second-opinion
Independent code review from external LLMs (OpenAI Codex or Google Gemini CLI) on uncommitted changes, branch diffs, or specific commits.
- Supports two review engines: OpenAI Codex CLI (gpt-5.3-codex with structured JSON output) and Google Gemini CLI (gemini-3.1-pro-preview with code-review extension)
- Collects review scope (uncommitted, branch diff, or specific commit), optional project context file (CLAUDE.md or AGENTS.md), and focus area (general, security, performance, or error handling) via interactive questions
- Runs both tools in parallel when selected, with diff preview and large-diff warnings before execution
- Skips dependency scanning unless security focus is selected and dependency files are in the diff, avoiding unnecessary overhead
Second Opinion
Shell out to external LLM CLIs for an independent code review powered by a separate model. Supports OpenAI Codex CLI and Google Gemini CLI.
When to Use
- Getting a second opinion on code changes from a different model
- Reviewing branch diffs before opening a PR
- Checking uncommitted work for issues before committing
- Running a focused review (security, performance, error handling)
- Comparing review output from multiple models
When NOT to Use
- Neither Codex CLI nor Gemini CLI is installed
- No API key or subscription configured for either tool
- Reviewing non-code files (documentation, config)
- You want Claude's own review (just ask Claude directly)
More from trailofbits/skills
ask-questions-if-underspecified
Clarify requirements before implementing. Use when serious doubts arise.
4.2Ksemgrep
>-
3.8Kmodern-python
Configures Python projects with modern tooling (uv, ruff, ty). Use when creating projects, writing standalone scripts, or migrating from pip/Poetry/mypy/black.
3.8Kcodeql
>-
3.6Kinsecure-defaults
Detects fail-open insecure defaults (hardcoded secrets, weak auth, permissive security) that allow apps to run insecurely in production. Use when auditing security, reviewing config management, or analyzing environment variable handling.
3.5Ksecure-workflow-guide
Guides through Trail of Bits' 5-step secure development workflow. Runs Slither scans, checks special features (upgradeability/ERC conformance/token integration), generates visual security diagrams, helps document security properties for fuzzing/verification, and reviews manual security areas.
3.4K