CtrlK
BlogDocsLog inGet started
Tessl Logo

giuseppe-trisciuoglio/developer-kit

Comprehensive developer toolkit providing reusable skills for Java/Spring Boot, TypeScript/NestJS/React/Next.js, Python, PHP, AWS CloudFormation, AI/RAG, DevOps, and more.

89

Quality

89%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Risky

Do not use without reviewing

Overview
Quality
Evals
Security
Files

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is an excellent skill description that clearly defines its scope at the intersection of AWS CloudFormation and IAM. It lists specific concrete capabilities, includes a well-formed 'Use when' clause with natural trigger terms, and occupies a distinct niche that minimizes conflict risk with other skills. The description is concise yet comprehensive.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions and artifacts: IAM roles, policies, managed policies, permission boundaries, trust relationships, and CloudFormation patterns. Also specifies use cases like least-privilege access, cross-account assumptions, service roles, and reusable IAM stacks.

3 / 3

Completeness

Clearly answers both 'what' (provides CloudFormation patterns for IAM roles, policies, managed policies, permission boundaries, trust relationships) and 'when' (explicit 'Use when' clause covering least-privilege access, cross-account assumptions, service roles, reusable IAM stacks).

3 / 3

Trigger Term Quality

Includes strong natural keywords users would say: 'CloudFormation', 'IAM roles', 'policies', 'permission boundaries', 'trust relationships', 'least-privilege', 'cross-account', 'service roles'. These are terms AWS practitioners naturally use when seeking this kind of help.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive niche combining AWS CloudFormation specifically with IAM constructs. The intersection of CloudFormation + IAM + specific patterns like permission boundaries and trust relationships makes it very unlikely to conflict with general AWS, general IaC, or general security skills.

3 / 3

Total

12

/

12

Passed

Implementation

85%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a well-structured IAM CloudFormation skill with strong actionability through executable YAML examples and CLI validation commands, clear workflow sequencing, and appropriate progressive disclosure to reference files. The main weakness is moderate verbosity—some sections explain concepts Claude already understands (IAM best practices, what permission boundaries do) and could be condensed without losing clarity.

Suggestions

Trim the 'Best Practices' and 'Constraints and Warnings' sections to only non-obvious, project-specific guidance rather than general IAM knowledge Claude already possesses.

Condense the 'When to Use' section into a shorter bullet list or remove it entirely, as the overview already establishes scope.

DimensionReasoningScore

Conciseness

The skill is mostly efficient but includes some unnecessary prose that Claude already knows (e.g., explaining what permission boundaries are, general IAM philosophy). Sections like 'When to Use' and 'Constraints and Warnings' contain guidance that is somewhat obvious to Claude. The instructions could be tighter.

2 / 3

Actionability

Provides executable CloudFormation YAML examples that are copy-paste ready, concrete CLI commands for validation and simulation, and specific patterns for Lambda roles and cross-account access with external IDs. The guidance is specific and directly usable.

3 / 3

Workflow Clarity

The 5-step workflow is clearly sequenced from trust boundary definition through validation. Step 5 includes explicit validation commands (template validation, change sets, policy simulation) forming a verify-before-deploy checkpoint. The sequence is logical and includes feedback mechanisms.

3 / 3

Progressive Disclosure

The skill provides a clear overview with concise examples inline, then points to `references/examples.md` and `references/reference.md` for expanded content. Related skills are listed for cross-navigation. References are one level deep and clearly signaled.

3 / 3

Total

11

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

Total

10

/

11

Passed

Reviewed

Table of Contents