fxa-review-quick — community fxa-review-quick, community, ide skills

v1.0.0

关于此技能

非常适合需要高级 Git 和 FXA 特定知识的代码审查代理进行全面内容分析。 Monorepo for Mozilla Accounts (formerly Firefox Accounts)

mozilla mozilla
[669]
[226]
更新于: 3/25/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 8/11

This page remains useful for teams, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution Quality floor passed for review
Review Score
8/11
Quality Score
65
Canonical Locale
en
Detected Body Locale
en

非常适合需要高级 Git 和 FXA 特定知识的代码审查代理进行全面内容分析。 Monorepo for Mozilla Accounts (formerly Firefox Accounts)

核心价值

赋予代理使用 FXA 特定镜头审查提交,优先考虑安全性、约定、逻辑和测试,并利用 Git 命令(如 `git show` 和 `git stat`)检查更改的文件及其上下文。

适用 Agent 类型

非常适合需要高级 Git 和 FXA 特定知识的代码审查代理进行全面内容分析。

赋予的主要能力 · fxa-review-quick

自动化 Mozilla 账户的代码审查
评估提交的安全性和 FXA 约定
调试 FXA 代码库中的逻辑和错误问题

! 使用限制与门槛

  • 需要 Git 仓库访问
  • 仅限 FXA 特定知识和约定
  • 需要 `$ARGUMENTS` 输入以引用提交

Why this page is reference-only

  • - Current locale does not satisfy the locale-governance contract.

Source Boundary

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

评审后的下一步

先决定动作,再继续看上游仓库材料

Killer-Skills 的主价值不应该停在“帮你打开仓库说明”,而是先帮你判断这项技能是否值得安装、是否应该回到可信集合复核,以及是否已经进入工作流落地阶段。

实验室 Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

常见问题与安装步骤

以下问题与步骤与页面结构化数据保持一致,便于搜索引擎理解页面内容。

? FAQ

fxa-review-quick 是什么?

非常适合需要高级 Git 和 FXA 特定知识的代码审查代理进行全面内容分析。 Monorepo for Mozilla Accounts (formerly Firefox Accounts)

如何安装 fxa-review-quick?

运行命令:npx killer-skills add mozilla/fxa/fxa-review-quick。支持 Cursor、Windsurf、VS Code、Claude Code 等 19+ IDE/Agent。

fxa-review-quick 适用于哪些场景?

典型场景包括:自动化 Mozilla 账户的代码审查、评估提交的安全性和 FXA 约定、调试 FXA 代码库中的逻辑和错误问题。

fxa-review-quick 支持哪些 IDE 或 Agent?

该技能兼容 Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer。可使用 Killer-Skills CLI 一条命令通用安装。

fxa-review-quick 有哪些限制?

需要 Git 仓库访问;仅限 FXA 特定知识和约定;需要 `$ARGUMENTS` 输入以引用提交。

安装步骤

  1. 1. 打开终端

    在你的项目目录中打开终端或命令行。

  2. 2. 执行安装命令

    运行:npx killer-skills add mozilla/fxa/fxa-review-quick。CLI 会自动识别 IDE 或 AI Agent 并完成配置。

  3. 3. 开始使用技能

    fxa-review-quick 已启用,可立即在当前项目中调用。

! 参考页模式

此页面仍可作为安装与查阅参考,但 Killer-Skills 不再把它视为主要可索引落地页。请优先阅读上方评审结论,再决定是否继续查看上游仓库说明。

Upstream Repository Material

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Upstream Source

fxa-review-quick

安装 fxa-review-quick,这是一款面向AI agent workflows and automation的 AI Agent Skill。查看评审结论、使用场景与安装路径。

SKILL.md
Readonly
Upstream Repository Material
The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.
Supporting Evidence

FXA Quick Review

Review the most recent commit (or the commit specified in $ARGUMENTS) in a single pass, using FXA-specific knowledge.

Step 1: Get Commit Info

bash
1COMMIT_REF="${ARGUMENTS:-HEAD}" 2git show "$COMMIT_REF" --format="%H%n%an%n%ae%n%s%n%b"
bash
1COMMIT_REF="${ARGUMENTS:-HEAD}" 2git show --stat "$COMMIT_REF"

Step 2: Read Changed Files

Use Read and Grep to examine the changed files and their surrounding context. Look at imports, callers, and related types to understand the full picture before judging.

Step 3: Review

Evaluate the diff through these lenses, in order of priority:

1. Security

  • Hardcoded secrets, injection (SQL/XSS/command), missing input validation, auth bypasses
  • Sensitive data in logs or error messages (PII: emails, UIDs, tokens) — note: UIDs and emails in API response bodies are expected, focus on logs and error messages
  • Missing rate limiting on new public endpoints
  • Session token handling that bypasses established Hapi auth schemes
  • New endpoints missing Content-Type validation
  • User-controlled input passed to Redis keys without prefix/namespace

2. FXA Conventions

  • Raw Error thrown in route handlers instead of AppError from @fxa/accounts/errors
  • console.log instead of the log object (mozlog format)
  • Cross-package imports using relative paths instead of @fxa/<domain>/<package> aliases
  • Circular or bi-directional dependencies between packages/libs — breaks build ordering
  • Auth-server code importing from fxa-auth-server/** (ESLint blocks this)
  • New code added to legacy packages (fxa-content-server, fxa-payments-server) — should be in fxa-settings or SubPlat 3.0
  • No new GraphQL — fxa-graphql-api was removed, admin-server GraphQL is legacy. Exception: CMS-related GraphQL.
  • Hardcoded values that should come from Convict config
  • New require() in .ts files — use import instead. Existing CJS patterns in auth-server .js files are fine.
  • Missing MPL-2.0 license header on new files
  • Prefer async/await over .then() promise chains
  • Flag new Container.get()/Container.set() usage — linting rules to disallow these are coming

3. Logic & Bugs

  • Missing await on async calls — note: some fire-and-forget patterns (metrics, logging) are intentional, check context before flagging
  • Null/undefined mishandling
  • Race conditions, shared mutable state
  • Swallowed errors (empty catch blocks, catch-and-rethrow without context)
  • Off-by-one, wrong comparisons, missing break/return in switch
  • Hapi route handlers that catch and re-throw instead of letting the error pipeline handle it

4. Tests

  • New auth-server source files without co-located *.spec.ts; fxa-settings uses *.test.tsx convention
  • jest.clearAllMocks() in beforeEach — unnecessary, clearMocks: true is global
  • proxyquire in new test code — should use jest.mock()
  • New Mocha tests in test/local/ or test/remote/ — new tests must be Jest
  • Over-mocked tests that only test mock wiring
  • Prefer jest.useFakeTimers() and jest.setSystemTime() over setTimeout or mocking Date.now directly
  • Flag patterns likely to cause open handle warnings (unclosed connections, uncleared timers)
  • Flag missing act() wrapping in React test state updates

5. Database Migrations

  • Edits to existing published migration files — CRITICAL, never allowed
  • New migration without corresponding rollback file
  • Verify test DB patches are aligned with current test DB state (/fxa-shared/test/db/models/**/*.sql)
  • DELETE/UPDATE without WHERE clause
  • ALTER TABLE on large tables without online DDL consideration
  • Index changes bundled with schema changes — should be separate migrations
  • Data type changes that could truncate data

6. Migration Direction

  • Mocha → Jest (no new Mocha tests)
  • proxyquirejest.mock()
  • Callbacks → async/await
  • fxa-sharedlibs/* (migration in progress, check both locations for existing code before adding new)

7. AI Slop Detection

  • Overly verbose or obvious comments that describe what the code does, not why
  • Unnecessary abstractions or helper functions for one-time operations
  • Excessive error handling for scenarios that cannot happen
  • Redundant validation or fallbacks that duplicate framework guarantees
  • Generic variable names or boilerplate patterns that suggest auto-generated code

Step 4: Output

Commit Summary

Commit: hash Author: name Message: commit message Files Changed: count

Changes Overview

Write a brief summary of what the commit does based on the diff. Do not repeat the commit message.

Issues Found

Use a table with columns: #, Severity, Category, File, Line, Issue, Recommendation.

Severity definitions:

  • CRITICAL — security vulnerabilities, data loss, auth bypasses, editing published migrations. Must fix.
  • HIGH — bugs that will cause production issues, missing auth schemes on routes. Should fix.
  • MEDIUM — convention violations, code quality, moderate risk. Consider fixing.
  • LOW — style, minor improvements. Optional.

If no issues are found, skip the table and write: "No issues found."

Verdict

Recommendation: APPROVE, REQUEST CHANGES, or NEEDS DISCUSSION.

Include blocking issue count (CRITICAL + HIGH) and total issue count.

If clean: "This commit is ready to merge." If not: "Please address the CRITICAL and HIGH issues before merging."

Guidelines

  • Be pragmatic, not pedantic. Flag real problems, not style preferences.
  • Consider the context — read surrounding code before flagging something.
  • Do not flag missing tests for trivial changes (config values, enum additions, comment updates).
  • One or two missing edge-case tests is MEDIUM at most, not HIGH.
  • Always explain WHY something is a problem, not just what.
  • If the commit is clean, say so clearly and approve. A short review is a good review.

相关技能

寻找 fxa-review-quick 的替代方案 (Alternative) 或可搭配使用的同类 community Skill?探索以下相关开源技能。

查看全部

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

333.8k
0
AI

widget-generator

Logo of f
f

为prompts.chat的信息反馈系统生成可定制的插件小部件

149.6k
0
AI

flags

Logo of vercel
vercel

React 框架

138.4k
0
浏览器

pr-review

Logo of pytorch
pytorch

Python中具有强大GPU加速的张量和动态神经网络

98.6k
0
开发者工具