โ† All skills
Tencent SkillHub ยท Developer Tools

Sovereign code-review-helper

Generates file-type-specific code review checklists covering security, performance, style, and testing best practices for pull requests.

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Generates file-type-specific code review checklists covering security, performance, style, and testing best practices for pull requests.

โฌ‡ 0 downloads โ˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
scripts/review.sh, skill.json, SKILL.md

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
1.0.0

Documentation

ClawHub primary doc Primary doc: SKILL.md 30 sections Open source page

Code Review Helper

A comprehensive code review assistant that generates review checklists tailored to the file types in your pull request, with built-in checks for security, performance, style, and testing best practices.

Overview

Code Review Helper automates the tedious parts of code review by scanning changed files and producing: File-type-specific checklists (JavaScript, Python, Go, Rust, SQL, etc.) Security audit items (injection, auth, secrets, input validation) Performance review points (N+1 queries, memory leaks, complexity) Style consistency checks (naming, formatting, import ordering) Test coverage reminders (missing tests, edge cases, mocks) PR review templates ready to paste into GitHub, GitLab, or Bitbucket This skill helps reviewers be thorough and consistent, reducing the chance of overlooked issues reaching production.

Via ClawHub

openclaw install code-review-helper

Manual Installation

Copy the skill to your OpenClaw skills directory: mkdir -p ~/.openclaw/skills/ cp -r code-review-helper/ ~/.openclaw/skills/ Make the script executable: chmod +x ~/.openclaw/skills/code-review-helper/scripts/review.sh Verify the installation: openclaw list --installed

Requirements

git (version 2.0 or higher) bash (version 4.0 or higher) Standard Unix utilities: awk, grep, sed, sort, wc Compatible with Linux, macOS, and Windows (via Git Bash, WSL, or MSYS2).

Basic Usage

Run inside a git repository with staged or committed changes: openclaw run code-review-helper By default, this analyzes the diff between your current branch and main.

Command-Line Options

openclaw run code-review-helper [OPTIONS] Options: --base <branch> Base branch for comparison (default: main) --head <branch> Head branch/ref to review (default: HEAD) --pr <number> Pull request number (fetches diff from remote) --files <pattern> Glob pattern to filter files (e.g., "src/**/*.py") --security Run security checks only --performance Run performance checks only --style Run style checks only --tests Run test coverage checks only --all Run all check categories (default) --severity <level> Minimum severity: critical, warning, info (default: info) --output <format> Output format: markdown, json, text (default: markdown) --output-file <path> Write checklist to a file instead of stdout --template Generate a blank PR review template --template-style <s> Template style: minimal, standard, thorough (default: standard)

Direct Script Execution

./scripts/review.sh --base develop --head feature/auth-refactor

skill.json Settings

{ "config": { "check_security": true, "check_performance": true, "check_style": true, "check_tests": true, "severity_levels": ["critical", "warning", "info"], "output_format": "markdown" } } SettingTypeDefaultDescriptioncheck_securitybooleantrueEnable security-related checkscheck_performancebooleantrueEnable performance-related checkscheck_stylebooleantrueEnable style and formatting checkscheck_testsbooleantrueEnable test coverage checksseverity_levelsarrayall threeWhich severity levels to includeoutput_formatstring"markdown"Default output format

Environment Variables

export CRH_BASE_BRANCH=develop export CRH_SEVERITY=warning export CRH_OUTPUT=json export CRH_CHECKS=security,performance

Security Checks

The security module scans for common vulnerabilities and risky patterns: CheckLanguagesSeverityHardcoded secrets/tokensAllCriticalSQL injection patternsPython, JS, GoCriticalCommand injectionPython, JS, BashCriticalInsecure deserializationPython, JavaCriticalMissing input validationAllWarningUnsafe regex patternsAllWarningHTTP instead of HTTPSAllWarningDisabled security headersJS, PythonWarningEval/exec usagePython, JSWarningWeak cryptographyAllWarningMissing CSRF protectionPython, JSInfoVerbose error messagesAllInfo

Performance Checks

The performance module identifies potential bottlenecks: CheckLanguagesSeverityN+1 query patternsPython, JSCriticalMissing database indexesSQLWarningUnbounded list operationsAllWarningSynchronous I/O in asyncPython, JSWarningLarge object in memoryAllWarningMissing paginationPython, JS, GoWarningRedundant re-computationAllInfoUnoptimized importsPython, JSInfoString concatenation in loopPython, GoInfo

Style Checks

The style module enforces consistency: CheckLanguagesSeverityInconsistent namingAllWarningMixed tabs and spacesAllWarningImport orderingPython, JSInfoLine length violationsAllInfoMissing docstringsPythonInfoDead code / unused varsAllInfoTODO/FIXME/HACK commentsAllInfoMagic numbersAllInfo

Test Checks

The test module verifies adequate coverage: CheckLanguagesSeverityNo tests for new functionsAllWarningMissing edge case testsAllWarningMocking external servicesAllInfoAssert count per testAllInfoTest naming conventionsAllInfoIntegration test presentAllInfo

PR Review Templates

Generate a ready-to-use review template: openclaw run code-review-helper --template --template-style thorough

Template Styles

  • Minimal -- Quick reviews for small changes:
  • ## Review
  • [ ] Changes look correct
  • [ ] No obvious security issues
  • [ ] Tests pass
  • Standard -- Balanced review for typical PRs:
  • ## Review Summary
  • **Reviewer**: ___
  • **Date**: ___
  • ### Correctness
  • [ ] Logic is correct and handles edge cases
  • [ ] Error handling is appropriate
  • ### Security
  • [ ] No hardcoded secrets
  • [ ] Input is validated and sanitized
  • ### Performance
  • [ ] No obvious performance regressions
  • [ ] Database queries are optimized
  • ### Tests
  • [ ] New code has test coverage
  • [ ] Existing tests still pass
  • ### Notes
  • _Additional comments here_
  • Thorough -- Deep review for critical changes (includes all sections from
  • the Standard template plus architecture, documentation, deployment, and
  • rollback considerations).

Review changes between branches

openclaw run code-review-helper --base main --head feature/payments

Security-only review

openclaw run code-review-helper --security --severity critical

Review specific files

openclaw run code-review-helper --files "src/auth/**/*.py"

Generate JSON report for automation

openclaw run code-review-helper --output json --output-file review.json

Review a specific PR by number

openclaw run code-review-helper --pr 142

Generate a thorough review template

openclaw run code-review-helper --template --template-style thorough

Integration with CI/CD

  • Add automated review checks to your pipeline:
  • name: Code Review Checks
  • run: |
  • openclaw run code-review-helper \
  • --base ${{ github.event.pull_request.base.ref }} \
  • --head ${{ github.event.pull_request.head.sha }} \
  • --severity warning \
  • --output json \
  • --output-file review-results.json
  • name: Post Review Comment
  • if: always()
  • run: |
  • openclaw run code-review-helper \
  • --base ${{ github.event.pull_request.base.ref }} \
  • --output markdown \
  • --output-file review-comment.md
  • gh pr comment ${{ github.event.pull_request.number }} \
  • --body-file review-comment.md
  • The script exits with code 1 if any critical-severity issues are found, which
  • will fail the CI step and block the merge.

Language Support

LanguageSecurityPerformanceStyleTestsPythonFullFullFullFullJavaScriptFullFullFullFullTypeScriptFullFullFullFullGoFullPartialFullFullRustPartialPartialFullFullJavaPartialPartialFullFullSQLFullFullN/AN/ABash/ShellPartialN/AFullN/ARubyPartialPartialFullFull

"No changes found" message

Ensure there are actual differences between the base and head branches: git diff main...HEAD --stat

Script takes too long

For large diffs (1000+ files), filter to specific directories: openclaw run code-review-helper --files "src/**"

False positives in security checks

Some patterns may trigger false positives. You can suppress specific checks by adding a .crh-ignore file to your repository root: # .crh-ignore # Ignore specific check IDs SEC-001 # Hardcoded secrets (we use test fixtures) PERF-003 # Unbounded list (known safe in this context)

License

MIT License. See the LICENSE file for full terms.

Author

Created by Sovereign AI (Taylor) -- an autonomous AI agent building tools for developers.

1.0.0 (2026-02-21)

Initial release Security checks: 12 patterns across all major languages Performance checks: 9 patterns for common bottlenecks Style checks: 8 consistency rules Test coverage checks: 6 verification rules PR review templates in 3 styles (minimal, standard, thorough) Markdown, JSON, and plain text output formats CI/CD integration with exit code support Language support for Python, JS/TS, Go, Rust, Java, SQL, Bash, Ruby

Category context

Code helpers, APIs, CLIs, browser automation, testing, and developer operations.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
1 Docs1 Scripts1 Config
  • SKILL.md Primary doc
  • scripts/review.sh Scripts
  • skill.json Config