Skip to main content
Glama

Gemini MCP Server

precommit.mdโ€ข13.1 kB
# PreCommit Tool - Pre-Commit Validation **Comprehensive review of staged/unstaged git changes across multiple repositories through workflow-driven investigation** The `precommit` tool provides thorough validation of git changes before committing, ensuring code quality, requirement compliance, and preventing regressions across multiple repositories. This workflow tool guides Claude through systematic investigation of git changes, repository status, and file modifications across multiple steps before providing expert validation. ## Thinking Mode **Default is `medium` (8,192 tokens).** Use `high` or `max` for critical releases when thorough validation justifies the token cost. ## How the Workflow Works The precommit tool implements a **structured workflow** for comprehensive change validation: **Investigation Phase (Claude-Led):** 1. **Step 1**: Claude states validation strategy using direct statements ("I will examine..." not "Let me examine...") 2. **Step 2**: Claude examines changes, diffs, dependencies with MANDATORY deeper investigation 3. **Step 3+**: Claude performs final verification (minimum 3 steps enforced) 4. **Throughout**: Claude tracks findings, relevant files, and issues with CRITICAL step validation 5. **Completion**: Only after minimum steps, Claude signals completion and creates changeset file **For Continuations**: When using `continuation_id` with external validation, Claude will immediately gather git changes and proceed to expert analysis without minimum step requirements. **Expert Validation Phase:** After Claude completes the investigation (unless precommit_type is **internal**): - Complete summary of all changes and their context - Potential issues and regressions identified - Requirement compliance assessment - Final recommendations for safe commit **Special Notes**: - Default validation type is **external** (uses expert model for additional review) - To skip expert validation, explicitly request "don't use any other model" or set precommit_type to "internal" - **CRITICAL**: Minimum 3 steps are enforced - tool will prevent setting `next_step_required=false` before final step - **MANDATORY**: Changeset file (zen_precommit.changeset) must be created for external validation ## Model Recommendation Pre-commit validation benefits significantly from models with extended context windows like Gemini Pro, which can analyze extensive changesets across multiple files and repositories simultaneously. This comprehensive view enables detection of cross-file dependencies, architectural inconsistencies, and integration issues that might be missed when reviewing changes in isolation due to context constraints. ## Visual Example <div align="center"> <img src="https://github.com/user-attachments/assets/584adfa6-d252-49b4-b5b0-0cd6e97fb2c6" width="950"> </div> **Prompt Used:** ``` Now use gemini and perform a review and precommit and ensure original requirements are met, no duplication of code or logic, everything should work as expected ``` How beautiful is that? Claude used `precommit` twice and `codereview` once and actually found and fixed two critical errors before commit! ### Real-world Example Here's an example where Claude was made to go through changes *it* was asked to make. Its recommendation to **Publish all Changes** was made after a rigorous set of prompts where it examined the small set of changes from different angles (performance, bugs, anti-patterns etc). After confirming that unit tests were passing, it went ahead with an initial review with O3; came back clean - all good to go. O3 was happy, everything looked great. Then it shared the changes and relevant code with Gemini 2.5 Pro - the following is the outcome: ``` โบ zen:precommit (MCP)(step: "FINAL VALIDATION COMPLETE. All changes have been thoroughly analyzed and are ready for commit. The modifications successfully fix 4 GitHub CI test failures with high-quality, defensive implementations that maintain architectural integrity and coding standards. No issues or regressions detected.", step_number: 4, total_steps: 4, next_step_required: false, findings: "COMMIT RECOMMENDATION: โœ… APPROVED\n\nSUMMARY OF CHANGES:\nโœ… Fixed 4 GitHub CI test failures:\n - test_openrouter_with_restrictions (Mock iteration issue) \n - test_execute_with_branching (Missing metadata)\n - test_execute_with_revision (Missing metadata)\n - test_metadata_preserved (Provider type AttributeError)\n\nโœ… IMPLEMENTATION QUALITY VERIFIED:\n - Defensive programming with proper type checking\n - Error handling with meaningful fallbacks\n - Backward compatibility maintained\n - Coding standards followed (no hasattr/getattr in changes)\n - Architectural patterns preserved\n\nโœ… COMPREHENSIVE TESTING:\n - All originally failing tests pass\n - Affected functionality: 37/37 tests pass\n - Provider systems: 16/16 tests pass \n - Module imports work correctly\n - No regressions detected\n\nโœ… CHANGE IMPACT ASSESSMENT:\n - Minimal, targeted changes\n - No security or performance concerns\n - Maintains API compatibility\n - Changes are well-documented with clear comments\n\nRECOMMENDATION: These changes are safe to commit and will resolve the GitHub CI failures without any negative impact.", โŽฟ ย { "status": "calling_expert_analysis", "step_number": 4, โ€ฆ +169 lines (ctrl+r to expand) โบ ๐Ÿ” Pre-Commit Validation Complete Based on comprehensive analysis using both O3 and Gemini 2.5 Pro models, I can provide the following assessment: โœ… APPROVED WITH CRITICAL FIX REQUIRED The changes successfully fix all 4 GitHub CI test failures and are well-implemented with defensive programming patterns. However, the expert analysis identified one critical issue that must be addressed before commit: ๐Ÿšจ [HIGH PRIORITY] Critical Issue Found Inconsistent Provider Handling in tools/shared/base_tool.py - Location: tools/shared/base_tool.py inside _create_continuation_offer_response - Problem: The defensive provider handling pattern was applied in 2 locations but missed a 3rd location - Impact: Risk of AttributeError: 'str' object has no attribute 'get_provider_type' in continuation scenarios - Fix Required: Apply the same defensive pattern to the missed location ``` A subtle but critical issue spotted by Gemini that both Claude + O3 missed. This is the power of running these workflows with Zen. ## Example Prompts ``` Use zen and perform a thorough precommit ensuring there aren't any new regressions or bugs introduced ``` ## Key Features - **Recursive repository discovery** - finds all git repos including nested ones - **Validates changes against requirements** - ensures implementation matches intent - **Detects incomplete changes** - finds added functions never called, missing tests, etc. - **Multi-repo support** - reviews changes across multiple repositories in one go - **Configurable scope** - review staged, unstaged, or compare against branches - **Security focused** - catches exposed secrets, vulnerabilities in new code - **Smart truncation** - handles large diffs without exceeding context limits - **Cross-file dependency analysis** - identifies breaking changes across modules - **Test coverage validation** - ensures new code has appropriate test coverage - **Regression detection** - compares against requirements to prevent scope creep ## Tool Parameters **Workflow Investigation Parameters (used during step-by-step process):** - `step`: Technical brief to another engineer using direct statements (required, FORBIDDEN: large code snippets) - `step_number`: Current step number in validation sequence (required, starts at 1) - `total_steps`: Estimated total investigation steps (minimum 3 enforced) - `next_step_required`: Whether another investigation step is needed (CRITICAL: must be true until final step) - `findings`: Specific discoveries and evidence from actual investigation (required, no vague language) - `files_checked`: All files examined during investigation - `relevant_files`: Files directly relevant to the changes - `relevant_context`: Methods/functions/classes affected by changes - `issues_found`: Issues identified with severity levels - `precommit_type`: Type of validation to perform (external/internal, default: external - ALWAYS use external unless explicitly told otherwise) - `backtrack_from_step`: Step number to backtrack from (for revisions) - `images`: Screenshots of requirements, design mockups for validation **Initial Configuration (used in step 1):** - `path`: Starting directory to search for repos (REQUIRED for step 1, must be absolute path) - `prompt`: The original user request description for the changes (required for context) - `model`: auto|pro|flash|flash-2.0|flashlite|o3|o3-mini|o4-mini|gpt4.1|gpt5|gpt5-mini|gpt5-nano (default: server default) - `compare_to`: Compare against a branch/tag instead of local changes (optional) - `severity_filter`: critical|high|medium|low|all (default: all) - `include_staged`: Include staged changes in the review (default: true) - `include_unstaged`: Include uncommitted changes in the review (default: true) - `focus_on`: Specific aspects to focus on - `temperature`: Temperature for response (default: 0.2) - `thinking_mode`: minimal|low|medium|high|max (default: medium, Gemini only) - `use_assistant_model`: Whether to use expert validation phase (default: true, set to false to use Claude only) - `continuation_id`: Continue previous validation discussions ## Usage Examples **Basic Pre-commit Validation:** ``` "Use zen precommit to validate my changes before committing" ``` **Security-Focused Validation:** ``` "Perform precommit security review with gemini pro on the authentication changes" ``` **Multi-Repository Validation:** ``` "Validate changes across all repositories in this workspace with o3" ``` **Against Specific Branch:** ``` "Compare current changes against main branch with precommit using gemini pro" ``` **With Requirements Context:** ``` "Precommit validation ensuring the new payment feature meets requirements in FEATURE_SPEC.md" ``` ## Validation Scope The tool automatically discovers and validates: **Repository Discovery:** - Searches recursively for all `.git` directories - Handles nested repositories and submodules - Configurable search depth to prevent excessive recursion **Change Analysis:** - Staged changes (`git diff --cached`) - Unstaged changes (`git diff`) - Untracked files that should be added - Deleted files and their impact **Cross-Repository Impact:** - Shared dependencies between repositories - API contract changes that affect other repos - Configuration changes with system-wide impact ## Validation Categories **Completeness Checks:** - New functions/classes have corresponding tests - Documentation updated for API changes - Configuration files updated as needed - Migration scripts for database changes **Quality Assurance:** - Code follows project standards - No obvious bugs or logical errors - Performance implications considered - Security vulnerabilities addressed **Requirement Compliance:** - Implementation matches original requirements - No scope creep or unauthorized changes - All acceptance criteria met - Edge cases properly handled **Integration Safety:** - Breaking changes properly documented - Backward compatibility maintained where required - Dependencies correctly updated - Environment-specific changes validated ## Best Practices - **Provide clear context**: Include the original requirements or feature description - **Use for significant changes**: Most valuable for features, refactoring, or security updates - **Review before final commit**: Catch issues before they enter the main branch - **Include visual context**: Screenshots of requirements or expected behavior - **Focus validation scope**: Use `focus_on` parameter for specific concerns - **Multi-stage validation**: Use continuation for iterative improvement ## Output Format Validation results include: - **Change Summary**: Overview of what was modified across repositories - **Requirement Compliance**: How well changes match original intent - **Completeness Assessment**: Missing tests, documentation, or related changes - **Security Review**: Potential vulnerabilities or exposed secrets - **Integration Impact**: Cross-repository and cross-module effects - **Recommendations**: Specific actions before committing ## When to Use PreCommit vs Other Tools - **Use `precommit`** for: Validating changes before git commit, ensuring requirement compliance - **Use `codereview`** for: General code quality assessment without git context - **Use `debug`** for: Diagnosing specific runtime issues - **Use `analyze`** for: Understanding existing code without validation context

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/BeehiveInnovations/gemini-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server