This document explains how to use the Gemini CLI on GitHub to automatically review pull requests with AI-powered code analysis.
- PR Review with Gemini CLI
The PR Review workflow uses Google's Gemini AI to provide comprehensive code reviews for pull requests. It analyzes code quality, security, performance, and maintainability while providing constructive feedback in a structured format.
- Automated PR Reviews: Triggered on PR creation, updates, or manual requests
- Comprehensive Analysis: Covers security, performance, reliability, maintainability, and functionality
- Priority-based Feedback: Issues categorized by severity (Critical, High, Medium, Low)
- Positive Highlights: Acknowledges good practices and well-written code
- Custom Instructions: Support for specific review focus areas
- Structured Output: Consistent markdown format for easy reading
- Failure Notifications: Posts a comment on the PR if the review process fails.
For detailed setup instructions, including prerequisites and authentication, please refer to the main Getting Started section and Authentication documentation.
Add the following entries to your .gitignore file to prevent PR review artifacts from being committed:
# gemini-cli settings
.gemini/
# GitHub App credentials
gha-creds-*.jsonTo use this workflow, you can use either of the following methods:
- Run the
/setup-githubcommand in Gemini CLI on your terminal to set up workflows for your repository. - Copy the workflow files into your repository's
.github/workflowsdirectory:
mkdir -p .github/workflows
curl -o .github/workflows/gemini-dispatch.yml https://raw.githubusercontent.com/google-github-actions/run-gemini-cli/main/examples/workflows/gemini-dispatch/gemini-dispatch.yml
curl -o .github/workflows/gemini-review.yml https://raw.githubusercontent.com/google-github-actions/run-gemini-cli/main/examples/workflows/pr-review/gemini-review.ymlNote: The
gemini-dispatch.ymlworkflow is designed to call multiple workflows. If you are only setting upgemini-review.yml, you should comment out or remove the other jobs in your copy ofgemini-dispatch.yml.
This workflow relies on the gemini-dispatch.yml workflow to route requests to the appropriate workflow.
The Gemini PR Review workflow is triggered by:
- New PRs: When a pull request is opened or reopened
- PR Review Comments: When a review comment contains
@gemini-cli /review - PR Reviews: When a review body contains
@gemini-cli /review - Issue Comments: When a comment on a PR contains
@gemini-cli /review - Manual Dispatch: Via the GitHub Actions UI ("Run workflow")
The workflow follows a clear, multi-step process to handle review requests:
flowchart TD
subgraph Triggers
A[PR Opened]
B[PR Review Comment with '@gemini-cli /review']
C[PR Review with '@gemini-cli /review']
D[Issue Comment with '@gemini-cli /review']
E[Manual Dispatch via Actions UI]
end
subgraph "Gemini CLI Workflow"
F[Generate GitHub App Token]
G[Checkout PR Code]
H[Get PR Details & Changed Files]
I[Run Gemini PR Review Analysis]
J[Post Review to PR]
end
A --> F
B --> F
C --> F
D --> F
E --> F
F --> G
G --> H
H --> I
I --> J
The workflow automatically triggers on:
- New PRs: When a pull request is opened
Trigger a review manually by commenting on a PR:
@gemini-cli /review
You can provide specific focus areas by adding instructions after the trigger:
@gemini-cli /review focus on security
@gemini-cli /review check performance and memory usage
@gemini-cli /review please review error handling
@gemini-cli /review look for breaking changes
You can also trigger reviews through the GitHub Actions UI:
- Go to Actions tab in your repository
- Select "Gemini PR Review" workflow
- Click "Run workflow"
- Enter the PR number to review
The AI review follows a structured format, providing both a high-level summary and detailed inline feedback.
After posting all inline comments, the action submits the review with a final summary comment that includes:
- Review Summary: A brief 2-3 sentence overview of the pull request and the overall assessment.
- General Feedback: High-level observations about code quality, architectural patterns, positive implementation aspects, or recurring themes that were not addressed in inline comments.
The action provides specific, actionable feedback directly on the relevant lines of code in the pull request. Each comment includes:
- Priority: An emoji indicating the severity of the feedback.
- 🔴 Critical: Must be fixed before merging (e.g., security vulnerabilities, breaking changes).
- 🟠 High: Should be addressed (e.g., performance issues, design flaws).
- 🟡 Medium: Recommended improvements (e.g., code quality, style).
- 🟢 Low: Nice-to-have suggestions (e.g., documentation, minor refactoring).
- 🔵 Unclear: Priority is not determined.
- Suggestion: A code block with a suggested change, where applicable.
Example Inline Comment:
🟢 Use camelCase for function names
myFunction
Gemini CLI analyzes multiple dimensions of code quality:
- Security: Authentication, authorization, input validation, data sanitization
- Performance: Algorithms, database queries, caching, resource usage
- Reliability: Error handling, logging, testing coverage, edge cases
- Maintainability: Code structure, documentation, naming conventions
- Functionality: Logic correctness, requirements fulfillment
You can customize the workflow by modifying:
- Timeout: Adjust
timeout-minutesfor longer reviews - Triggers: Modify when the workflow runs
- Permissions: Adjust who can trigger manual reviews
- Core Tools: Add or remove available shell commands
The review prompt is defined in the gemini-review.toml file. The action automatically copies this file from .github/commands/ to .gemini/commands/ during execution.
To customize the review prompt:
-
Copy the TOML file to your repository:
mkdir -p .gemini/commands curl -o .gemini/commands/gemini-review.toml https://raw.githubusercontent.com/google-github-actions/run-gemini-cli/main/examples/workflows/pr-review/gemini-review.toml
-
Edit
.gemini/commands/gemini-review.tomlto customize:- Focus on specific technologies or frameworks
- Emphasize particular coding standards
- Include project-specific guidelines
- Adjust review depth and focus areas
-
Commit the file to your repository:
git add .gemini/commands/gemini-review.toml git commit -m "feat: customize PR review prompt"
The workflow will use your custom TOML file instead of the default one from the action.
For more details on workflow configuration, see the Configuration Guide.
@gemini-cli /review
@gemini-cli /review focus on security vulnerabilities and authentication
@gemini-cli /review check for performance issues and optimization opportunities
@gemini-cli /review look for potential breaking changes and API compatibility
By default, this workflow is configured to work with pull requests from branches
within the same repository, and does not allow the pr-review workflow to be
triggered for pull requests from branches from forks. This is done because forks
can be created from bad actors, and enabling this workflow to run on branches
from forks could enable bad actors to access secrets.
This behavior may not be ideal for all use cases - such as private repositories.
To enable the pr-review workflow to run on branches in forks, there are several
approaches depending on your authentication setup and security requirements.
Please refer to the GitHub documentation links provided below for
the security and access considerations of doing so.
Depending on your security requirements and use case, you can choose from these approaches:
This could work for repositories where contributors can provide their own Google authentication in their forks.
How it works: If forks have their own Google authentication configured, you can enable fork support by simply removing the fork restriction condition in the dispatch workflow.
Implementation:
-
Remove the fork restriction in
gemini-dispatch.yml:# Change this condition to remove the fork check if: |- ( github.event_name == 'pull_request' # Remove this line: && github.event.pull_request.head.repo.fork == false ) || ( # ... rest of conditions )
-
Document for contributors that they need to configure Google authentication in their fork as described in the Authentication documentation.
This could work for private repositories where you want to provide API access centrally.
Important Security Note: Using pull_request_target can introduce security
vulnerabilities if not handled with extreme care. Because it runs in the context
of the base repository, it has access to secrets and other sensitive data.
Always ensure you are following security best practices, such as those outlined
in the linked resources, to prevent unauthorized access or code execution.