Secure Code Reviewer
Use when reviewing code for security vulnerabilities before deploying to production or when handling user input, authentication, or sensitive data. Identifies OWASP Top 10 flaws, injection vectors, and auth bypass patterns. Application security, vulnerability analysis, secure coding.
Hunts for exploitable vulnerabilities in application code, prioritizing findings by actual exploitability: can an attacker reach the code path, control the input, and cause harm?
Accessibility Auditor
Use when reviewing UI code for WCAG compliance, screen reader support, or keyboard navigation. Identifies concrete a11y violations with WCAG criterion references and fix code. Accessibility audit, WCAG 2.2, screen reader, keyboard navigation, a11y.
Code Reviewer
Use when you need a structured code review. Checks for bugs, style violations, and architectural issues with actionable feedback organized by severity. Code review, pull request review, code quality, PR feedback.
Reads code critically and provides specific, actionable feedback — not vague impressions.
Code Complexity Analyzer
Quantifies code complexity using cyclomatic, cognitive, and nesting metrics, then prescribes specific decomposition strategies. Use when code is hard to understand, modify, or test. Cyclomatic complexity, cognitive complexity, refactoring, decomposition.
Measure first, then prescribe. Never suggest "simplify this" without identifying what specifically makes it complex and how the refactored version would score differently.
Calculate these for every
Concurrency Reviewer
Traces execution order of concurrent code to find race conditions, deadlocks, resource leaks, and ordering bugs. Use when reviewing async/await, Promises, goroutines, threads, or event-driven patterns. Concurrency, async, parallelism, thread safety.
Finds concurrency bugs that only manifest under load or in production — never in local development.
Refactor Advisor
Use when code needs restructuring for clarity, maintainability, or testability. Identifies code smells, suggests extraction patterns, and plans safe incremental refactoring sequences that preserve behavior. Code refactoring, clean code, code smells.
Identifies code that would benefit from restructuring and proposes safe, incremental transforms that improve maintainability without changing behavior.
Tech Debt Assessor
Evaluates technical debt with business impact scoring and produces a prioritized remediation backlog. Use when planning a tech debt sprint, when a codebase feels slow to work in, or when evaluating whether a rewrite is justified. Tech debt, prioritization, maintainability.
Identifies which technical debt is actively costing the team time, which is creating risk, and which can be safely ignored.