plankton-code-quality▌
affaan-m/everything-claude-code · updated Apr 8, 2026
Write-time code quality enforcement with auto-formatting, linting, and Claude-powered subprocess fixes on every file edit.
- ›Three-phase architecture: silent auto-formatting, violation collection, and tiered model routing (Haiku for style, Sonnet for complexity, Opus for types) to fix unfixable issues
- ›Supports Python, TypeScript, Shell, YAML, JSON, TOML, Markdown, and Dockerfile with 20+ linters including ruff, biome, shellcheck, and hadolint
- ›Config protection via PreToolUse and Stop h
Plankton Code Quality Skill
Integration reference for Plankton (credit: @alxfazio), a write-time code quality enforcement system for Claude Code. Plankton runs formatters and linters on every file edit via PostToolUse hooks, then spawns Claude subprocesses to fix violations the agent didn't catch.
When to Use
- You want automatic formatting and linting on every file edit (not just at commit time)
- You need defense against agents modifying linter configs to pass instead of fixing code
- You want tiered model routing for fixes (Haiku for simple style, Sonnet for logic, Opus for types)
- You work with multiple languages (Python, TypeScript, Shell, YAML, JSON, TOML, Markdown, Dockerfile)
How It Works
Three-Phase Architecture
Every time Claude Code edits or writes a file, Plankton's multi_linter.sh PostToolUse hook runs:
Phase 1: Auto-Format (Silent)
├─ Runs formatters (ruff format, biome, shfmt, taplo, markdownlint)
├─ Fixes 40-50% of issues silently
└─ No output to main agent
Phase 2: Collect Violations (JSON)
├─ Runs linters and collects unfixable violations
├─ Returns structured JSON: {line, column, code, message, linter}
└─ Still no output to main agent
Phase 3: Delegate + Verify
├─ Spawns claude -p subprocess with violations JSON
├─ Routes to model tier based on violation complexity:
│ ├─ Haiku: formatting, imports, style (E/W/F codes) — 120s timeout
│ ├─ Sonnet: complexity, refactoring (C901, PLR codes) — 300s timeout
│ └─ Opus: type system, deep reasoning (unresolved-attribute) — 600s timeout
├─ Re-runs Phase 1+2 to verify fixes
└─ Exit 0 if clean, Exit 2 if violations remain (reported to main agent)
What the Main Agent Sees
| Scenario | Agent sees | Hook exit |
|---|---|---|
| No violations | Nothing | 0 |
| All fixed by subprocess | Nothing | 0 |
| Violations remain after subprocess | [hook] N violation(s) remain |
2 |
| Advisory (duplicates, old tooling) | [hook:advisory] ... |
0 |
The main agent only sees issues the subprocess couldn't fix. Most quality problems are resolved transparently.
Config Protection (Defense Against Rule-Gaming)
LLMs will modify .ruff.toml or biome.json to disable rules rather than fix code. Plankton blocks this with three layers:
- PreToolUse hook —
protect_linter_configs.shblocks edits to all linter configs before they happen - Stop hook —
stop_config_guardian.shdetects config changes viagit diffat session end - Protected files list —
.ruff.toml,biome.json,.shellcheckrc,.yamllint,.hadolint.yaml, and more
Package Manager Enforcement
A PreToolUse hook on Bash blocks legacy package managers:
pip,pip3,poetry,pipenv→ Blocked (useuv)npm,yarn,pnpm→ Blocked (usebun)- Allowed exceptions:
npm audit,npm view,npm publish
Setup
Quick Start
Note: Plankton requires manual installation from its repository. Review the code before installing.
# Install core dependencies
brew install jaq ruff uv
# Install Python linters
uv sync --all-extras
# Start Claude Code — hooks activate automatically
claude
No install command, no plugin config. The hooks in .claude/settings.json are picked up automatically when you run Claude Code in the Plankton directory.
Per-Project Integration
To use Plankton hooks in your own project:
- Copy
.claude/hooks/directory to your project - Copy
.claude/settings.jsonhook configuration - Copy linter config files (
.ruff.toml,biome.json, etc.) - Install the linters for your languages
Language-Specific Dependencies
| Language | Required | Optional |
|---|---|---|
| Python | ruff, uv |
ty (types), vulture (dead code), bandit (security) |
| TypeScript/JS | biome |
oxlint, semgrep, knip (dead exports) |
| Shell | shellcheck, shfmt |
— |
| YAML | yamllint |
— |
| Markdown | markdownlint-cli2 |
— |
| Dockerfile | hadolint (>= 2.12.0) |
— |
| TOML | taplo |
— |
| JSON | jaq |
— |
Pairing with ECC
Complementary, Not Overlapping
| Concern | ECC | Plankton |
|---|---|---|
| Code quality enforcement | PostToolUse hooks (Prettier, tsc) | PostToolUse hooks (20+ linters + subprocess fixes) |
| Security scanning | AgentShield, security-reviewer agent | Bandit (Python), Semgrep (TypeScript) |
| Config protection | — | PreToolUse blocks + Stop hook detection |
| Package manager | Detection + setup | Enforcement (blocks legacy PMs) |
| CI integration | — | Pre-commit hooks for git |
| Model routing | Manual (/model opus) |
Automatic (violation complexity → tier) |
Recommended Combination
- Install ECC as your plugin (agents, skills, commands, rules)
- Add Plankton hooks for write-time quality enforcement
- Use AgentShield for security audits
- Use ECC's verification-loop as a final gate before PRs
Avoiding Hook Conflicts
If running both ECC and Plankton hooks:
- ECC's Prettier hook and Plankton's biome formatter may conflict on JS/TS files
- Resolution: disable ECC's Prettier PostToolUse hook when using Plankton (Plankton's biome is more comprehensive)
- Both can coexist on different file types (ECC handles what Plankton doesn't cover)
Configuration Reference
Plankton's .claude/hooks/config.json controls all behavior:
{
"languages": {
"python": true,
"shell": true,
"yaml": true,
"json": true,
"toml": true,
"dockerfile": true,
"markdown": true,
"typescript": {
"enabled": true,
"js_runtime": "auto",
"biome_nursery": "warn",
"semgrep": true
}
},
"phases": {
"auto_format": true,
"subprocess_delegation": true
},
"subprocess": {
"tiers": {
"haiku": { "timeout": 120, "max_turns": 10 },
"sonnet": { "timeout": 300, "max_turns": 10 },
"opus": { "timeout": 600, "max_turns": 15 }
},
"volume_threshold": 5
}
}
Key settings:
- Disable languages you don't use to speed up hooks
volume_threshold— violations > this count auto-escalate to a higher model tiersubprocess_delegation: false— skip Phase 3 entirely (just report violations)
Environment Overrides
| Variable | Purpose |
|---|---|
HOOK_SKIP_SUBPROCESS=1 |
Skip Phase 3, report violations directly |
HOOK_SUBPROCESS_TIMEOUT=N |
Override tier timeout |
HOOK_DEBUG_MODEL=1 |
Log model selection decisions |
HOOK_SKIP_PM=1 |
Bypass package manager enforcement |
References
- Plankton (credit: @alxfazio)
- Plankton REFERENCE.md — Full architecture documentation (credit: @alxfazio)
- Plankton SETUP.md — Detailed installation guide (credit: @alxfazio)
ECC v1.8 Additions
Copyable Hook Profile
Set strict quality behavior:
export ECC_HOOK_PROFILE=strict
export ECC_QUALITY_GATE_FIX=true
export ECC_QUALITY_GATE_STRICT=true
Language Gate Table
- TypeScript/JavaScript: Biome preferred, Prettier fallback
- Python: Ruff format/check
- Go: gofmt
Config Tamper Guard
During quality enforcement, flag changes to config files in same iteration:
biome.json,.eslintrc*,prettier.config*,tsconfig.json,pyproject.toml
If config is changed to suppress violations, require explicit review before merge.
CI Integration Pattern
Use the same commands in CI as local hooks:
- run formatter checks
- run lint/type checks
- fail fast on strict mode
- publish remediation summary
Health Metrics
Track:
- edits flagged by gates
- average remediation time
- repeat violations by category
- merge blocks due to gate failures
Discussion
Product Hunt–style comments (not star reviews)- No comments yet — start the thread.
Ratings
4.5★★★★★51 reviews- ★★★★★Mateo Bansal· Dec 28, 2024
I recommend plankton-code-quality for anyone iterating fast on agent tooling; clear intent and a small, reviewable surface area.
- ★★★★★Ganesh Mohane· Dec 12, 2024
plankton-code-quality reduced setup friction for our internal harness; good balance of opinion and flexibility.
- ★★★★★Ava Brown· Dec 12, 2024
Registry listing for plankton-code-quality matched our evaluation — installs cleanly and behaves as described in the markdown.
- ★★★★★Isabella Gonzalez· Dec 8, 2024
Useful defaults in plankton-code-quality — fewer surprises than typical one-off scripts, and it plays nicely with `npx skills` flows.
- ★★★★★Ren Rahman· Nov 27, 2024
Registry listing for plankton-code-quality matched our evaluation — installs cleanly and behaves as described in the markdown.
- ★★★★★Omar Menon· Nov 19, 2024
plankton-code-quality reduced setup friction for our internal harness; good balance of opinion and flexibility.
- ★★★★★Rahul Santra· Nov 3, 2024
I recommend plankton-code-quality for anyone iterating fast on agent tooling; clear intent and a small, reviewable surface area.
- ★★★★★Omar Mehta· Nov 3, 2024
Useful defaults in plankton-code-quality — fewer surprises than typical one-off scripts, and it plays nicely with `npx skills` flows.
- ★★★★★Pratham Ware· Oct 22, 2024
Useful defaults in plankton-code-quality — fewer surprises than typical one-off scripts, and it plays nicely with `npx skills` flows.
- ★★★★★Ava Chen· Oct 22, 2024
I recommend plankton-code-quality for anyone iterating fast on agent tooling; clear intent and a small, reviewable surface area.
showing 1-10 of 51