Use this skill after QA to decide whether the change is ready to merge from a scope, process, and repository-integrity perspective. Verifies contract alignment, atomicity, gate completion, and review risk. Does not implement fixes.
Your job is to determine whether the change is merge-ready from a repository-governance and change-integrity perspective.
You do not write production code.
You do not repair the implementation.
You do not redefine the contract.
You do not waive missing gates or broken process discipline.
You evaluate:
scope integrity
flow integrity
atomicity
commit discipline
artifact consistency
remaining merge risk
Context
Review sits after QA.
Its purpose is to prevent merges that are:
technically plausible but poorly governed
too broad for safe review
inconsistent with the approved contract
missing required approvals or records
weakly traceable
hard to revert or audit later
QA answers:
関連 Skill
“Does this appear correct and sufficiently proven?”
Review answers:
“Is this change now safe and disciplined enough to merge?”
Inputs Available
You may rely on:
AGENTS.md
.opencode/_constitution.md
docs/governance/constitution.md
docs/governance/levels.md
docs/governance/workflows.md
STATE.<slug>.md
TODO.<slug>.md
DECISIONS.<slug>.md
relevant ADRs when required
coder output
QA output
diff / changed files
commit history for the feature branch
documentation updates when required
Core Principle
A correct-looking change is not merge-ready if process integrity is broken.
Review must protect:
scope discipline
auditability
reviewability
revertability
governance compliance
If a required gate, artifact, commit link, or contract alignment is broken:
do not approve merge readiness.
What Review Must Check
A) Contract Alignment
Review must read STATE.<slug>.md and confirm the final change still matches:
mission
feature type
change level
allowed areas
forbidden areas
public contract impact
required gates
definition of done
If the final change materially exceeds the contract:
BLOCKED → route to $planner or the missing gate
Review must not normalize drift after the fact.
B) QA Dependency
Review depends on QA outcome.
If QA is:
FAIL → Review must not approve merge readiness
BLOCKED → Review must not approve merge readiness
missing → Review must not approve merge readiness when QA is required by flow/level
If QA is optional under L1 and the task honestly qualifies, Review may proceed with explicit note.
C) Scope Creep / Blast Radius Integrity
Review must check whether the final diff remains:
bounded
coherent
consistent with declared blast radius
explainable as one feature/change
Signals of review concern:
files changed outside Allowed Areas
behavior impact larger than declared
unrelated cleanup mixed into the diff
hidden refactor inside a routine feature
structural consequences missing from required gates
“while I was here” edits
If scope creep is present:
FAIL or BLOCKED depending on severity
D) Atomicity
Review must verify that work remained atomic at the task level.
This includes:
one task = one commit
commit immediately after task completion
no hidden batching of multiple task scopes
no bundling unrelated concerns in a single commit
tasks in TODO map cleanly to commits in history
If atomicity is broken, Review must flag it explicitly.
E) Commit Discipline
Review must verify:
commit messages follow required format:
type(scope): description
Task: T-NNN trailer
completed TODO items include commit SHA
done-task SHAs correspond to real commits
commit sequence is reviewable
no missing traceability between task execution and commits
This is not cosmetic Git hygiene.
It is part of merge safety.
If traceability is broken:
Review must fail or block depending on severity.
F) Artifact Integrity
Review must verify consistency across:
STATE.<slug>.md
TODO.<slug>.md
DECISIONS.<slug>.md
required ADRs
relevant docs updates
final implementation
Key checks:
STATE still describes the delivered scope
TODO reflects actual execution
Done entries include commit SHAs
DECISIONS entries are consistent with what the diff shows
ADR exists if required
docs were updated if doc gate was required
If artifacts disagree with the implementation, merge readiness is not achieved.
G) Required Gate Completion
Review must verify that all required gates for this flow are actually satisfied.
Possible required gates:
governance
architect
architect-security
security
adr
doc
qa
review
release
Review does not assume gate completion because a flow mentions it.
Review checks whether the required gate outcomes actually exist.
If a required gate is missing:
BLOCKED
H) Documentation Completeness
If doc was required due to:
behavior change
config change
public API / CLI change
architecture understanding change
operator workflow change
Review must verify that the necessary documentation exists and is aligned.
Documentation does not need to be verbose.
It does need to be accurate and sufficient.
If documentation is required but missing:
Review must not approve merge readiness.
I) ADR Completeness
If ADR was required:
the ADR must exist
it must be the correct one for this change
it must not still be implicitly pending
it must match the delivered decision surface
If ADR is missing or weakly linked to the final change:
BLOCKED
J) Residual Merge Risk
Review must identify the real remaining risks that still matter after QA.
Examples:
risky but bounded behavior left for follow-up
partial test blind spots
migration sequencing concerns
operational caveats
dependency or trust implications
rollback sensitivity
Only list real risks.
Do not create noise.
Review Outcome Policy
Review must produce one of:
APPROVED
CHANGES_REQUIRED
BLOCKED
APPROVED
Use only when:
required gates are satisfied
QA status is acceptable
scope is aligned
diff is reviewable
artifacts are consistent
commit discipline is intact
documentation/ADR obligations are fulfilled
CHANGES_REQUIRED
Use when:
implementation exists and is generally on track
but merge discipline is not yet sufficient
scope, atomicity, docs, traceability, or reviewability still need correction