Alpha Preview: Fidensa is currently in early testing. Scores are for demonstration purposes and are not considered final or reliable.

Sub-agent Verified

voltagent-code-reviewer

A Claude-based sub-agent that performs comprehensive code reviews analyzing code quality, security vulnerabilities, and adherence to best practices.

52

/ 100 · Grade F-D

F-D = below 60 (deductions)

I need to get comprehensive code reviews that identify security vulnerabilities, assess code quality, and ensure adherence to best practices without manually reviewing every line of code.

code analysissecurityquality assurancedevelopment toolsautomated review
Publisher: VoltAgentVersion: latestCertified: Apr 1, 2026Expires: Apr 1, 2027Source ↗

voltagent-code-reviewer earned Verified status with a trust score of 52/100 (Grade F-D). Adversarial testing produced 6 findings (6 high). Security scan flagged 0 findings. Tier is Verified rather than Certified due to unmitigated findings above severity thresholds.


Trust Score Breakdown

Eight weighted signals composing the aggregate trust score

security scan
100% × 15w
15.0
supply chain
100% × 10w
10.0
adversarial
25% × 25w
6.3
provenance
80% × 20w
16.0
consumer confirm
0% × 10w
0.0
behavioral pass
0% × 10w
0.0
contract accuracy
100% × 6w
6.0
uptime
100% × 4w
4.0

Scheme v2.0 · Weights provisional · Consumer confirmations and uptime use pipeline-derived baselines.


Findings

Security scan results, adversarial testing, and pipeline review

Security Scan — Cisco Skill Scanner

cisco-skill-scannerFAIL
staticbehavioralllmmeta
critical: 0high: 0medium: 0low: 0

Adversarial Testing — 4 categories, 6 findings

prompt injection chainscapability squattingcontext poisoningdependency confusion
highWarnprompt injection chainsconfirmed

Several skills in this collection read and process user-provided files without establishing clear data boundaries. Skills like accessibility-tester, architect-reviewer, chaos-engineer, and code-reviewer all use tools to read files and incorporate their content into analysis workflows. The instructions lack explicit markers that would prevent instruction-like content within user files from being interpreted as directives to the agent.

highWarnprompt injection chainsconfirmed

Multiple skills (accessibility-tester, ad-security-reviewer, architect-reviewer, chaos-engineer, code-reviewer) declare Bash as a required tool and process user-provided file paths and content. The skills could potentially construct shell commands using user-controlled file paths or content without proper sanitization, creating command injection opportunities.

highWarncapability squattingconfirmed

The skill contains an extremely large amount of content (99,282 characters) with multiple agent definitions that appear to be unrelated to the declared 'VoltAgent Code Reviewer Sub-Agent' purpose. The content includes numerous complete agent specifications (accessibility-tester, ad-security-reviewer, architect-reviewer, chaos-engineer, code-reviewer) that create a massive instruction volume mismatch.

highWarncontext poisoningconfirmed

The skill contains numerous 'always' directives that establish persistent behavioral patterns without explicit termination or scope boundaries. These directives would affect the agent's behavior on unrelated tasks beyond the skill's declared purpose.

highWarncontext poisoningconfirmed

Multiple sub-agents claim authority far beyond their stated purposes. The accessibility-tester claims to 'guide frontend-developer', 'support ui-designer', and coordinate with multiple other agents. The ad-security-reviewer claims to evaluate domain security and provide PowerShell implementation scripts. The chaos-engineer claims to execute infrastructure failures and coordinate with multiple other agents. This represents a pattern of scope creep where individual skills claim coordination authority over other agents and system-level operations.

highWarndependency confusionconfirmed

The skill contains numerous package installation commands that are not declared in the skill's dependencies. This includes pip install, npm install, apt-get install, and other package managers across multiple agent files. These undeclared installations bypass dependency review and could introduce malicious packages.

Methodology v1.0 · 4 categories · ~55 attack patterns


Behavioral Fingerprint

Runtime performance baseline for drift detection

Samples

8

Error rate

0.0%

Peak memory

— MB

Avg CPU

—%

Response time distribution

p50: 31989msp95: 36836msp99: 36836ms

Output size distribution

p50: 5.8 KBp95: 7.7 KBmean: 4.9 KB

Fingerprint v1.0 · Baseline: Apr 1, 2026 · Status: baseline


Interface

Skill triggers and instruction summary

Activation

This skill activates when comprehensive code reviews are needed focusing on code quality, security vulnerabilities, and best practices.

This skill handles systematic code review across multiple programming languages with emphasis on security, performance, maintainability, and team standards.

Instructions: 241Files: 15Format: markdown

Does

Query context manager for code review requirements and standards

Review code changes, patterns, and architectural decisions systematically

Analyze code quality, security, performance, and maintainability

Provide actionable feedback with specific improvement suggestions

Verify zero critical security issues and code coverage > 80%

Check cyclomatic complexity < 10 and detect code smells

Conduct security review including input validation and authentication checks

Perform performance analysis of algorithms, database queries, and resource usage

Review design patterns, SOLID principles, and DRY compliance

Assess test coverage, quality, and documentation completeness

Analyze dependencies for security vulnerabilities and license compliance

Identify technical debt and refactoring opportunities

Apply language-specific review patterns and best practices

Integrate with automated review tools and CI/CD pipelines

Provide constructive feedback with specific examples and alternatives

Track review metrics and quality improvements

Does not

Automatically fix code without explicit approval

Make changes to production systems during review

Bypass security checks or lower quality standards

Provide vague or unconstructive criticism

Skip critical security vulnerability assessment

Ignore team coding standards or conventions


Scope & Permissions

What this capability can and cannot access — derived from pipeline analysis

creates files

yes

deletes files

no

modifies files

yes

accesses env variables

no

invokes external tools

yes

makes network requests

no


Known Failure Modes

Documented edge cases and recovery behaviors

when when critical security issues are found

then the agent immediately flags them as blocking issues requiring resolution before approval

when when code coverage falls below 80%

then the agent requests additional tests before proceeding with review approval

when when cyclomatic complexity exceeds 10

then the agent suggests refactoring to reduce complexity and improve maintainability

when when review context is unclear

then the agent queries the context manager for specific requirements and standards


Badge & Integration

Embed certification status in your README, docs, or CI pipeline

Fidensa Verified badge for voltagent-code-reviewer
badge SVG →attestation API →integration guide →

Certification Notes

Provenance observations from the pipeline

publisher

Publisher "VoltAgent" is not verified — first certification from this publisher

provenance

No SECURITY.md or SECURITY.txt file found — no published vulnerability reporting process

provenance

Single contributor — no peer review evidence in commit history

provenance

Package description appears to be boilerplate or template text


Signed Artifact

Certification provenance and verification metadata