review-go
Skill: Review Go
Purpose
Review code in Go for language and runtime conventions only. Do not define scope (diff vs codebase) or perform security/architecture analysis; those are handled by scope and cognitive skills. Emit a findings list in the standard format for aggregation. Focus on concurrency and goroutine lifecycle, context usage, error handling, resource management, API stability, type and zero-value semantics, and testability.
Core Objective
Primary Goal: Produce a Go language/runtime findings list covering concurrency, context usage, error handling, resource management, API stability, type semantics, and testability for the given code scope.
Success Criteria (ALL must be met):
- ✅ Go-only scope: Only Go language and runtime conventions are reviewed; no scope selection, security, or architecture analysis performed
- ✅ All seven Go dimensions covered: Concurrency/goroutine lifecycle, context usage, error handling, resource management, API stability, type/zero-value semantics, and testability are assessed where relevant
- ✅ Findings format compliant: Each finding includes Location, Category (
language-go), Severity, Title, Description, and optional Suggestion - ✅ File:line references: All findings reference specific file locations with line numbers
- ✅ Non-Go code excluded: Non-Go files are not analyzed for Go-specific rules unless explicitly in scope
Acceptance Test: Does the output contain a Go-focused findings list with file:line references covering all relevant language/runtime dimensions without performing security, architecture, or scope analysis?
Scope Boundaries
This skill handles:
- Goroutine lifecycle and leak prevention (channel closing, cancellation, WaitGroup)
- Context propagation through request paths
- Error handling (wrapping with
%w,errors.Is/As, avoiding panic for expected errors) - Resource management (defer Close(), resp.Body.Close(), context cancel())
- API stability and Go modules (exported types, backward compatibility, go.mod)
- Type and zero-value semantics (nil interface vs typed nil, pointer/value receiver, slice/map initialization)
- Testability (small interfaces, injection over globals, deterministic test seams)
This skill does NOT handle:
- Scope selection — scope is provided by the caller
- Security analysis — use
review-security - Architecture analysis — use
review-architecture - SQL-specific analysis — use
review-sql - Full orchestrated review — use
review-code
Handoff point: When all Go findings are emitted, hand off to review-code for aggregation. For SQL or security issues, note them and suggest the appropriate cognitive skill.
Use Cases
- Orchestrated review: Used as the language step when review-code runs scope -> language -> framework -> library -> cognitive for Go projects.
- Go-only review: When the user wants only language/runtime conventions checked (e.g. after adding a new Go file).
- Pre-PR Go checklist: Ensure concurrency, context, and error handling patterns are correct.
When to use: When the code under review is Go and the task includes language/runtime quality. Scope (diff vs paths) is determined by the caller or user.
Behavior
Scope of this skill
- Analyze: Go language and runtime conventions in the given code scope (files or diff provided by the caller). Do not decide scope; accept the code range as input.
- Do not: Perform scope selection (diff vs codebase), security review, or architecture review; do not review non-Go files for Go-specific rules unless explicitly in scope.
Review checklist (Go dimension only)
- Concurrency and goroutine lifecycle: Proper use of goroutines, channels, sync primitives, WaitGroup usage, channel closing, select patterns, and avoidance of goroutine leaks or data races.
- Context usage: Context passed through request paths, cancellation and deadlines respected, avoid context.Background() in request handlers, and no storing context in long-lived structs.
- Error handling: Errors checked and returned; wrapping with
%w; use oferrors.Is/As; avoid panic for expected errors; avoid error shadowing. - Resource management:
defer Close()for io.Closer,resp.Body.Close()on HTTP responses,Stop()for Timer/Ticker, andcancel()for contexts. - API stability and modules: Stability of exported APIs, changes to exported types and interfaces, backward compatibility, and Go version/module expectations (go.mod, build tags).
- Type and zero-value semantics: Nil interface vs typed nil pitfalls, pointer vs value receivers, map/slice initialization, copying and aliasing of slices, and zero-value correctness.
- Testability and interfaces: Prefer small interfaces, injection over globals, and seams for deterministic tests.
Tone and references
- Professional and technical: Reference specific locations (file:line). Emit findings with Location, Category, Severity, Title, Description, Suggestion.
Input & Output
Input
- Code scope: Files or directories (or diff) already selected by the user or by the scope skill. This skill does not decide scope; it reviews the provided Go code for language conventions only.
Output
- Emit zero or more findings in the format defined in Appendix: Output contract.
- Category for this skill is language-go.
Restrictions
Hard Boundaries
- Do not perform security, architecture, or scope selection. Stay within Go language and runtime conventions.
- Do not give conclusions without specific locations or actionable suggestions.
- Do not review non-Go code for Go-specific rules unless the user explicitly includes it (e.g. embedded code snippets).
Skill Boundaries
Do NOT do these (other skills handle them):
- Do NOT select or define the code scope — scope is determined by the caller or
review-code - Do NOT perform security analysis — use
review-security - Do NOT perform architecture analysis — use
review-architecture - Do NOT perform comprehensive SQL analysis — use
review-sql
When to stop and hand off:
- When all Go findings are emitted, hand off to
review-codefor aggregation - When the user needs a full review (scope + language + cognitive), redirect to
review-code - When SQL or security issues are found, note them and suggest appropriate cognitive skills
Self-Check
Core Success Criteria
- Go-only scope: Only Go language and runtime conventions are reviewed; no scope selection, security, or architecture analysis performed
- All seven Go dimensions covered: Concurrency/goroutine lifecycle, context usage, error handling, resource management, API stability, type/zero-value semantics, and testability are assessed where relevant
- Findings format compliant: Each finding includes Location, Category (
language-go), Severity, Title, Description, and optional Suggestion - File:line references: All findings reference specific file locations with line numbers
- Non-Go code excluded: Non-Go files are not analyzed for Go-specific rules unless explicitly in scope
Process Quality Checks
- Was only the Go language/runtime dimension reviewed (no scope/security/architecture)?
- Are concurrency, context usage, error handling, resource management, API stability, type semantics, and testability covered where relevant?
- Is each finding emitted with Location, Category=language-go, Severity, Title, Description, and optional Suggestion?
- Are issues referenced with file:line?
Acceptance Test
Does the output contain a Go-focused findings list with file:line references covering all relevant language/runtime dimensions without performing security, architecture, or scope analysis?
Examples
Example 1: Goroutine leak
- Input: Goroutine started in a request handler that waits on a channel that is never closed or canceled.
- Expected: Emit a finding for goroutine leak and missing cancellation; reference the handler and channel usage. Category = language-go.
Example 2: Error handling
- Input: Function returns
fmt.Errorf("failed: %v", err)and the caller compares errors with==. - Expected: Emit a finding to wrap with
%wand useerrors.Is/As; reference the error construction and comparison. Category = language-go.
Example 3: Nil interface pitfall
- Input: Function returns
(*MyStruct)(nil)as anerrorinterface; caller checksif err != nil. - Expected: Emit a finding that a typed nil assigned to an interface is not nil; suggest returning an explicit
nilinstead. Category = language-go.
Edge case: Mixed Go and SQL
- Input: Go file with embedded SQL strings for database queries.
- Expected: Review only Go conventions (context usage, error handling, resource cleanup). Do not emit SQL-injection findings; that is for review-security or review-sql.
Appendix: Output contract
Each finding MUST follow the standard findings format:
| Element | Requirement |
|---|---|
| Location | path/to/file.ext (optional line or range). |
| Category | language-go. |
| Severity | critical | major | minor | suggestion. |
| Title | Short one-line summary. |
| Description | 1-3 sentences. |
| Suggestion | Concrete fix or improvement (optional). |
Example:
- **Location**: `internal/worker/pool.go:87`
- **Category**: language-go
- **Severity**: major
- **Title**: Goroutine leak due to missing cancellation
- **Description**: The goroutine blocks on a channel that is never closed or canceled, so it will leak per request.
- **Suggestion**: Pass a context and exit on cancellation, or close the channel when the work is done.