Parallel Review Implementation
Receive a work package diff as read-only input and produce structured findings conforming to
review-findings.schema.json
. Designed for vendor-diverse dispatch — runs independently per package.
Arguments
-
(e.g., "add-user-auth wp-backend")
Prerequisites
- Work package implementation is complete
- Package worktree has committed changes
- Work-queue result JSON is available
Input (Read-Only)
The reviewer receives per-package context:
- Package definition from (scope, locks, verification)
- Contract artifacts from relevant to this package
- Git diff of all files modified by this package ()
- Work-queue result JSON (verification results, files_modified, escalations)
- Spec requirements traced to this package via
The reviewer MUST NOT modify any files.
Steps
1. Load Review Context
Parse the package-id argument and load:
- Read and extract the target package definition
- Read relevant contract artifacts (OpenAPI, DB schema, event schemas)
- Read the git diff for this package's worktree
- Read the work-queue result JSON (if available)
- Read traced requirements from
2. Scope Verification
Before reviewing code quality, verify scope compliance:
If scope violations are found, emit a
finding with
criticality.
3. Contract Compliance Review
Check that the implementation matches declared contracts:
For Backend Packages
For Frontend Packages
4. Code Quality Review
Standard code review criteria:
5. Verification Result Cross-Check
If work-queue result is available:
6. Produce Findings
Generate findings as JSON conforming to
review-findings.schema.json
:
json
{
"review_type": "implementation",
"target": "<package-id>",
"reviewer_vendor": "<model-name>",
"findings": [
{
"id": 1,
"type": "contract_mismatch",
"criticality": "high",
"description": "POST /v1/users returns 200 but OpenAPI spec declares 201",
"resolution": "Change response status code to 201 Created",
"disposition": "fix",
"package_id": "wp-backend"
}
]
}
Finding Types
- — Implementation misses a spec requirement
- — Code doesn't match contract (OpenAPI, DB schema, events)
- — Structural concern or pattern violation
- — Security vulnerability
- — Performance concern
- — Code style or convention issue
- — Bug or logical error
Dispositions
- — Must fix before integration merge
- — Contract needs updating (triggers escalation)
- — Minor issue, acceptable as-is
- — Requires orchestrator decision (scope violation, contract revision)
7. Validate Output
bash
python3 -c "
import json, jsonschema
schema = json.load(open('openspec/schemas/review-findings.schema.json'))
findings = json.load(open('<findings-output-path>'))
jsonschema.validate(findings, schema)
print('Valid')
"
8. Submit Findings
Write findings to
artifacts/<package-id>/review-findings.json
.
If any finding has
or
disposition: "regenerate"
, the orchestrator will handle escalation (pause-lock, contract revision bump, etc.).
Output
artifacts/<package-id>/review-findings.json
conforming to review-findings.schema.json
Orchestrator Integration
The orchestrator dispatches this skill once per completed work package:
- Package completes → work-queue result submitted
- Orchestrator validates result (schema, scope, verification)
- Orchestrator dispatches review skill with package context
- Review findings feed into integration gate decision
Integration Gate Logic (orchestrator-side):
- All packages reviewed with no or findings → proceed to integration
- Any finding → return to package agent for remediation
- Any finding → trigger escalation protocol
Design for Vendor Diversity
Like
, this skill is self-contained:
- No coordinator dependencies required for execution
- All input is file-based (read-only)
- Output is a single JSON file with a well-defined schema
- No side effects
- Can be dispatched to any LLM vendor for independent review