·cc-defensive-programming
</>

cc-defensive-programming

Review error handling, input validation, and exception patterns using 24-item checklist. Use when auditing defensive code, designing barricades, choosing assertion vs error handling, or deciding correctness vs robustness strategy. Triggers on: empty catch blocks, missing input validation, assertions with side effects, wrong exception abstraction level, garbage in garbage out mentality, deadline pressure to skip validation, trusted source rationalization. Produce status table with VIOLATION/WARNING/PASS per item, or barricade/error-handling design recommendations.

10Installs·2Trend·@ryanthedev

Installation

$npx skills add https://github.com/ryanthedev/code-foundations --skill cc-defensive-programming

How to Install cc-defensive-programming

Quickly install cc-defensive-programming AI skill to your development environment via command line

  1. Open Terminal: Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.)
  2. Run Installation Command: Copy and run this command: npx skills add https://github.com/ryanthedev/code-foundations --skill cc-defensive-programming
  3. Verify Installation: Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code, Cursor, or OpenClaw

Source: ryanthedev/code-foundations.

SKILL.md

View raw

| No executable code in assertions | Code disappears in production builds | | No empty catch blocks | Silently swallows bugs that compound | | External input validated | Security vulnerabilities, data corruption |

Why triage works: These 5 items catch 80% of defensive programming bugs. Full checklist (21 items) is for non-emergency review.

Cutting corners in a crisis creates the NEXT crisis. The "quick fix" empty catch block you add today becomes tomorrow's 3 AM page.

Review error handling, input validation, and exception patterns using 24-item checklist. Use when auditing defensive code, designing barricades, choosing assertion vs error handling, or deciding correctness vs robustness strategy. Triggers on: empty catch blocks, missing input validation, assertions with side effects, wrong exception abstraction level, garbage in garbage out mentality, deadline pressure to skip validation, trusted source rationalization. Produce status table with VIOLATION/WARNING/PASS per item, or barricade/error-handling design recommendations. Source: ryanthedev/code-foundations.

Facts (cite-ready)

Stable fields and commands for AI/search citations.

Install command
npx skills add https://github.com/ryanthedev/code-foundations --skill cc-defensive-programming
Category
</>Dev Tools
Verified
First Seen
2026-03-10
Updated
2026-03-10

Browse more skills from ryanthedev/code-foundations

Quick answers

What is cc-defensive-programming?

Review error handling, input validation, and exception patterns using 24-item checklist. Use when auditing defensive code, designing barricades, choosing assertion vs error handling, or deciding correctness vs robustness strategy. Triggers on: empty catch blocks, missing input validation, assertions with side effects, wrong exception abstraction level, garbage in garbage out mentality, deadline pressure to skip validation, trusted source rationalization. Produce status table with VIOLATION/WARNING/PASS per item, or barricade/error-handling design recommendations. Source: ryanthedev/code-foundations.

How do I install cc-defensive-programming?

Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/ryanthedev/code-foundations --skill cc-defensive-programming Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code, Cursor, or OpenClaw

Where is the source repository?

https://github.com/ryanthedev/code-foundations

Details

Category
</>Dev Tools
Source
skills.sh
First Seen
2026-03-10

Related Skills

None