priority-review
3
总安装量
3
周安装量
#61915
全站排名
安装命令
npx skills add https://github.com/jacobjmc/priority-review --skill priority-review
Agent 安装分布
opencode
3
claude-code
3
github-copilot
3
codex
3
kimi-cli
3
gemini-cli
3
Skill 文档
Priority Code Review
Review code changes for real, actionable defects. Prioritize precision over exhaustive exploration. Report only issues with a plausible failure path tied to the change.
Scope
- Review diffs, PRs, or commits and the code paths they affect.
- Focus on security, correctness, reliability, data integrity, and breaking regressions.
- Reference unchanged code only when needed to explain a failure introduced by the change.
- Do not report style preferences, feature ideas, or speculative concerns without concrete impact.
Severity and Confidence
Severity (P0-P3)
P0 – Critical (must fix)
- Security vulnerabilities (hardcoded secrets, injection, auth bypass)
- Data corruption or irreversible loss
- Crashes/outages in reachable paths
- Severe breaking changes that make core flows fail
P1 – High (should fix before merge)
- User-visible correctness bugs in common paths
- Missing/incorrect error handling causing request/job failure
- Concurrency/state bugs with realistic reachability
- Incomplete migrations or contract changes likely to break consumers
P2 – Medium
- Edge-case correctness bugs with clear impact
- Type or validation gaps likely to fail at runtime
- Performance regressions with concrete user or system impact
P3 – Low
- Low-severity correctness or maintainability risk introduced by the change
- Limited-impact fallback/default handling mistakes
- Latent bug risk with narrow reachability and clear evidence
Confidence
high: Direct code evidence and clear failure path from the changemedium: Strong evidence with one reasonable assumptionlow: Plausible concern that needs validation; report underNeeds verification, not as a blocker
Review Workflow
Pass 1: Gather Minimal Context and Triage
- Collect the smallest sufficient git context for the review mode.
- Start with changed files and diff; read surrounding code only when needed.
- Identify risk signals and form defect hypotheses before deep investigation.
Examples (choose only what is needed):
- Uncommitted:
git status --porcelain,git diff,git diff --cached - PR/branch:
git log --oneline {base}..HEAD,git diff {base}...HEAD --stat,git diff {base}...HEAD - Commit:
git show {sha} --stat,git diff {sha}^..{sha}
Risk Signals (trigger deeper review)
- Auth, permissions, session, secrets, crypto
- Input parsing, validation, serialization, SQL, file/path handling
- Async/concurrency, shared state, retries, idempotency, caching
- Data models, migrations, backfills, schema or contract changes
- Money, billing, quotas, usage accounting
- Error handling, timeouts, fallbacks, feature flags
Pass 2: Targeted Investigation (Bounded)
- Investigate only when a plausible defect hypothesis exists.
- Prioritize highest-risk hypotheses first.
- Read local context, related callers/callees, and affected invariants.
- Use sub-agents only for complex targeted checks; cap to 2-3 parallel probes.
- Do not spawn broad exploratory investigations for every category.
Optional Custom Rules
If .priority-review-rules.json exists in the repository root, load it and check changed files for rule matches.
Minimal rule format:
{
"rules": [
{
"id": "no-console-log",
"title": "No console.log in production code",
"severity": "P2",
"pattern": "console\\.log"
}
]
}
- Report rule violations at the rule severity.
- Check changed files by default unless the rule explicitly requires broader scope.
Findings: Evidence Standard
Report only issues with a plausible execution or failure path caused by the change.
For each finding, include:
- Severity (
P0–P3) and confidence (highormedium) - Changed-file anchor (
file:line) when possible - Concrete impact (what fails, breaks, leaks, or corrupts)
- Causal explanation (why the change creates the issue)
If confidence is low, place it under Needs verification instead of P0/P1/P2/P3.
Report Format
Report findings by priority (P0 -> P3).
For each finding:
**[P{0-3}][{high|medium}] {file}:{line} - {title}**
Impact: {what breaks / risk}
Why: {causal path from the change}
Optional section for uncertain concerns:
## Needs verification
- [low] {file}:{line} - {concern} ({what to validate})
## Summary
- P0: N
- P1: N
- P2: N
- P3: N
- Outcome: Blocker | Non-blocking findings | No actionable findings
Use No actionable findings when no credible defects are identified.
What Not to Report
- Style, formatting, naming, or preference-only comments
- Theoretical issues without a plausible failure path
- Pre-existing problems in unchanged code (unless the change introduces the failure path through them)
- Feature requests, enhancement ideas, or missing features
- Duplicate findings for the same underlying issue
- Praise-only notes or non-actionable observations
Tool Defaults
- Do not run linting, type checking, or tests by default.
- Use targeted verification only when necessary to validate a suspected
P0/P1issue that code inspection cannot resolve. - Focus on semantic review of the change, not automated tooling output.
Anti-Patterns
- Do not report speculation as a finding.
- Do not escalate severity without concrete user, security, or data impact.
- Do not optimize for quantity of findings over accuracy.
- Do not miss cross-file regressions when the diff clearly changes shared behavior.