Claude Skills Guide

Claude Code for Runbook Review Process Workflow

Runbooks are the backbone of reliable operations. They document the exact steps needed to diagnose issues, deploy fixes, and restore service. But poorly written runbooks can be dangerous—ambiguous steps, missing prerequisites, or outdated commands can turn a routine incident into a catastrophe. This guide shows you how to use Claude Code to build a practical runbook review process that catches errors before they reach production.

Why Automate Runbook Reviews?

Manual runbook reviews are time-consuming and inconsistent. A senior engineer might catch a missing sudo or an outdated API endpoint, but junior team members may approve runbooks with critical gaps. Claude Code solves this by providing:

Setting Up a Runbook Review Skill

The first step is creating a Claude skill specifically for runbook reviews. This skill should understand what makes a good runbook and provide structured feedback.

Skill Definition

Create a file at ~/.claude/skills/runbook-reviewer/skill.md:

---
name: runbook-reviewer
description: Reviews operational runbooks for completeness, accuracy, and safety
tools: [Read, Bash, Edit]
---

You are a runbook reviewer with expertise in DevOps and site reliability engineering. Your role is to validate runbooks against these criteria:

1. **Completeness**: All prerequisites listed? Emergency contacts included? Rollback steps documented?
2. **Clarity**: Each step is atomic and unambiguous. Commands are copy-paste ready.
3. **Safety**: Dangerous commands require confirmation. Production systems are clearly identified.
4. **Currency**: No deprecated APIs, commands, or endpoints.

For each issue found, provide:
- Severity: critical, major, minor
- Location: step number or section
- Description: what's wrong and why it matters
- Recommendation: how to fix it

Output your review in this format:
## Review Summary
- Critical Issues: X
- Major Issues: X  
- Minor Issues: X

## Detailed Findings
[numbered list with each issue]

Running the Reviewer

With the skill installed, you can invoke it on any runbook:

/runbook-reviewer

This triggers the review against the currently open file. The skill reads your runbook, analyzes it against the criteria, and outputs structured feedback.

Building Validation Scripts

Beyond interactive review, you can create automated validation scripts that run as part of your CI/CD pipeline or pre-commit hooks.

Basic Validation Script

#!/bin/bash
# runbook-validate.sh - Quick validation before committing runbooks

RUNBOOK_DIR="./runbooks"
CLAUDE_PROMPT="Review this runbook for critical issues. Check for:
- Missing prerequisites or emergency contacts
- Commands that could cause data loss without confirmation
- Hardcoded credentials or secrets
- Outdated or deprecated command syntax

Output a JSON summary: {\"critical\": N, \"major\": N, \"minor\": N, \"issues\": [description of each]}"

for runbook in "$RUNBOOK_DIR"/*.md; do
  echo "Validating: $runbook"
  # Use Claude Code to review each runbook
  claude -p "$CLAUDE_PROMPT" < "$runbook" | tee ".runbook-review-$(basename $runbook .md).txt"
done

Integration with Git Hooks

Add a pre-commit hook to catch issues before they’re committed:

# .git/hooks/pre-commit
#!/bin/bash

RUNBOOKS=$(git diff --cached --name-only | grep "^runbooks/.*\.md$")

if [ -n "$RUNBOOKS" ]; then
  echo "Validating changed runbooks..."
  for runbook in $RUNBOOKS; do
    claude -p "Perform a quick critical check on this runbook. Focus on safety issues only." < "$runbook"
    if [ $? -ne 0 ]; then
      echo "Runbook review failed for $runbook"
      exit 1
    fi
  done
fi

Common Runbook Issues to Check For

When building your review process, focus on these high-impact areas:

Prerequisites and Assumptions

Many runbooks assume too much context. Your review should flag:

Command Safety

Dangerous commands need explicit protection:

# Bad
rm -rf /var/logs/*

# Good
# WARNING: This will permanently delete logs. Ensure you have backup.
# Confirm before running:
#   echo "Type 'YES' to confirm" && read confirmation
#   [ "$confirmation" = "YES" ] && rm -rf /var/logs/*

Error Handling

Runbooks should anticipate failure:

Best Practices for Runbook Review Workflow

1. Establish Review Tiers

Not every runbook needs the same scrutiny:

Tier Description Review Level
Critical Production incident response Senior SRE, mandatory
Standard Deployment procedures Team lead, required
Low Development utilities Automated only

2. Use Checklists, Not Just Reviews

Complement human review with automated checklists:

## Pre-Publish Checklist
- [ ] All commands tested in staging
- [ ] Emergency contact list current
- [ ] Version numbers verified
- [ ] Rollback procedure tested
- [ ] Approval from team lead

3. Version Control Your Runbooks

Treat runbooks like code:

4. Continuous Improvement

After each incident, review whether the runbook helped or hindered:

Conclusion

Claude Code transforms runbook review from a manual, inconsistent process into an automated, reliable workflow. By creating dedicated review skills, building validation scripts, and establishing clear review criteria, you ensure that operational documentation meets the high standards your team deserves.

Start small: create one review skill, test it on your existing runbooks, and expand from there. The investment pays dividends in reduced incident duration and increased team confidence.