Read a spec cold and find what the author missed — unstated assumptions, untestable rules, missing edge cases, and security gaps.
/cspec produces an approved spec — this is the mandatory next step at standard intensity/creview-spec for the full 4-agent adversarial review)/cpr-review), reviewing implementation after TDD (use /cverify)/creview sits between spec writing and test writing. The pipeline is: /cspec → /creview → /ctdd → /cverify → /cdocs → merge. Review is never skipped — the state machine enforces this. Even for small features, review consistently finds unstated assumptions or untestable rules.
[unit] instead of [integration]Agent: Assumptions check complete — found 2 unstated assumptions.
1. UNSTATED: The spec assumes Redis is available for rate limit
state. What happens if Redis is down?
Proposed: R-006 [integration]: If the rate limit store is
unavailable, login attempts proceed without rate limiting
(fail-open) and an alert is logged.
2. SECURITY: This feature accepts user input (email) via POST
but there's no rule for input validation on the server side.
Proposed: R-007 [unit]: POST /login validates email format
server-side and returns 400 for malformed input.
3. EDGE CASE: What happens if the lockout counter overflows?
With 5 failed attempts every 15 minutes for months, does the
counter grow unbounded?
Proposed: R-008 [unit]: Failed attempt records older than
the lockout window are pruned on each login attempt.
R-003 ("configurable via environment variable") is weak —
rewrite to specify the variable name and default value.
| Reads | Writes |
|---|---|
Spec artifact (.correctless/specs/{slug}.md) |
Updated spec (new rules appended) |
AGENT_CONTEXT.md |
.correctless/artifacts/reviews/{slug}-review.md |
ARCHITECTURE.md |
.correctless/artifacts/token-log-{slug}.json |
.correctless/antipatterns.md |
Workflow state (advances to tests phase) |
.correctless/meta/workflow-effectiveness.json (high+ intensity) |
|
.correctless/artifacts/qa-findings-*.json |
|
| Relevant source code |
At standard intensity, /creview is the standard review — a single-agent skeptical pass covering assumptions, testability, edge cases, antipatterns, integration test levels, and security. This is what most projects use.
At high/critical intensity, /creview is available as a quick 3-minute review for low-risk features. For higher-risk features, use /creview-spec instead, which runs a 4-agent adversarial review team. Users at high/critical intensity can choose either based on the feature’s risk profile.
/cverify as a tracked decision.