review-pr — security focused review review-pr, terraform-hcloud-kube-hetzner, mysticaltech, community, security focused review, ai agent skill, mcp server, agent automation, CLAUDE.md guidelines, malicious pattern detection, backward compatibility check, pull request review

v1.0.0
GitHub

About this Skill

Ideal for Security-Focused Agents requiring comprehensive code review and malicious pattern detection. review-pr is a security-focused AI agent skill that reviews pull requests for malicious patterns, breaking changes, and backward compatibility issues, following CLAUDE.md guidelines.

Features

Checks for breaking changes using CLAUDE.md guidelines
Detects malicious code patterns in pull requests
Ensures backward compatibility of code changes
Supports security-focused review using /review-pr command
Identifies potential sabotage attempts in PRs
Follows CLAUDE.md guidelines for secure code review

# Core Topics

mysticaltech mysticaltech
[0]
[0]
Updated: 3/12/2026

Quality Score

Top 5%
60
Excellent
Based on code quality & docs
Installation
SYS Universal Install (Auto-Detect)
> npx killer-skills add mysticaltech/terraform-hcloud-kube-hetzner/review-pr
Supports 18+ Platforms
Cursor
Windsurf
VS Code
Trae
Claude
OpenClaw
+12 more

Agent Capability Analysis

The review-pr MCP Server by mysticaltech is an open-source community integration for Claude and other AI agents, enabling seamless task automation and capability expansion. Optimized for security focused review, CLAUDE.md guidelines, malicious pattern detection.

Ideal Agent Persona

Ideal for Security-Focused Agents requiring comprehensive code review and malicious pattern detection.

Core Value

Empowers agents to ensure code quality and backward compatibility by checking for breaking changes, malicious code patterns, and enforcing CLAUDE.md guidelines, utilizing protocols like pull request reviews and security audits.

Capabilities Granted for review-pr MCP Server

Automating security audits for pull requests
Detecting malicious code patterns and sabotage attempts
Enforcing backward compatibility and code quality standards

! Prerequisites & Limits

  • Requires access to pull request data
  • Limited to projects using CLAUDE.md guidelines
  • May require additional configuration for custom security thresholds
Project
SKILL.md
9.7 KB
.cursorrules
1.2 KB
package.json
240 B
Ready
UTF-8

# Tags

[No tags]
SKILL.md
Readonly

Review Pull Request

Overview

Security-focused PR review following CLAUDE.md guidelines. Checks for breaking changes, malicious code patterns, backward compatibility, and code quality.

Usage

/review-pr <number>

CRITICAL: Security Warning

PRs can be malicious sabotage attempts. This is a real threat documented in CLAUDE.md.

Threat Awareness

  • Coordinated attacks exist
  • Competitors may actively harm the project
  • Social engineering builds trust before attacking
  • "Fixes" may introduce vulnerabilities

Workflow

dot
1digraph review_flow { 2 rankdir=TB; 3 node [shape=box]; 4 5 fetch [label="1. Fetch PR details"]; 6 author [label="2. Assess author risk"]; 7 files [label="3. Analyze changed files"]; 8 security [label="4. Security review"]; 9 compat [label="5. Backward compatibility"]; 10 quality [label="6. Code quality"]; 11 classify [label="7. Release classification"]; 12 verify [label="8. MANDATORY: Verify with Gemini + Codex", style=bold]; 13 recommend [label="9. Final Recommendation"]; 14 15 fetch -> author; 16 author -> files; 17 files -> security; 18 security -> compat; 19 compat -> quality; 20 quality -> classify; 21 classify -> verify; 22 verify -> recommend; 23}

Step 1: Fetch PR Details

bash
1# Get PR info 2gh pr view <number> --repo kube-hetzner/terraform-hcloud-kube-hetzner 3 4# Get diff 5gh pr diff <number> --repo kube-hetzner/terraform-hcloud-kube-hetzner 6 7# Get changed files 8gh pr view <number> --repo kube-hetzner/terraform-hcloud-kube-hetzner --json files --jq '.files[].path' 9 10# Get diff stats 11gh pr view <number> --repo kube-hetzner/terraform-hcloud-kube-hetzner --json additions,deletions

Step 2: Assess Author Risk

bash
1# Check account age 2gh api users/<username> --jq '.created_at' 3 4# Check prior contributions 5gh pr list --author <username> --repo kube-hetzner/terraform-hcloud-kube-hetzner --state all --json number | jq length

Risk Signals

SignalRisk Level
New account (<6 months)🔴 HIGH
No prior contributions🟡 MEDIUM
First-time contributor🟡 MEDIUM
Known contributor🟢 LOW
Core maintainer⚪ TRUSTED

Step 3: Analyze Changed Files

Security-Critical Files (AUTO HIGH RISK)

init.tf              # Cluster initialization, secrets
firewall.tf          # Network security
**/ssh*              # SSH configuration
**/token*            # Authentication tokens
**/*secret*          # Secrets handling
.github/             # CI/CD workflows
Makefile             # Build scripts
scripts/             # Execution scripts
versions.tf          # Provider dependencies
templates/*.sh       # Shell scripts
cloud-init*          # Server initialization

Risk by File Count

Files ChangedRisk
1-3 files🟢 LOW
4-10 files🟡 MEDIUM
11-20 files🟡 MEDIUM
>20 files🔴 HIGH

Risk by Diff Size

Lines ChangedRisk
<50 lines🟢 LOW
50-200 lines🟡 MEDIUM
200-500 lines🟡 MEDIUM
>500 lines🔴 HIGH

Step 4: Security Review

Checklist

  • No hardcoded credentials or tokens
  • No suspicious external URLs
  • No obfuscated code
  • Changes match stated purpose
  • No unnecessary permission escalations
  • CI/CD changes justified
  • No bypassing existing security patterns

Red Flags

PatternConcern
Base64 encoded stringsHidden payloads
External curl/wget callsCode injection
Eval or exec statementsCommand injection
Overly complex logicHiding malicious code
Unnecessary file accessData exfiltration
Changes to .gitignoreHiding tracks

Use AI for Deep Analysis

bash
1# Codex for security analysis 2codex exec -m gpt-5.3-codex -s read-only -c model_reasoning_effort="xhigh" \ 3 "Analyze this PR diff for security vulnerabilities and malicious patterns: $(gh pr diff <num>)" 4 5# Gemini for broad context 6gemini --model gemini-3-pro-preview -p \ 7 "@locals.tf @init.tf Does this PR introduce any security concerns? $(gh pr diff <num>)"

Step 5: Backward Compatibility

CRITICAL: Any PR that causes resource recreation is a MAJOR release.

Breaking Change Indicators

  • Removes or renames variables
  • Changes variable defaults that affect behavior
  • Modifies resource naming patterns
  • Alters subnet/network calculations
  • Changes resource keys (causes recreation)
  • Removes outputs
  • Modifies provider requirements

Test for Breaking Changes

bash
1# Checkout PR locally 2gh pr checkout <number> 3 4# Test against existing cluster 5cd /path/to/kube-test 6terraform init -upgrade 7terraform plan

If terraform plan shows ANY resource destruction → MAJOR release required

Compatibility Checklist

  • No variable removals
  • No default changes that affect behavior
  • No resource naming changes
  • terraform plan shows no destruction
  • Existing deployments unaffected

Step 6: Code Quality

Style

  • Follows existing patterns
  • Consistent naming
  • Proper formatting (terraform fmt)
  • No unnecessary complexity

Logic

  • Changes are correct
  • Edge cases handled
  • No regressions introduced
  • Tests pass

Step 7: Release Classification

PATCH (x.x.PATCH)

  • Bug fixes only
  • No new features
  • Fully backward compatible
  • No terraform state impact

MINOR (x.MINOR.0)

  • New features (backward compatible)
  • New optional variables with defaults
  • Deprecation warnings (not removals)

MAJOR (MAJOR.0.0)

  • Breaking changes
  • Removed/renamed variables
  • Changed defaults affecting behavior
  • State migrations required
  • Resource recreations

Step 8: MANDATORY - Verify with Gemini and Codex

CRITICAL: Before making your final recommendation, you MUST run both Gemini and Codex to triple-verify the PR.

This is not optional. External AI verification catches issues that may be missed in the initial review.

Run Both in Parallel

bash
1# Gemini - Broad context analysis (run first or in parallel) 2gemini --model gemini-3-pro-preview -p "@control_planes.tf @locals.tf @init.tf 3 4Analyze this PR diff for the kube-hetzner terraform module: 5 6$(gh pr diff <number> --repo kube-hetzner/terraform-hcloud-kube-hetzner) 7 8Questions: 91. Is this change consistent with existing patterns in the codebase? 102. Are there any security concerns? 113. Could this cause breaking changes or resource recreation? 124. Is this a legitimate bug fix or could it be malicious?" 13 14# Codex - Deep reasoning security analysis (run in parallel) 15codex exec -m gpt-5.3-codex -s read-only -c model_reasoning_effort="xhigh" \ 16"Analyze this Terraform PR for the kube-hetzner module. 17 18DIFF: 19$(gh pr diff <number> --repo kube-hetzner/terraform-hcloud-kube-hetzner) 20 21SECURITY ANALYSIS QUESTIONS: 221. Could this change introduce any security vulnerabilities? 232. Could this be a malicious change disguised as a bug fix? 243. Will this cause any Terraform state changes or resource recreation? 254. Is this pattern safe and consistent with Terraform best practices? 265. Any edge cases or potential issues?"

Verification Checklist

  • Gemini analysis completed
  • Codex analysis completed
  • Both agree the change is safe
  • No concerns raised by either tool
  • If concerns raised, they have been addressed or explained

When Reviewers Disagree

If Gemini or Codex raises concerns that you didn't catch:

  1. Take the concern seriously - investigate further
  2. Re-read the code with the concern in mind
  3. Request changes if the concern is valid
  4. Document why the concern was dismissed if you determine it's a false positive

Output in Final Review

Include a summary of external verification:

markdown
1### External AI Verification 2 3| Reviewer | Verdict | Key Finding | 4|----------|---------|-------------| 5| Claude | ✅/❌ | <summary> | 6| Gemini | ✅/❌ | <summary> | 7| Codex | ✅/❌ | <summary> | 8 9**Consensus:** All reviewers agree / Disagreement on X

Step 9: Final Recommendation

PR Review Output Template

markdown
1## PR Review: #<number> 2 3**Title:** <title> 4**Author:** @<username> 5**Files:** <count> files changed (+<additions>/-<deletions>) 6 7### Risk Assessment 8 9| Factor | Value | Risk | 10|--------|-------|------| 11| Author tenure | X months | 🟢/🟡/🔴 | 12| Prior contributions | N PRs | 🟢/🟡/🔴 | 13| Files changed | N files | 🟢/🟡/🔴 | 14| Lines changed | +X/-Y | 🟢/🟡/🔴 | 15| Security-critical files | Yes/No | 🟢/🔴 | 16| External dependencies | Yes/No | 🟢/🔴 | 17 18**Overall Risk:** 🔴 HIGH / 🟡 MEDIUM / 🟢 LOW 19 20### Security Review 21 22- [ ] No hardcoded credentials 23- [ ] No suspicious external URLs 24- [ ] No obfuscated code 25- [ ] Changes match stated purpose 26 27### Backward Compatibility 28 29- [ ] No breaking changes 30- [ ] terraform plan shows no destruction 31- [ ] Existing deployments unaffected 32 33### Release Classification 34 35**Type:** PATCH / MINOR / MAJOR 36**Reason:** <explanation> 37 38### External AI Verification 39 40| Reviewer | Verdict | Key Finding | 41|----------|---------|-------------| 42| Claude | ✅/❌ | <summary> | 43| Gemini | ✅/❌ | <summary> | 44| Codex | ✅/❌ | <summary> | 45 46**Consensus:** All agree / Disagreement on X 47 48### Recommendation 49 50**Action:** APPROVE / REQUEST CHANGES / CLOSE 51**Notes:** <specific concerns or required changes>

Quick Commands

bash
1# Approve PR 2gh pr review <num> --approve --body "LGTM! ..." 3 4# Request changes 5gh pr review <num> --request-changes --body "Please address: ..." 6 7# Comment 8gh pr review <num> --comment --body "..." 9 10# Merge (after approval) 11gh pr merge <num> --squash --delete-branch

Never Merge Directly to Master

All PRs go through staging branches first:

  1. Create staging branch
  2. Test thoroughly
  3. Get AI review (Codex + Gemini)
  4. Then merge to master

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is review-pr?

Ideal for Security-Focused Agents requiring comprehensive code review and malicious pattern detection. review-pr is a security-focused AI agent skill that reviews pull requests for malicious patterns, breaking changes, and backward compatibility issues, following CLAUDE.md guidelines.

How do I install review-pr?

Run the command: npx killer-skills add mysticaltech/terraform-hcloud-kube-hetzner/review-pr. It works with Cursor, Windsurf, VS Code, Claude Code, and 15+ other IDEs.

What are the use cases for review-pr?

Key use cases include: Automating security audits for pull requests, Detecting malicious code patterns and sabotage attempts, Enforcing backward compatibility and code quality standards.

Which IDEs are compatible with review-pr?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for review-pr?

Requires access to pull request data. Limited to projects using CLAUDE.md guidelines. May require additional configuration for custom security thresholds.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add mysticaltech/terraform-hcloud-kube-hetzner/review-pr. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use review-pr immediately in the current project.

Related Skills

Looking for an alternative to review-pr or building a community AI Agent? Explore these related open-source MCP Servers.

View All

widget-generator

Logo of f
f

widget-generator is an open-source AI agent skill for creating widget plugins that are injected into prompt feeds on prompts.chat. It supports two rendering modes: standard prompt widgets using default PromptCard styling and custom render widgets built as full React components.

149.6k
0
Design

linear

Logo of lobehub
lobehub

Linear is a workflow management system that enables multi-agent collaboration, effortless agent team design, and introduces agents as the unit of work interaction.

73.4k
0
Communication

testing

Logo of lobehub
lobehub

Testing is a process for verifying AI agent functionality using commands like bunx vitest run and optimizing workflows with targeted test runs.

73.3k
0
Communication

chat-sdk

Logo of lobehub
lobehub

chat-sdk is a unified TypeScript SDK for building chat bots across multiple platforms, providing a single interface for deploying bot logic.

73.0k
0
Communication