Add comprehensive custom agents for specialized workflows: - gentoo-sysadmin: Gentoo Linux system administration (OpenRC, Portage) - tdd-test-writer: TDD Ping-Pong workflow implementation - code-reviewer: Code review against strict style guidelines - documentation-writer: Comprehensive project documentation - python-ai-tutor: AI/ML coursework assistant with teaching focus - dotfiles-manager: Dotfiles management with chezmoi Add custom slash commands for quick workflows: - /gentoo-update: Safe Gentoo system update procedure - /tdd-next: Start next TDD test cycle - /style-check: Comprehensive code style validation - /doc-sync: Update all project documentation - /review-pr: Review pull request before merge - /script-install: Install system script with proper permissions Updated .gitignore to properly track agents and commands while excluding session-specific data (plans/, etc.) Added README.md documenting the configuration structure and usage. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
1.6 KiB
1.6 KiB
Code Style Check
Perform comprehensive code style validation against strict guidelines.
Check All Files
Review all modified files for:
Universal Standards
- Line Length: 80-character maximum (STRICT)
- Indentation: 2 spaces (never tabs)
- Naming: Language-appropriate conventions
- Comments: Minimal - only for complex logic or constraints
- No Secrets: Check for hardcoded credentials, API keys, tokens
Language-Specific Checks
Python
# PEP 8 compliance
flake8 --max-line-length=80 --indent-size=2 .
# Type checking
mypy .
# Format check
black --check --line-length=80 .
JavaScript/TypeScript
# ESLint with Airbnb config
eslint --max-warnings 0 .
# TypeScript checking
tsc --noEmit
# Prettier check
prettier --check --print-width 80 .
Shell Scripts
# POSIX compliance and style
shellcheck -s sh *.sh
# Check for bashisms
checkbashisms *.sh
Rust
# Format check
cargo fmt -- --check
# Clippy lints
cargo clippy -- -D warnings
# Run tests
cargo test
Security Check
Scan for common vulnerabilities:
- SQL injection (parameterized queries?)
- XSS (proper output encoding?)
- Hardcoded secrets (environment variables?)
- Insecure dependencies (outdated packages?)
Report Format
Provide results as:
✅ Passed
[List files that meet all standards]
❌ Failed
[List violations with file:line references]
💡 Suggestions
[Optional improvements]
Auto-fix (if requested)
After review, offer to auto-fix issues:
# Python
black --line-length=80 .
# JavaScript/TypeScript
eslint --fix .
prettier --write --print-width 80 .
# Rust
cargo fmt