Assess code quality against Clean Code principles — naming, functions, comments, formatting, error handling, boundaries, and tests.
0
AI 100
review-clean-architecture
HunterGerlach2 weeks ago
Assess a codebase against Clean Architecture principles — dependency direction, domain isolation, and boundary discipline.
0
AI 91
review-design-patterns
HunterGerlach2 weeks ago
Assess appropriate use of design patterns — creational, structural, behavioral — and identify anti-patterns.
0
AI 88
review-solid
HunterGerlach2 weeks ago
Assess a codebase against SOLID principles — Single Responsibility, Open/Closed, Liskov Substitution, Interface Segregation, Dependency Inversion.
0
AI 88
review-12factor
HunterGerlach2 weeks ago
Assess a codebase against the Twelve-Factor App methodology for cloud-native readiness.
0
AI 88
upstream-contribution
HunterGerlach2 weeks ago
Protocol for contributing universal corrections back to the shared agent-playbook. Load when an agent discovers a correction that applies to all projects, not just the current one.
0
AI 84
code-health-review
HunterGerlach2 weeks ago
Whole-repo code health assessment across 12 dimensions. Quick scan, prioritize, then deep dive with detailed review skills.
0
AI 72
dependency-adding
HunterGerlach2 weeks ago
Evaluate and add a new production dependency, ensuring supply-chain security, license compliance, and minimal footprint.
0
review-ui-ux
HunterGerlach2 weeks ago
Assess user experience across all touchpoints — simplicity, anticipatory design, consistency, responsiveness, feedback, CLI/API DX, and navigation.
0
security-review
HunterGerlach2/14/2026
Perform a security review checklist when changes touch authentication, authorization, cryptography, secrets, or external interfaces.
0
AI 90
ci-debugging
HunterGerlach2/14/2026
Systematically debug CI/CD pipeline failures by analyzing logs, configuration, and environment differences.
0
AI 88
ci-debugging
HunterGerlach2/15/2026
Systematically debug CI/CD pipeline failures by analyzing logs, configuration, and environment differences.
0
AI 83
security-review
HunterGerlach2/15/2026
Perform a security review checklist when changes touch authentication, authorization, cryptography, secrets, or external interfaces.