codex-code-review
Codex Code Review Loop
Overview
This skill orchestrates the complete remediation workflow for code under review by the codex agent. It handles:
- Requesting reviews from codex using the
codex --full-auto cCLI - Parsing review output to identify P0 (security/correctness), P1 (reliability), P2-P4 (quality) findings
- Remediating critical issues through up to 3 review-fix-review cycles
- Deferring quality improvements to backlog with implementation plans and
origin:ai-reviewlabels - Monorepo handling for selective file commits when working alongside other agents
- Circuit breaker escalation after 3 cycles if P0/P1 issues persist
When to Use
Trigger this skill when code requires codex review. Common usage patterns:
- "codex review this code" — Initiate review loop on current changes
- "run codex review on my changes" — Same as above
More from nickcrew/claude-ctx-plugin
react-performance-optimization
React performance optimization patterns using memoization, code splitting, and efficient rendering strategies. Use when optimizing slow React applications, reducing bundle size, or improving user experience with large datasets.
1.2Kowasp-top-10
OWASP Top 10 security vulnerabilities with detection and remediation patterns. Use when conducting security audits, implementing secure coding practices, or reviewing code for common security vulnerabilities.
453ui-design-aesthetics
Generates high-quality, non-generic UI designs with a focus on performance, progressive disclosure, and distinctive aesthetics.
114helm-chart-patterns
Helm chart development patterns for packaging and deploying Kubernetes applications. Use when creating reusable Helm charts, managing multi-environment deployments, or building application catalogs for Kubernetes.
110code-explanation
Use when explaining code, concepts, or system behavior to a specific audience level - provides a structured explanation workflow with depth control and validation steps.
103security-testing-patterns
Security testing patterns including SAST, DAST, penetration testing, and vulnerability assessment techniques. Use when implementing security testing pipelines, conducting security audits, or validating application security controls.
91