Five-skill presentation system: ingest talks into a rhetoric vault, run interactive clarification, generate a speaker profile, create presentations that match your documented patterns, and produce the deck illustrations + thumbnail visual layer. Includes a 102-entry Presentation Patterns taxonomy (91 observable, 11 unobservable go-live items) for scoring, brainstorming, and go-live preparation.
93
95%
Does it follow best practices?
Impact
93%
1.20xAverage score across 34 eval scenarios
Advisory
Suggest reviewing before use
tessl update rewrites tessl.json in-place at runtime, and the resolved-version state under .tessl/tiles/ is gitignored. Pinning a literal version in tessl.json produces silent drift where the committed manifest and the running install disagree across every tessl install.jbaruch/coding-policy: dependency-management permits a floating-but-explicit specifier ("version": "latest") for this exact shape, subject to three preconditions. This rule is the authority-of-record satisfying preconditions (1) and (3): it names the carve-out, lists every covered manifest, and explains why pin/lock semantics break.tessl.json (project root) — consumed by tessl install to populate the gitignored .tessl/tiles/ directory that backs @.tessl/RULES.md resolution at agent runtime. Vendored-mode means every tessl install re-resolves dependencies, and any pin here would diverge from the running install on the very next tessl update. Every dependency in this manifest must float — mixed pin/float within a covered manifest is forbidden by the carve-out's "any disallowed specifier" clause.No other manifest in this repo is covered. Every other dependency-bearing manifest (pyproject.toml, etc.) still pins per the default clause of dependency-management.
scripts/check-tessl-pins.sh walks every covered manifest and fails the build if any dependency uses a specifier other than the permitted floating value "latest" — rejecting literal pins, version ranges, tags, and anything else, per the carve-out's warning that "rejecting only literal pins lets a non-literal pinned/ranged value slip through"..github/workflows/tests.yml, ahead of the test suite. CI failure blocks merge per ci-safety.scripts/check-tessl-pins.sh walks it. Adding a manifest without updating both invalidates the precondition.tessl install does not rewrite — manifests inside vendored tiles, manifests in subtrees not consumed by tessl install — still pin per the default policy.evals
scenario-1
scenario-2
scenario-3
scenario-4
scenario-5
scenario-6
scenario-7
scenario-8
scenario-9
scenario-10
scenario-11
scenario-12
scenario-13
scenario-14
scenario-15
scenario-16
scenario-17
scenario-18
scenario-19
scenario-20
scenario-21
scenario-22
scenario-23
scenario-24
scenario-25
scenario-26
scenario-27
scenario-28
scenario-29
scenario-30
scenario-31
scenario-32
scenario-33
scenario-34
rules
skills
illustrations
presentation-creator
references
patterns
build
deliver
prepare
scripts
vault-clarification
vault-ingress
vault-profile