A code review workflow that watches pull requests, assigns specialist reviewers, checks implementation risk, and posts concise review notes with links to evidence.
Designed for
AI startups and small product teams that need faster PR review without weakening engineering judgment
Operating goal
Review every pull request for architecture risk, test gaps, security concerns, and deploy readiness before merge.
4 steps from trigger to verified handoff, with success and failure paths.
1 MCP layer and 3 connected tools with explicit auth and risk levels.
3 guardrails, 3 evals, and 1 harnesses before production use.
Summarizes the PR and detects changed system boundaries.
Fast tool-use model
Looks for boundary, coupling, and production-readiness issues.
Deep reasoning model
Checks sensitive paths, auth changes, dependency risk, and secrets.
Policy-focused reasoning model
Loads the workflow goal, allowed actions, escalation policy, and output contract before the agent plans work.
A review skill for architecture risk, test gaps, secrets, migrations, and deploy readiness.
Centralizes high-risk action checks for writes, secrets, customer data, billing, deploys, and public communications.
Exposes pull request diffs, CI status, file reads, review drafts, and CODEOWNER metadata.
Read the diff and produce a system-level summary.
Check changed boundaries, new coupling, data migrations, and missing docs.
Inspect auth, secrets, permissions, and dependency changes.
Combine findings into a concise review with evidence links and test suggestions.
Open it in Codelit, refine it with the agent chat, then generate the architecture or product board from the same workflow spec.
Open in Agent WorkflowA Slack-native engineering agent that receives operational requests, gathers context from tickets and repos, routes work to specialist agents, and drafts auditable responses before anything risky happens.
A Devin-style engineering workflow that turns a scoped ticket into a branch, implementation plan, code changes, test run, and pull request draft with review evidence.
A security workflow that watches alerts, gathers evidence from code and runtime systems, ranks blast radius, and prepares a human-approved remediation plan before any production action.