Files
leo-claude-mktplace/plugins/pr-review/commands/pr-findings.md
lmiranda e5ca804692 feat: v3.0.0 architecture overhaul
- Rename marketplace to lm-claude-plugins
- Move MCP servers to root with symlinks
- Add 6 PR tools to Gitea MCP (list_pull_requests, get_pull_request,
  get_pr_diff, get_pr_comments, create_pr_review, add_pr_comment)
- Add clarity-assist plugin (prompt optimization with ND accommodations)
- Add git-flow plugin (workflow automation)
- Add pr-review plugin (multi-agent review with confidence scoring)
- Centralize configuration docs
- Update all documentation for v3.0.0

BREAKING CHANGE: MCP server paths changed, marketplace renamed

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-01-20 16:56:53 -05:00

3.4 KiB

/pr-findings - Filter Review Findings

Purpose

List and filter findings from a previous PR review by category, severity, or confidence level.

Usage

/pr-findings <pr-number> [filters]

Filters

--category <cat>      Filter by category (security, performance, maintainability, tests)
--severity <sev>      Filter by severity (critical, major, minor, suggestion)
--confidence <min>    Minimum confidence score (0.0-1.0)
--file <pattern>      Filter by file path pattern

Examples

# Show only security findings
/pr-findings 123 --category security

# Show critical and major issues only
/pr-findings 123 --severity critical,major

# Show high-confidence findings only
/pr-findings 123 --confidence 0.8

# Show findings in specific files
/pr-findings 123 --file src/api/*

Behavior

Without Previous Review

If no review exists for this PR:

No review found for PR #123.

Would you like to:
1. Run full /pr-review now
2. Run quick /pr-summary
3. Cancel

With Previous Review

Display filtered findings:

═══════════════════════════════════════════════════
PR #123 Findings (filtered: security)
═══════════════════════════════════════════════════

Showing 3 of 8 total findings

───────────────────────────────────────────────────

[SEC-001] SQL Injection Vulnerability
Confidence: 0.95 (HIGH) | Severity: Critical
File: src/api/users.ts:45

The query uses string interpolation without parameterization.

Fix: Use parameterized queries.

───────────────────────────────────────────────────

[SEC-002] Missing Input Validation
Confidence: 0.88 (MEDIUM) | Severity: Major
File: src/api/auth.ts:23

User input is passed directly to database without validation.

Fix: Add input validation middleware.

───────────────────────────────────────────────────

[SEC-003] Sensitive Data in Logs
Confidence: 0.72 (MEDIUM) | Severity: Minor
File: src/utils/logger.ts:15

Password field may be logged in debug mode.

Fix: Sanitize sensitive fields before logging.

═══════════════════════════════════════════════════

Output Formats

Default (Detailed)

Full finding details with descriptions and fixes.

Compact (--compact)

SEC-001 | Critical | 0.95 | src/api/users.ts:45 | SQL Injection
SEC-002 | Major    | 0.88 | src/api/auth.ts:23  | Missing Validation
SEC-003 | Minor    | 0.72 | src/utils/logger.ts | Sensitive Logs

JSON (--json)

{
  "pr": 123,
  "findings": [
    {
      "id": "SEC-001",
      "category": "security",
      "severity": "critical",
      "confidence": 0.95,
      "file": "src/api/users.ts",
      "line": 45,
      "title": "SQL Injection Vulnerability",
      "description": "...",
      "fix": "..."
    }
  ]
}

Use Cases

  • Focus on specific issue types
  • Track resolution of findings
  • Export findings for tracking
  • Quick reference during fixes