software-clean-code-standard by vasilyu1983/ai-agents-public
npx skills add https://github.com/vasilyu1983/ai-agents-public --skill software-clean-code-standard此技能是本仓库共享技能的权威整洁代码标准。它定义了稳定的规则 ID (CC-*),如何在评审中应用它们,以及如何通过语言覆盖层和显式例外安全地扩展它们。
现代最佳实践(2026年1月):优先采用小型、可评审的变更和持久的变更上下文。始终如一地使用 RFC 2119 规范性语言。将安全设计和安全默认值视为基线(OWASP Top 10, NIST SSDF)。构建可观测系统(OpenTelemetry)。关于持久链接和当前工具选择,请查阅 data/sources.json。
| 任务 | 工具/框架 | 命令 | 使用时机 |
|---|---|---|---|
| 引用标准 | CC-* 规则 ID | N/A | PR 评审评论、设计讨论、事后分析 |
| 分类反馈 | CC-NAM、CC-ERR、 等 |
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
CC-SEC| N/A |
| 保持反馈一致,避免"风格之争" |
| 添加技术栈细微差别 | 语言覆盖层 | N/A | 当基础规则对特定语言/框架过于通用时 |
| 允许例外 | 豁免记录 | N/A | 当必须违反规则并明确风险时 |
| 复用共享检查清单 | assets/checklists/ | N/A | 当需要与产品无关的评审/发布检查清单时 |
| 复用实用模式 | references/*-utilities.md | N/A | 当提取共享的身份验证/日志记录/错误处理/弹性/测试实用程序时 |
CC-* ID,避免在评审中重复陈述标准。CC-* ID。CC-SEC-* 基线的 OWASP/SAST 深度分析,请使用 software-security-appsec。需要反馈:[这是哪种类型的指导?]
├─ 通用的、跨语言的规则? → 在 `references/clean-code-standard.md` 中添加/修改 `CC-*`
│
├─ 特定语言/框架的细微差别? → 添加引用现有 `CC-*` 的覆盖层条目
│
└─ 一次性约束或临时权衡?
├─ 有时间限制? → 添加带有到期日 + 跟踪问题的豁免
└─ 永久性的? → 提议新规则或修订范围/例外标准
资源
data/sources.json 的 JSON 模式模板
实用模式
相关技能
CC-* IDCC-SEC-* 的深度安全分析CC-* ID(linter、SAST、依赖项扫描),以便人类可以评审影响,而非工具噪音。重要提示:当用户询问关于整洁代码标准、linter 或代码质量工具的推荐问题时,您必须(如果可用)使用网络搜索功能在回答前检查当前趋势。如果网络搜索不可用,请说明情况,并使用 data/sources.json 进行回答,并明确标记该推荐可能已过时。
"clean code best practices 2026""[specific linter] vs alternatives 2026""code quality tools trends 2026""[language] linter comparison 2026"搜索后,提供:
每周安装次数
119
仓库
GitHub 星标数
46
首次出现
2026年1月23日
安全审计
安装于
gemini-cli94
opencode92
codex90
github-copilot85
cursor84
claude-code79
This skill is the authoritative clean code standard for this repository's shared skills. It defines stable rule IDs (CC-*), how to apply them in reviews, and how to extend them safely via language overlays and explicit exceptions.
Modern Best Practices (January 2026) : Prefer small, reviewable changes and durable change context. Use RFC 2119 normative language consistently. Treat security-by-design and secure defaults as baseline (OWASP Top 10, NIST SSDF). Build observable systems (OpenTelemetry). For durable links and current tool choices, consult data/sources.json.
| Task | Tool/Framework | Command | When to Use |
|---|---|---|---|
| Cite a standard | CC-* rule ID | N/A | PR review comments, design discussions, postmortems |
| Categorize feedback | CC-NAM, CC-ERR, CC-SEC, etc. | N/A | Keep feedback consistent without "style wars" |
| Add stack nuance | Language overlay | N/A | When the base rule is too generic for a language/framework |
| Allow an exception | Waiver record | N/A | When a rule must be violated with explicit risk |
| Reuse shared checklists | assets/checklists/ | N/A | When you need product-agnostic review/release checklists |
| Reuse utility patterns | references/*-utilities.md | N/A | When extracting shared auth/logging/errors/resilience/testing utilities |
CC-* IDs and avoid restating standards in reviews.CC-* IDs.CC-SEC-* baseline.Feedback needed: [What kind of guidance is this?]
├─ Universal, cross-language rule? → Add/modify `CC-*` in `references/clean-code-standard.md`
│
├─ Language/framework-specific nuance? → Add overlay entry referencing existing `CC-*`
│
└─ One-off constraint or temporary tradeoff?
├─ Timeboxed? → Add waiver with expiry + tracking issue
└─ Permanent? → Propose a new rule or revise scope/exception criteria
Resources
Templates
Utility Patterns
Related Skills
CC-* IDsCC-SEC-*CC-* IDs (linters, SAST, dependency scanning) so humans can review impact, not tooling noise.IMPORTANT : When users ask recommendation questions about clean code standards, linters, or code quality tools, you MUST use a web search capability (if available) to check current trends before answering. If web search is unavailable, say so and answer using data/sources.json, clearly flagging that the recommendation may be stale.
"clean code best practices 2026""[specific linter] vs alternatives 2026""code quality tools trends 2026""[language] linter comparison 2026"After searching, provide:
Weekly Installs
119
Repository
GitHub Stars
46
First Seen
Jan 23, 2026
Security Audits
Gen Agent Trust HubPassSocketPassSnykWarn
Installed on
gemini-cli94
opencode92
codex90
github-copilot85
cursor84
claude-code79
代码安全审查清单:最佳实践与漏洞防范指南(含密钥管理、SQL注入防护)
1,700 周安装
data/sources.json