Review existing code, diffs, branches, or pull requests using concern-specific reviewer personas and evidence. Use when auditing someone else's work, triaging risk in a PR, or producing a ship-it / needs-review / blocked verdict. Do not use to verify your own completed change; use `verify` for that.
98
100%
Does it follow best practices?
Impact
92%
1.31xAverage score across 3 eval scenarios
Passed
No known issues
Review existing code with independent lenses before deciding whether it is safe to ship.
AGENTS.md, CLAUDE.md, or repo rulesverifyverifyagent-readinessdocsAGENTS.md, CLAUDE.md, or repo rules, when presentDefault personas:
Add conditional personas only when they earn their keep:
Review the requested code, but inspect adjacent behavior when the risk leaks past the named diff.
Use parallel subagents when available. Keep each persona concern-focused and independent.
Concrete starting points:
git diff --stat <base>...HEAD to size the changegit diff <base>...HEAD -- <path> to inspect risky filespnpm test path/to/spec when behavior claims need proofProduce one clear outcome:
ship itneeds reviewblockedOrder findings by severity. If no findings are discovered, say that explicitly and mention any residual risk or testing gap.
After review, report:
verify, agent-readiness, or docsExample:
verdict: needs review
scope reviewed: feature/auth-session branch
reviewer personas: general, tests, silent-failures
finding: high — src/auth/session.ts:42 fallback returns an anonymous session when token parsing fails
evidence: targeted test passes only for valid tokens; no failure-path coverage covers malformed headers
recommended follow-up: implementation