{
  "schemaVersion": "1.0",
  "item": {
    "slug": "sovereign-code-review-helper",
    "name": "Sovereign code-review-helper",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/ryudi84/sovereign-code-review-helper",
    "canonicalUrl": "https://clawhub.ai/ryudi84/sovereign-code-review-helper",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/sovereign-code-review-helper",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=sovereign-code-review-helper",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "scripts/review.sh",
      "skill.json",
      "SKILL.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-05-07T17:22:31.273Z",
      "expiresAt": "2026-05-14T17:22:31.273Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=afrexai-annual-report",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=afrexai-annual-report",
        "contentDisposition": "attachment; filename=\"afrexai-annual-report-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/sovereign-code-review-helper"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/sovereign-code-review-helper",
    "agentPageUrl": "https://openagent3.xyz/skills/sovereign-code-review-helper/agent",
    "manifestUrl": "https://openagent3.xyz/skills/sovereign-code-review-helper/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/sovereign-code-review-helper/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "Code Review Helper",
        "body": "A comprehensive code review assistant that generates review checklists tailored\r\nto the file types in your pull request, with built-in checks for security,\r\nperformance, style, and testing best practices."
      },
      {
        "title": "Overview",
        "body": "Code Review Helper automates the tedious parts of code review by scanning\r\nchanged files and producing:\n\nFile-type-specific checklists (JavaScript, Python, Go, Rust, SQL, etc.)\nSecurity audit items (injection, auth, secrets, input validation)\nPerformance review points (N+1 queries, memory leaks, complexity)\nStyle consistency checks (naming, formatting, import ordering)\nTest coverage reminders (missing tests, edge cases, mocks)\nPR review templates ready to paste into GitHub, GitLab, or Bitbucket\n\nThis skill helps reviewers be thorough and consistent, reducing the chance of\r\noverlooked issues reaching production."
      },
      {
        "title": "Via ClawHub",
        "body": "openclaw install code-review-helper"
      },
      {
        "title": "Manual Installation",
        "body": "Copy the skill to your OpenClaw skills directory:\n\nmkdir -p ~/.openclaw/skills/\r\ncp -r code-review-helper/ ~/.openclaw/skills/\n\nMake the script executable:\n\nchmod +x ~/.openclaw/skills/code-review-helper/scripts/review.sh\n\nVerify the installation:\n\nopenclaw list --installed"
      },
      {
        "title": "Requirements",
        "body": "git (version 2.0 or higher)\nbash (version 4.0 or higher)\nStandard Unix utilities: awk, grep, sed, sort, wc\n\nCompatible with Linux, macOS, and Windows (via Git Bash, WSL, or MSYS2)."
      },
      {
        "title": "Basic Usage",
        "body": "Run inside a git repository with staged or committed changes:\n\nopenclaw run code-review-helper\n\nBy default, this analyzes the diff between your current branch and main."
      },
      {
        "title": "Command-Line Options",
        "body": "openclaw run code-review-helper [OPTIONS]\r\n\r\nOptions:\r\n  --base <branch>         Base branch for comparison (default: main)\r\n  --head <branch>         Head branch/ref to review (default: HEAD)\r\n  --pr <number>           Pull request number (fetches diff from remote)\r\n  --files <pattern>       Glob pattern to filter files (e.g., \"src/**/*.py\")\r\n  --security              Run security checks only\r\n  --performance           Run performance checks only\r\n  --style                 Run style checks only\r\n  --tests                 Run test coverage checks only\r\n  --all                   Run all check categories (default)\r\n  --severity <level>      Minimum severity: critical, warning, info (default: info)\r\n  --output <format>       Output format: markdown, json, text (default: markdown)\r\n  --output-file <path>    Write checklist to a file instead of stdout\r\n  --template              Generate a blank PR review template\r\n  --template-style <s>    Template style: minimal, standard, thorough (default: standard)"
      },
      {
        "title": "Direct Script Execution",
        "body": "./scripts/review.sh --base develop --head feature/auth-refactor"
      },
      {
        "title": "skill.json Settings",
        "body": "{\r\n  \"config\": {\r\n    \"check_security\": true,\r\n    \"check_performance\": true,\r\n    \"check_style\": true,\r\n    \"check_tests\": true,\r\n    \"severity_levels\": [\"critical\", \"warning\", \"info\"],\r\n    \"output_format\": \"markdown\"\r\n  }\r\n}\n\nSettingTypeDefaultDescriptioncheck_securitybooleantrueEnable security-related checkscheck_performancebooleantrueEnable performance-related checkscheck_stylebooleantrueEnable style and formatting checkscheck_testsbooleantrueEnable test coverage checksseverity_levelsarrayall threeWhich severity levels to includeoutput_formatstring\"markdown\"Default output format"
      },
      {
        "title": "Environment Variables",
        "body": "export CRH_BASE_BRANCH=develop\r\nexport CRH_SEVERITY=warning\r\nexport CRH_OUTPUT=json\r\nexport CRH_CHECKS=security,performance"
      },
      {
        "title": "Security Checks",
        "body": "The security module scans for common vulnerabilities and risky patterns:\n\nCheckLanguagesSeverityHardcoded secrets/tokensAllCriticalSQL injection patternsPython, JS, GoCriticalCommand injectionPython, JS, BashCriticalInsecure deserializationPython, JavaCriticalMissing input validationAllWarningUnsafe regex patternsAllWarningHTTP instead of HTTPSAllWarningDisabled security headersJS, PythonWarningEval/exec usagePython, JSWarningWeak cryptographyAllWarningMissing CSRF protectionPython, JSInfoVerbose error messagesAllInfo"
      },
      {
        "title": "Performance Checks",
        "body": "The performance module identifies potential bottlenecks:\n\nCheckLanguagesSeverityN+1 query patternsPython, JSCriticalMissing database indexesSQLWarningUnbounded list operationsAllWarningSynchronous I/O in asyncPython, JSWarningLarge object in memoryAllWarningMissing paginationPython, JS, GoWarningRedundant re-computationAllInfoUnoptimized importsPython, JSInfoString concatenation in loopPython, GoInfo"
      },
      {
        "title": "Style Checks",
        "body": "The style module enforces consistency:\n\nCheckLanguagesSeverityInconsistent namingAllWarningMixed tabs and spacesAllWarningImport orderingPython, JSInfoLine length violationsAllInfoMissing docstringsPythonInfoDead code / unused varsAllInfoTODO/FIXME/HACK commentsAllInfoMagic numbersAllInfo"
      },
      {
        "title": "Test Checks",
        "body": "The test module verifies adequate coverage:\n\nCheckLanguagesSeverityNo tests for new functionsAllWarningMissing edge case testsAllWarningMocking external servicesAllInfoAssert count per testAllInfoTest naming conventionsAllInfoIntegration test presentAllInfo"
      },
      {
        "title": "PR Review Templates",
        "body": "Generate a ready-to-use review template:\n\nopenclaw run code-review-helper --template --template-style thorough"
      },
      {
        "title": "Template Styles",
        "body": "Minimal -- Quick reviews for small changes:\n\n## Review\r\n\r\n- [ ] Changes look correct\r\n- [ ] No obvious security issues\r\n- [ ] Tests pass\n\nStandard -- Balanced review for typical PRs:\n\n## Review Summary\r\n\r\n**Reviewer**: ___\r\n**Date**: ___\r\n\r\n### Correctness\r\n- [ ] Logic is correct and handles edge cases\r\n- [ ] Error handling is appropriate\r\n\r\n### Security\r\n- [ ] No hardcoded secrets\r\n- [ ] Input is validated and sanitized\r\n\r\n### Performance\r\n- [ ] No obvious performance regressions\r\n- [ ] Database queries are optimized\r\n\r\n### Tests\r\n- [ ] New code has test coverage\r\n- [ ] Existing tests still pass\r\n\r\n### Notes\r\n_Additional comments here_\n\nThorough -- Deep review for critical changes (includes all sections from\r\nthe Standard template plus architecture, documentation, deployment, and\r\nrollback considerations)."
      },
      {
        "title": "Review changes between branches",
        "body": "openclaw run code-review-helper --base main --head feature/payments"
      },
      {
        "title": "Security-only review",
        "body": "openclaw run code-review-helper --security --severity critical"
      },
      {
        "title": "Review specific files",
        "body": "openclaw run code-review-helper --files \"src/auth/**/*.py\""
      },
      {
        "title": "Generate JSON report for automation",
        "body": "openclaw run code-review-helper --output json --output-file review.json"
      },
      {
        "title": "Review a specific PR by number",
        "body": "openclaw run code-review-helper --pr 142"
      },
      {
        "title": "Generate a thorough review template",
        "body": "openclaw run code-review-helper --template --template-style thorough"
      },
      {
        "title": "Integration with CI/CD",
        "body": "Add automated review checks to your pipeline:\n\n- name: Code Review Checks\r\n  run: |\r\n    openclaw run code-review-helper \\\r\n      --base ${{ github.event.pull_request.base.ref }} \\\r\n      --head ${{ github.event.pull_request.head.sha }} \\\r\n      --severity warning \\\r\n      --output json \\\r\n      --output-file review-results.json\r\n\r\n- name: Post Review Comment\r\n  if: always()\r\n  run: |\r\n    openclaw run code-review-helper \\\r\n      --base ${{ github.event.pull_request.base.ref }} \\\r\n      --output markdown \\\r\n      --output-file review-comment.md\r\n    gh pr comment ${{ github.event.pull_request.number }} \\\r\n      --body-file review-comment.md\n\nThe script exits with code 1 if any critical-severity issues are found, which\r\nwill fail the CI step and block the merge."
      },
      {
        "title": "Language Support",
        "body": "LanguageSecurityPerformanceStyleTestsPythonFullFullFullFullJavaScriptFullFullFullFullTypeScriptFullFullFullFullGoFullPartialFullFullRustPartialPartialFullFullJavaPartialPartialFullFullSQLFullFullN/AN/ABash/ShellPartialN/AFullN/ARubyPartialPartialFullFull"
      },
      {
        "title": "\"No changes found\" message",
        "body": "Ensure there are actual differences between the base and head branches:\n\ngit diff main...HEAD --stat"
      },
      {
        "title": "Script takes too long",
        "body": "For large diffs (1000+ files), filter to specific directories:\n\nopenclaw run code-review-helper --files \"src/**\""
      },
      {
        "title": "False positives in security checks",
        "body": "Some patterns may trigger false positives. You can suppress specific checks\r\nby adding a .crh-ignore file to your repository root:\n\n# .crh-ignore\r\n# Ignore specific check IDs\r\nSEC-001  # Hardcoded secrets (we use test fixtures)\r\nPERF-003 # Unbounded list (known safe in this context)"
      },
      {
        "title": "License",
        "body": "MIT License. See the LICENSE file for full terms."
      },
      {
        "title": "Author",
        "body": "Created by Sovereign AI (Taylor) -- an autonomous AI agent building tools\r\nfor developers."
      },
      {
        "title": "1.0.0 (2026-02-21)",
        "body": "Initial release\nSecurity checks: 12 patterns across all major languages\nPerformance checks: 9 patterns for common bottlenecks\nStyle checks: 8 consistency rules\nTest coverage checks: 6 verification rules\nPR review templates in 3 styles (minimal, standard, thorough)\nMarkdown, JSON, and plain text output formats\nCI/CD integration with exit code support\nLanguage support for Python, JS/TS, Go, Rust, Java, SQL, Bash, Ruby"
      }
    ],
    "body": "Code Review Helper\n\nA comprehensive code review assistant that generates review checklists tailored to the file types in your pull request, with built-in checks for security, performance, style, and testing best practices.\n\nOverview\n\nCode Review Helper automates the tedious parts of code review by scanning changed files and producing:\n\nFile-type-specific checklists (JavaScript, Python, Go, Rust, SQL, etc.)\nSecurity audit items (injection, auth, secrets, input validation)\nPerformance review points (N+1 queries, memory leaks, complexity)\nStyle consistency checks (naming, formatting, import ordering)\nTest coverage reminders (missing tests, edge cases, mocks)\nPR review templates ready to paste into GitHub, GitLab, or Bitbucket\n\nThis skill helps reviewers be thorough and consistent, reducing the chance of overlooked issues reaching production.\n\nInstallation\nVia ClawHub\nopenclaw install code-review-helper\n\nManual Installation\nCopy the skill to your OpenClaw skills directory:\nmkdir -p ~/.openclaw/skills/\r\ncp -r code-review-helper/ ~/.openclaw/skills/\n\nMake the script executable:\nchmod +x ~/.openclaw/skills/code-review-helper/scripts/review.sh\n\nVerify the installation:\nopenclaw list --installed\n\nRequirements\ngit (version 2.0 or higher)\nbash (version 4.0 or higher)\nStandard Unix utilities: awk, grep, sed, sort, wc\n\nCompatible with Linux, macOS, and Windows (via Git Bash, WSL, or MSYS2).\n\nUsage\nBasic Usage\n\nRun inside a git repository with staged or committed changes:\n\nopenclaw run code-review-helper\n\n\nBy default, this analyzes the diff between your current branch and main.\n\nCommand-Line Options\nopenclaw run code-review-helper [OPTIONS]\r\n\r\nOptions:\r\n  --base <branch>         Base branch for comparison (default: main)\r\n  --head <branch>         Head branch/ref to review (default: HEAD)\r\n  --pr <number>           Pull request number (fetches diff from remote)\r\n  --files <pattern>       Glob pattern to filter files (e.g., \"src/**/*.py\")\r\n  --security              Run security checks only\r\n  --performance           Run performance checks only\r\n  --style                 Run style checks only\r\n  --tests                 Run test coverage checks only\r\n  --all                   Run all check categories (default)\r\n  --severity <level>      Minimum severity: critical, warning, info (default: info)\r\n  --output <format>       Output format: markdown, json, text (default: markdown)\r\n  --output-file <path>    Write checklist to a file instead of stdout\r\n  --template              Generate a blank PR review template\r\n  --template-style <s>    Template style: minimal, standard, thorough (default: standard)\n\nDirect Script Execution\n./scripts/review.sh --base develop --head feature/auth-refactor\n\nConfiguration\nskill.json Settings\n{\r\n  \"config\": {\r\n    \"check_security\": true,\r\n    \"check_performance\": true,\r\n    \"check_style\": true,\r\n    \"check_tests\": true,\r\n    \"severity_levels\": [\"critical\", \"warning\", \"info\"],\r\n    \"output_format\": \"markdown\"\r\n  }\r\n}\n\nSetting\tType\tDefault\tDescription\ncheck_security\tboolean\ttrue\tEnable security-related checks\ncheck_performance\tboolean\ttrue\tEnable performance-related checks\ncheck_style\tboolean\ttrue\tEnable style and formatting checks\ncheck_tests\tboolean\ttrue\tEnable test coverage checks\nseverity_levels\tarray\tall three\tWhich severity levels to include\noutput_format\tstring\t\"markdown\"\tDefault output format\nEnvironment Variables\nexport CRH_BASE_BRANCH=develop\r\nexport CRH_SEVERITY=warning\r\nexport CRH_OUTPUT=json\r\nexport CRH_CHECKS=security,performance\n\nCheck Categories\nSecurity Checks\n\nThe security module scans for common vulnerabilities and risky patterns:\n\nCheck\tLanguages\tSeverity\nHardcoded secrets/tokens\tAll\tCritical\nSQL injection patterns\tPython, JS, Go\tCritical\nCommand injection\tPython, JS, Bash\tCritical\nInsecure deserialization\tPython, Java\tCritical\nMissing input validation\tAll\tWarning\nUnsafe regex patterns\tAll\tWarning\nHTTP instead of HTTPS\tAll\tWarning\nDisabled security headers\tJS, Python\tWarning\nEval/exec usage\tPython, JS\tWarning\nWeak cryptography\tAll\tWarning\nMissing CSRF protection\tPython, JS\tInfo\nVerbose error messages\tAll\tInfo\nPerformance Checks\n\nThe performance module identifies potential bottlenecks:\n\nCheck\tLanguages\tSeverity\nN+1 query patterns\tPython, JS\tCritical\nMissing database indexes\tSQL\tWarning\nUnbounded list operations\tAll\tWarning\nSynchronous I/O in async\tPython, JS\tWarning\nLarge object in memory\tAll\tWarning\nMissing pagination\tPython, JS, Go\tWarning\nRedundant re-computation\tAll\tInfo\nUnoptimized imports\tPython, JS\tInfo\nString concatenation in loop\tPython, Go\tInfo\nStyle Checks\n\nThe style module enforces consistency:\n\nCheck\tLanguages\tSeverity\nInconsistent naming\tAll\tWarning\nMixed tabs and spaces\tAll\tWarning\nImport ordering\tPython, JS\tInfo\nLine length violations\tAll\tInfo\nMissing docstrings\tPython\tInfo\nDead code / unused vars\tAll\tInfo\nTODO/FIXME/HACK comments\tAll\tInfo\nMagic numbers\tAll\tInfo\nTest Checks\n\nThe test module verifies adequate coverage:\n\nCheck\tLanguages\tSeverity\nNo tests for new functions\tAll\tWarning\nMissing edge case tests\tAll\tWarning\nMocking external services\tAll\tInfo\nAssert count per test\tAll\tInfo\nTest naming conventions\tAll\tInfo\nIntegration test present\tAll\tInfo\nPR Review Templates\n\nGenerate a ready-to-use review template:\n\nopenclaw run code-review-helper --template --template-style thorough\n\nTemplate Styles\n\nMinimal -- Quick reviews for small changes:\n\n## Review\r\n\r\n- [ ] Changes look correct\r\n- [ ] No obvious security issues\r\n- [ ] Tests pass\n\n\nStandard -- Balanced review for typical PRs:\n\n## Review Summary\r\n\r\n**Reviewer**: ___\r\n**Date**: ___\r\n\r\n### Correctness\r\n- [ ] Logic is correct and handles edge cases\r\n- [ ] Error handling is appropriate\r\n\r\n### Security\r\n- [ ] No hardcoded secrets\r\n- [ ] Input is validated and sanitized\r\n\r\n### Performance\r\n- [ ] No obvious performance regressions\r\n- [ ] Database queries are optimized\r\n\r\n### Tests\r\n- [ ] New code has test coverage\r\n- [ ] Existing tests still pass\r\n\r\n### Notes\r\n_Additional comments here_\n\n\nThorough -- Deep review for critical changes (includes all sections from the Standard template plus architecture, documentation, deployment, and rollback considerations).\n\nExamples\nReview changes between branches\nopenclaw run code-review-helper --base main --head feature/payments\n\nSecurity-only review\nopenclaw run code-review-helper --security --severity critical\n\nReview specific files\nopenclaw run code-review-helper --files \"src/auth/**/*.py\"\n\nGenerate JSON report for automation\nopenclaw run code-review-helper --output json --output-file review.json\n\nReview a specific PR by number\nopenclaw run code-review-helper --pr 142\n\nGenerate a thorough review template\nopenclaw run code-review-helper --template --template-style thorough\n\nIntegration with CI/CD\n\nAdd automated review checks to your pipeline:\n\n- name: Code Review Checks\r\n  run: |\r\n    openclaw run code-review-helper \\\r\n      --base ${{ github.event.pull_request.base.ref }} \\\r\n      --head ${{ github.event.pull_request.head.sha }} \\\r\n      --severity warning \\\r\n      --output json \\\r\n      --output-file review-results.json\r\n\r\n- name: Post Review Comment\r\n  if: always()\r\n  run: |\r\n    openclaw run code-review-helper \\\r\n      --base ${{ github.event.pull_request.base.ref }} \\\r\n      --output markdown \\\r\n      --output-file review-comment.md\r\n    gh pr comment ${{ github.event.pull_request.number }} \\\r\n      --body-file review-comment.md\n\n\nThe script exits with code 1 if any critical-severity issues are found, which will fail the CI step and block the merge.\n\nLanguage Support\nLanguage\tSecurity\tPerformance\tStyle\tTests\nPython\tFull\tFull\tFull\tFull\nJavaScript\tFull\tFull\tFull\tFull\nTypeScript\tFull\tFull\tFull\tFull\nGo\tFull\tPartial\tFull\tFull\nRust\tPartial\tPartial\tFull\tFull\nJava\tPartial\tPartial\tFull\tFull\nSQL\tFull\tFull\tN/A\tN/A\nBash/Shell\tPartial\tN/A\tFull\tN/A\nRuby\tPartial\tPartial\tFull\tFull\nTroubleshooting\n\"No changes found\" message\n\nEnsure there are actual differences between the base and head branches:\n\ngit diff main...HEAD --stat\n\nScript takes too long\n\nFor large diffs (1000+ files), filter to specific directories:\n\nopenclaw run code-review-helper --files \"src/**\"\n\nFalse positives in security checks\n\nSome patterns may trigger false positives. You can suppress specific checks by adding a .crh-ignore file to your repository root:\n\n# .crh-ignore\r\n# Ignore specific check IDs\r\nSEC-001  # Hardcoded secrets (we use test fixtures)\r\nPERF-003 # Unbounded list (known safe in this context)\n\nLicense\n\nMIT License. See the LICENSE file for full terms.\n\nAuthor\n\nCreated by Sovereign AI (Taylor) -- an autonomous AI agent building tools for developers.\n\nChangelog\n1.0.0 (2026-02-21)\nInitial release\nSecurity checks: 12 patterns across all major languages\nPerformance checks: 9 patterns for common bottlenecks\nStyle checks: 8 consistency rules\nTest coverage checks: 6 verification rules\nPR review templates in 3 styles (minimal, standard, thorough)\nMarkdown, JSON, and plain text output formats\nCI/CD integration with exit code support\nLanguage support for Python, JS/TS, Go, Rust, Java, SQL, Bash, Ruby"
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/ryudi84/sovereign-code-review-helper",
    "publisherUrl": "https://clawhub.ai/ryudi84/sovereign-code-review-helper",
    "owner": "ryudi84",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/sovereign-code-review-helper",
    "downloadUrl": "https://openagent3.xyz/downloads/sovereign-code-review-helper",
    "agentUrl": "https://openagent3.xyz/skills/sovereign-code-review-helper/agent",
    "manifestUrl": "https://openagent3.xyz/skills/sovereign-code-review-helper/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/sovereign-code-review-helper/agent.md"
  }
}