid ranges (min, max, exactly-at-limit) are tested

### Maintainability Checklist

Naming Clarity — Variables, functions, and classes have descriptive names that reveal intent
 Single Responsibility — Each function/class/module does one thing; changes to one concern don't ripple through unrelated code
 DRY — Duplicated logic is extracted into shared utilities; copy-pasted blocks are consolidated
 Cyclomatic Complexity — Functions have low branching complexity; deeply nested chains are refactored
 Error Handling — Errors are caught at appropriate boundaries, logged with context, and surfaced meaningfully
 Dead Code Removal — Commented-out code, unused imports, unreachable branches, and obsolete feature flags are removed
 Magic Numbers & Strings — Literal values are extracted into named constants with clear semantics
 Consistent Patterns — New code follows the conventions already established in the codebase
 Function Length — Functions are short enough to understand at a glance; long functions are decomposed
 Dependency Direction — Dependencies point inward (infrastructure to domain); core logic does not import from UI or framework layers

### Testing Checklist

Test Coverage — New logic paths have corresponding tests; critical paths have both happy-path and failure-case tests
 Edge Case Tests — Tests cover boundary values, empty inputs, nulls, and error conditions
 No Flaky Tests — Tests are deterministic; no reliance on timing, external services, or shared mutable state
 Test Independence — Each test sets up its own state and tears it down; test order does not affect results
 Meaningful Assertions — Tests assert on behavior and outcomes, not implementation details
 Test Readability — Tests follow Arrange-Act-Assert; test names describe the scenario and expected outcome
 Mocking Discipline — Only external boundaries (network, DB, filesystem) are mocked
 Regression Tests — Bug fixes include a test that reproduces the original bug and proves it is resolved

### Review Process

Work through the code in three passes. Do not try to catch everything in one read.

PassFocusTimeWhat to Look ForFirstHigh-level structure2-5 minArchitecture fit, file organization, API design, overall approachSecondLine-by-line detailBulkLogic errors, security issues, performance problems, edge casesThirdEdge cases & hardening5 minFailure modes, concurrency, boundary values, missing tests

### First Pass (2-5 minutes)

Read the PR description and linked issue
Scan the file list — does the change scope make sense?
Check the overall approach — is this the right solution to the problem?
Verify the change does not introduce architectural drift

### Second Pass (bulk of review time)

Read each file diff top to bottom
Check every function change against the checklists above
Verify error handling at every I/O boundary
Flag anything that makes you pause — trust your instincts

### Third Pass (5 minutes)

Think about what could go wrong in production
Check for missing tests on the code paths you flagged
Verify rollback safety — can this change be reverted without data loss?
Confirm documentation and changelog are updated if needed

### Severity Levels

Classify every comment by severity so the author knows what blocks merge.

LevelLabelMeaningBlocks Merge?Critical[CRITICAL]Security vulnerability, data loss, or crash in productionYesMajor[MAJOR]Bug, logic error, or significant performance regressionYesMinor[MINOR]Improvement that would reduce future maintenance costNoNitpick[NIT]Style preference, naming suggestion, or trivial cleanupNo

Always prefix your review comment with the severity label. This removes ambiguity about what matters.

### Principles

Be specific — Point to the exact line and explain the issue, not just "this is wrong"
Explain why — State the risk or consequence, not just the rule
Suggest a fix — Offer a concrete alternative or code snippet when possible
Ask, don't demand — Use questions for subjective points: "What do you think about...?"
Acknowledge good work — Call out clean solutions, clever optimizations, or thorough tests
Separate blocking from non-blocking — Use severity labels so the author knows what matters

### Example Comments

Bad:

This is wrong. Fix it.

Good:

[MAJOR] This query interpolates user input directly into the SQL string (line 42), which is vulnerable to SQL injection. Consider using a parameterized query:
SELECT * FROM users WHERE id = $1

Bad:

Why didn't you add tests?

Good:

[MINOR] The new calculateDiscount() function has a few branching paths — could we add tests for the zero-quantity and negative-price edge cases to prevent regressions?

Bad:

I would have done this differently.

Good:

[NIT] This works well. An alternative approach could be extracting the retry logic into a shared withRetry() wrapper — but that's optional and could be a follow-up.

### Review Anti-Patterns

Avoid these common traps that waste time and damage team trust:

Anti-PatternDescriptionRubber-StampingApproving without reading. Creates false confidence and lets bugs through.BikesheddingSpending 30 minutes debating a variable name while ignoring a race condition.Blocking on StyleRefusing to approve over formatting that a linter should enforce automatically.GatekeepingRequiring your personal preferred approach when the submitted one is correct.Drive-by ReviewsLeaving one vague comment and disappearing. Commit to following through.Scope Creep ReviewsRequesting unrelated refactors that should be separate PRs.Stale ReviewsLetting PRs sit for days. Review within 24 hours or hand off to someone else.Emotional Language"This is terrible" or "obviously wrong." Critique the code, not the person.

### NEVER Do

NEVER approve without reading every changed line — rubber-stamping is worse than no review
NEVER block a PR solely for style preferences — use a linter; humans review logic
NEVER leave feedback without a severity level — ambiguity causes wasted cycles
NEVER request changes without explaining why — "fix this" teaches nothing
NEVER review more than 400 lines in one sitting — comprehension drops sharply; break large PRs into sessions
NEVER skip the security checklist — one missed vulnerability outweighs a hundred style nits
NEVER make it personal — review the code, never the coder; assume good intent
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: wpank
- Version: 1.0.0
## Source health
- Status: healthy
- Item download looks usable.
- Yavira can redirect you to the upstream package for this item.
- Health scope: item
- Reason: direct_download_ok
- Checked at: 2026-05-01T22:23:07.987Z
- Expires at: 2026-05-08T22:23:07.987Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/code-review)
- [Send to Agent page](https://openagent3.xyz/skills/code-review/agent)
- [JSON manifest](https://openagent3.xyz/skills/code-review/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/code-review/agent.md)
- [Download page](https://openagent3.xyz/downloads/code-review)