KS
Killer-Skills

plankton-code-quality — plankton-code-quality setup plankton-code-quality setup, write-time code enforcement, PostToolUse hooks integration, Claude-powered code fixes, real-time linting formatting, plankton-code-quality vs pre-commit hooks, how to use plankton-code-quality, AI-assisted code quality tool, developer workflow code enforcement, plankton-code-quality install guide

Verified
v1.0.0
GitHub

About this Skill

Ideal for Code Generation Agents requiring real-time quality enforcement and automated fix workflows. Plankton-code-quality is a write-time code quality enforcement system that integrates formatting, linting, and Claude-powered fixes directly into developer workflows via PostToolUse hooks. It automatically processes code modifications and applies corrections through AI-assisted subprocesses.

Features

Real-time code formatting on file edits via PostToolUse hooks
Integrated linter execution with automatic violation detection
Claude subprocess spawning for AI-powered code corrections
Write-time quality enforcement (not just commit-time)
Defense against agents modifying linter configs instead of fixing code

# Core Topics

affaan-m affaan-m
[62.0k]
[7678]
Updated: 3/6/2026

Quality Score

Top 5%
89
Excellent
Based on code quality & docs
Installation
SYS Universal Install (Auto-Detect)
Cursor IDE Windsurf IDE VS Code IDE
> npx killer-skills add affaan-m/everything-claude-code/plankton-code-quality

Agent Capability Analysis

The plankton-code-quality MCP Server by affaan-m is an open-source Categories.official integration for Claude and other AI agents, enabling seamless task automation and capability expansion. Optimized for plankton-code-quality setup, write-time code enforcement, PostToolUse hooks integration.

Ideal Agent Persona

Ideal for Code Generation Agents requiring real-time quality enforcement and automated fix workflows.

Core Value

Enables write-time code quality enforcement through automated formatting, linting, and Claude-powered fixes triggered on every file edit via PostToolUse hooks. Provides defense against agents modifying linter configs instead of fixing actual code violations.

Capabilities Granted for plankton-code-quality MCP Server

Enforcing code style consistency during generation
Automating violation fixes via Claude subprocesses
Preventing config manipulation by quality-checking agents
Maintaining quality standards on every file edit

! Prerequisites & Limits

  • Requires integration with PostToolUse hooks
  • Depends on Claude subprocess availability
  • Limited to file edit triggers rather than continuous monitoring
Project
SKILL.md
7.6 KB
.cursorrules
1.2 KB
package.json
240 B
Ready
UTF-8
SKILL.md
Readonly

Plankton Code Quality Skill

Integration reference for Plankton (credit: @alxfazio), a write-time code quality enforcement system for Claude Code. Plankton runs formatters and linters on every file edit via PostToolUse hooks, then spawns Claude subprocesses to fix violations the agent didn't catch.

When to Use

  • You want automatic formatting and linting on every file edit (not just at commit time)
  • You need defense against agents modifying linter configs to pass instead of fixing code
  • You want tiered model routing for fixes (Haiku for simple style, Sonnet for logic, Opus for types)
  • You work with multiple languages (Python, TypeScript, Shell, YAML, JSON, TOML, Markdown, Dockerfile)

How It Works

Three-Phase Architecture

Every time Claude Code edits or writes a file, Plankton's multi_linter.sh PostToolUse hook runs:

Phase 1: Auto-Format (Silent)
├─ Runs formatters (ruff format, biome, shfmt, taplo, markdownlint)
├─ Fixes 40-50% of issues silently
└─ No output to main agent

Phase 2: Collect Violations (JSON)
├─ Runs linters and collects unfixable violations
├─ Returns structured JSON: {line, column, code, message, linter}
└─ Still no output to main agent

Phase 3: Delegate + Verify
├─ Spawns claude -p subprocess with violations JSON
├─ Routes to model tier based on violation complexity:
│   ├─ Haiku: formatting, imports, style (E/W/F codes) — 120s timeout
│   ├─ Sonnet: complexity, refactoring (C901, PLR codes) — 300s timeout
│   └─ Opus: type system, deep reasoning (unresolved-attribute) — 600s timeout
├─ Re-runs Phase 1+2 to verify fixes
└─ Exit 0 if clean, Exit 2 if violations remain (reported to main agent)

What the Main Agent Sees

ScenarioAgent seesHook exit
No violationsNothing0
All fixed by subprocessNothing0
Violations remain after subprocess[hook] N violation(s) remain2
Advisory (duplicates, old tooling)[hook:advisory] ...0

The main agent only sees issues the subprocess couldn't fix. Most quality problems are resolved transparently.

Config Protection (Defense Against Rule-Gaming)

LLMs will modify .ruff.toml or biome.json to disable rules rather than fix code. Plankton blocks this with three layers:

  1. PreToolUse hookprotect_linter_configs.sh blocks edits to all linter configs before they happen
  2. Stop hookstop_config_guardian.sh detects config changes via git diff at session end
  3. Protected files list.ruff.toml, biome.json, .shellcheckrc, .yamllint, .hadolint.yaml, and more

Package Manager Enforcement

A PreToolUse hook on Bash blocks legacy package managers:

  • pip, pip3, poetry, pipenv → Blocked (use uv)
  • npm, yarn, pnpm → Blocked (use bun)
  • Allowed exceptions: npm audit, npm view, npm publish

Setup

Quick Start

bash
1# Clone Plankton into your project (or a shared location) 2# Note: Plankton is by @alxfazio 3git clone https://github.com/alexfazio/plankton.git 4cd plankton 5 6# Install core dependencies 7brew install jaq ruff uv 8 9# Install Python linters 10uv sync --all-extras 11 12# Start Claude Code — hooks activate automatically 13claude

No install command, no plugin config. The hooks in .claude/settings.json are picked up automatically when you run Claude Code in the Plankton directory.

Per-Project Integration

To use Plankton hooks in your own project:

  1. Copy .claude/hooks/ directory to your project
  2. Copy .claude/settings.json hook configuration
  3. Copy linter config files (.ruff.toml, biome.json, etc.)
  4. Install the linters for your languages

Language-Specific Dependencies

LanguageRequiredOptional
Pythonruff, uvty (types), vulture (dead code), bandit (security)
TypeScript/JSbiomeoxlint, semgrep, knip (dead exports)
Shellshellcheck, shfmt
YAMLyamllint
Markdownmarkdownlint-cli2
Dockerfilehadolint (>= 2.12.0)
TOMLtaplo
JSONjaq

Pairing with ECC

Complementary, Not Overlapping

ConcernECCPlankton
Code quality enforcementPostToolUse hooks (Prettier, tsc)PostToolUse hooks (20+ linters + subprocess fixes)
Security scanningAgentShield, security-reviewer agentBandit (Python), Semgrep (TypeScript)
Config protectionPreToolUse blocks + Stop hook detection
Package managerDetection + setupEnforcement (blocks legacy PMs)
CI integrationPre-commit hooks for git
Model routingManual (/model opus)Automatic (violation complexity → tier)

Recommended Combination

  1. Install ECC as your plugin (agents, skills, commands, rules)
  2. Add Plankton hooks for write-time quality enforcement
  3. Use AgentShield for security audits
  4. Use ECC's verification-loop as a final gate before PRs

Avoiding Hook Conflicts

If running both ECC and Plankton hooks:

  • ECC's Prettier hook and Plankton's biome formatter may conflict on JS/TS files
  • Resolution: disable ECC's Prettier PostToolUse hook when using Plankton (Plankton's biome is more comprehensive)
  • Both can coexist on different file types (ECC handles what Plankton doesn't cover)

Configuration Reference

Plankton's .claude/hooks/config.json controls all behavior:

json
1{ 2 "languages": { 3 "python": true, 4 "shell": true, 5 "yaml": true, 6 "json": true, 7 "toml": true, 8 "dockerfile": true, 9 "markdown": true, 10 "typescript": { 11 "enabled": true, 12 "js_runtime": "auto", 13 "biome_nursery": "warn", 14 "semgrep": true 15 } 16 }, 17 "phases": { 18 "auto_format": true, 19 "subprocess_delegation": true 20 }, 21 "subprocess": { 22 "tiers": { 23 "haiku": { "timeout": 120, "max_turns": 10 }, 24 "sonnet": { "timeout": 300, "max_turns": 10 }, 25 "opus": { "timeout": 600, "max_turns": 15 } 26 }, 27 "volume_threshold": 5 28 } 29}

Key settings:

  • Disable languages you don't use to speed up hooks
  • volume_threshold — violations > this count auto-escalate to a higher model tier
  • subprocess_delegation: false — skip Phase 3 entirely (just report violations)

Environment Overrides

VariablePurpose
HOOK_SKIP_SUBPROCESS=1Skip Phase 3, report violations directly
HOOK_SUBPROCESS_TIMEOUT=NOverride tier timeout
HOOK_DEBUG_MODEL=1Log model selection decisions
HOOK_SKIP_PM=1Bypass package manager enforcement

References

  • Plankton (credit: @alxfazio)
  • Plankton REFERENCE.md — Full architecture documentation (credit: @alxfazio)
  • Plankton SETUP.md — Detailed installation guide (credit: @alxfazio)

ECC v1.8 Additions

Copyable Hook Profile

Set strict quality behavior:

bash
1export ECC_HOOK_PROFILE=strict 2export ECC_QUALITY_GATE_FIX=true 3export ECC_QUALITY_GATE_STRICT=true

Language Gate Table

  • TypeScript/JavaScript: Biome preferred, Prettier fallback
  • Python: Ruff format/check
  • Go: gofmt

Config Tamper Guard

During quality enforcement, flag changes to config files in same iteration:

  • biome.json, .eslintrc*, prettier.config*, tsconfig.json, pyproject.toml

If config is changed to suppress violations, require explicit review before merge.

CI Integration Pattern

Use the same commands in CI as local hooks:

  1. run formatter checks
  2. run lint/type checks
  3. fail fast on strict mode
  4. publish remediation summary

Health Metrics

Track:

  • edits flagged by gates
  • average remediation time
  • repeat violations by category
  • merge blocks due to gate failures

Related Skills

Looking for an alternative to plankton-code-quality or building a Categories.official AI Agent? Explore these related open-source MCP Servers.

View All

flags

Logo of facebook
facebook

flags is a feature flag management system that enables developers to check flag states, compare channels, and debug feature behavior differences across release channels.

243.6k
0
Design

extract-errors

Logo of facebook
facebook

extract-errors is a skill that assists in extracting and managing error codes in React applications using yarn extract-errors command.

243.6k
0
Design

fix

Logo of facebook
facebook

fix is a technical skill that resolves lint errors, formatting issues, and ensures code quality in declarative, frontend, and UI projects

243.6k
0
Design

flow

Logo of facebook
facebook

Flow is a type checking system for JavaScript, used to validate React code and ensure consistency across applications

243.6k
0
Design