code-quality-setup
10
总安装量
10
周安装量
#29639
全站排名
安装命令
npx skills add https://github.com/metyatech/skill-code-quality-setup --skill code-quality-setup
Agent 安装分布
opencode
10
gemini-cli
10
github-copilot
10
amp
10
codex
10
kimi-cli
10
Skill 文档
Code quality setup
Per-language toolchain
Use the standard toolchain for each language in the repository.
JavaScript / TypeScript (incl. React/Next)
- Format+lint: ESLint + Prettier.
- When configuring Prettier, always add and maintain
.prettierignoreso generated/build outputs and composed files are not formatted/linted as source (e.g.,dist/, build artifacts, andAGENTS.mdwhen generated by compose-agentsmd). - Typecheck:
tscwith strict settings for TS projects. - Dependency scan:
osv-scanner. If unsupported, use the package manager’s audit tooling.
Python
- Format+lint: Ruff.
- Typecheck: Pyright.
- Dependency scan: pip-audit.
Go
- Format: gofmt.
- Lint/static analysis: golangci-lint (includes staticcheck).
- Dependency scan: govulncheck.
Rust
- Format: cargo fmt.
- Lint/static analysis: cargo clippy with warnings as errors.
- Dependency scan: cargo audit.
Java
- Format: Spotless + google-java-format.
- Lint/static analysis: Checkstyle + SpotBugs.
- Dependency scan: OWASP Dependency-Check.
Kotlin
- Format: Spotless + ktlint.
- Lint/static analysis: detekt.
- Compiler: enable warnings-as-errors in CI; if impractical, get explicit user approval before relaxing.
C#
- Format: dotnet format (verify-no-changes in CI).
- Lint/static analysis: enable .NET analyzers; treat warnings as errors; enable nullable reference types.
- Dependency scan:
dotnet list package --vulnerable.
C++
- Format: clang-format.
- Lint/static analysis: clang-tidy.
- Build: enable strong warnings and treat as errors; run sanitizers (ASan/UBSan) in CI where supported.
PowerShell
- Format+lint: PSScriptAnalyzer (Invoke-Formatter + Invoke-ScriptAnalyzer).
- Runtime: Set-StrictMode -Version Latest; fail fast on errors.
- Tests: Pester when tests exist.
- Enforce PSScriptAnalyzer via the repo’s standard
verifycommand/script when PowerShell is used; treat findings as errors.
Shell (sh/bash)
- Format: shfmt.
- Lint: shellcheck.
Dockerfile
- Lint: hadolint.
Terraform
- Format: terraform fmt -check.
- Validate: terraform validate.
- Lint: tflint.
- Security scan: trivy config.
YAML
- Lint: yamllint.
Markdown
- Lint: markdownlint.
Design and visual accessibility automation
Apply this section to projects with web UI components only.
- Enforce automated visual accessibility checks as part of the repo-standard
verifycommand and CI. - Use route discovery (sitemap, generated route lists, or framework route manifests) so newly added pages are automatically included.
- Validate both light and dark themes when theme switching is supported.
- Validate at least default, hover, and focus states for interactive elements.
- Enforce non-text boundary contrast checks across all visible UI elements that present boundaries (including interactive controls and container-like elements), not only predefined component classes.
- Use broad DOM discovery with only minimal technical exclusions (hidden/zero-size/non-rendered nodes).
- Fail CI on violations; do not silently ignore design regressions.
- If temporary exclusions are unavoidable, keep them narrowly scoped, documented with rationale, and remove them promptly.
Security baseline
- Require dependency vulnerability scanning appropriate to the ecosystem (SCA) for merges. If unavailable, report the limitation and get explicit user approval.
- Enable GitHub secret scanning and remediate findings; never commit secrets. If unavailable, add a repo-local secret scanner.
- Enable CodeQL code scanning for supported languages. If unavailable, use the best alternative for that ecosystem.