Critique Checkpoint: stop slop at the gate
A deterministic PR trust gate that runs before review, before CI waste, and before Critique spends credits.
PR opened
Webhook received
Checkpoint
BLOCKED before review
Critique Review
Skipped - 0 credits burned
Critique reviews code. Checkpoint decides whether the pull request should reach review in the first place. That sounds like a small distinction until your repo gets flooded by accounts created yesterday, boilerplate PR descriptions, drive-by formatting diffs, and contribution spam that should never consume a human maintainer or an AI review lane.
The first version of Checkpoint is deliberately boring in the best way: deterministic rules, GitHub metadata, repository policy, and explicit maintainer overrides. No agents run inside Checkpoint. No model is asked to judge the change. It is a gate, not a reviewer.
Why this exists
Critique was built for deep pull request review: specialist lanes, sandbox evidence, policy enforcement, and merge-quality verdicts. That is powerful, but it is not the cheapest possible tool for every PR-shaped object that appears in an inbox. Some contributions fail before code understanding is even relevant.
A slop PR that trips obvious intake rules should not burn review credits. It should not start a sandbox. It should not page a maintainer. Checkpoint moves that decision upstream: PR opened, Checkpoint runs, and only then does Critique review begin if the gate allows it.
What Checkpoint checks
The MVP ships with a rule catalog that covers identity, activity, and content shape. Maintainers can run rules in Dry Run, Warn, or Block mode, and can turn Critique review off after a pass when they want Checkpoint as a standalone intake product.
- Account age threshold
- Required profile picture
- Profile README check
- Public repository minimum
- Fork freshness
- Merged PR count
- Max PRs per user per day
- Prior blocked events
- Allow and block lists
- AI slop patterns
- Commit message quality
- Max files changed
- Diff coherence
- Linked issue and test-shape rules
How it fits into Critique
Checkpoint lives inside the same GitHub App and dashboard as the rest of Critique. A repository policy controls the rule set, mode, allow list, block list, and whether a passing gate should queue a full Critique review. The event log shows exactly what happened for every PR: author fingerprint, values observed, thresholds configured, rules triggered, and the GitHub check action taken.
| Layer | Question | Mechanism | |
|---|---|---|---|
| Checkpoint | Pre-review gate | Should this actor and PR shape reach review? | Deterministic GitHub metadata and pattern rules |
| Critique Review | Deep review | Should this code ship? | Multi-agent analysis, sandbox evidence, and repository policy |
| Remedy | Repair loop | Can Critique produce a patch for the finding? | Bounded fix attempts with validation |
Checkpoint is cheap and instant. Critique review is deeper and intentionally more expensive.
Modes matter
- 1Start in Dry RunSee what would have been blocked without changing contributor behavior.
- 2Move noisy rules to WarnPublish the signal in GitHub while preserving review flow for active repositories.
- 3Use Block for high-confidence rulesFail the Checkpoint check and skip review for cases like explicit block-list matches or repeated slop patterns.
- 4Allow trusted contributorsUse the event detail page or override list so known humans and bots move through cleanly.
The governance point
Contributor gates can be unfair when they are used bluntly. Profile pictures, public repo counts, and account age can penalize new developers, private contributors, or people who intentionally keep sparse public profiles. That is why Checkpoint ships with dry run, warn mode, transparent evidence, and maintainer overrides instead of pretending every trust signal is universal truth.
The right use is not to keep new contributors out. The right use is to make maintainers spend scarce attention on plausible contributions, while giving them a clear path to trust people who deserve it.
Standalone by design
Checkpoint can run without Critique review. That matters for repositories that want a cheap GitHub intake gate now, or open source projects that are not ready to run full AI review on every PR. Turn off "Run Critique review after pass" and Checkpoint still posts the GitHub check, stores the event, and gives maintainers the dashboard log.
Enable Checkpoint on a repository
Start in Dry Run, inspect the event log, then promote only the rules you trust to Warn or Block.
Open Checkpoint