This skill should be used when the user says "manage secrets", "arn infra secrets", "infra secrets", "secrets management", "set up secrets", "configure secrets", "audit secrets", "secrets audit", "rotate secrets", "secret storage", "vault setup", "key management", "credential management", "secrets scan", "check for exposed secrets", "secrets provider", "arn-infra-secrets", "set up secret manager", "configure secret injection", "environment variables", "env vars", "secure env vars", or wants to set up, configure, audit, or manage secrets and credential storage for their infrastructure deployment.
59
49%
Does it follow best practices?
Impact
—
No eval scenarios have been run
Risky
Do not use without reviewing
Optimize this skill with Tessl
npx tessl skill review --optimize ./plugins/arn-infra/skills/arn-infra-secrets/SKILL.mdQuality
Discovery
37%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
The description is essentially a long list of trigger phrases with no explanation of what the skill actually does. While the trigger term coverage is excellent, the complete absence of concrete capability descriptions makes it impossible for Claude to understand the skill's scope or differentiate it from other infrastructure/security skills. The description needs a clear 'what it does' section listing specific actions.
Suggestions
Add a concrete capability summary before the trigger list, e.g., 'Configures secrets management providers (AWS Secrets Manager, HashiCorp Vault), scans codebases for exposed credentials, sets up secret injection into environment variables, and audits secret rotation policies.'
Restructure into a 'what it does' section followed by a 'Use when...' clause rather than leading with an exhaustive trigger phrase list, which obscures the skill's actual purpose.
Narrow the scope or clarify boundaries — specify which providers/tools are supported and what is out of scope to reduce overlap with generic infrastructure or security scanning skills.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | The description lists no concrete actions or capabilities. It only provides trigger phrases and a vague closing clause about setting up, configuring, auditing, or managing secrets. There is no explanation of what the skill actually does (e.g., 'creates Vault configurations', 'scans codebases for exposed credentials', 'rotates AWS Secrets Manager keys'). | 1 / 3 |
Completeness | While the 'when' is thoroughly addressed via the long list of trigger phrases, the 'what does this do' is essentially absent — there is no description of the skill's actual capabilities, outputs, or behaviors. The rubric requires both to be present; the 'what' is very weak. | 1 / 3 |
Trigger Term Quality | The description includes an extensive list of natural trigger terms covering many variations a user might say, including 'manage secrets', 'rotate secrets', 'env vars', 'credential management', 'vault setup', 'secrets scan', 'check for exposed secrets', and more. This provides excellent keyword coverage. | 3 / 3 |
Distinctiveness Conflict Risk | The domain of secrets management is fairly specific, but the description is so broad (covering auditing, scanning, rotation, storage, vault setup, key management, credential management, environment variables) that it could overlap with dedicated env-var management skills, security scanning skills, or infrastructure provisioning skills. | 2 / 3 |
Total | 7 / 12 Passed |
Implementation
62%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This is a well-structured workflow skill with clear sequencing, good error handling, and appropriate user confirmation gates. Its main weaknesses are moderate verbosity (repeated experience-level branching instructions, inline reference material that could be externalized) and a lack of fully executable code examples — the guidance is specific but often descriptive rather than copy-paste ready. The progressive disclosure intent is sound but hard to fully validate without bundle files.
Suggestions
Add executable code/command examples for at least one provider's setup (e.g., complete Terraform block for AWS Secrets Manager, or a full SOPS configuration example) rather than listing one-liner references.
Extract the provider mapping table and injection configuration details into separate reference files (e.g., `secrets-providers.md`, `secrets-injection.md`) to reduce the main skill's length and improve progressive disclosure.
Consolidate the repeated 'For beginners/experts' instructions into a single reusable pattern or reference at the top of the skill instead of repeating it in Steps 3, 4, and 5.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill is fairly long and includes some redundant phrasing (e.g., repeating 'For beginners, simplify guidance to the most common pattern only. For experts, show all available options with configuration details.' three times). The provider mapping tables and injection references are useful but could be tighter. Some sections explain things Claude could infer, but overall it's not egregiously verbose. | 2 / 3 |
Actionability | The skill provides structured steps and specific provider mappings (e.g., Terraform data sources, fly.io commands, GitHub Actions secrets), but lacks executable code examples. The IaC references are one-liners without full context, the secrets provider setup steps are high-level descriptions rather than copy-paste commands, and the scanning step delegates entirely to an agent without showing what to do if manual fallback is needed beyond grep. | 2 / 3 |
Workflow Clarity | The 6-step workflow is clearly sequenced with explicit validation checkpoints: scanning before recommending, user confirmation before executing setup, audit verification after configuration, and a summary with next steps. Error handling covers multiple failure modes with specific recovery paths. The feedback loop of scan → configure → audit → remediate is well-defined. | 3 / 3 |
Progressive Disclosure | The skill references external files like `secrets-providers.md`, `secrets-audit-checklist.md`, `experience-derivation.md`, and `tooling-manifest.json`, which suggests good intent for progressive disclosure. However, no bundle files were provided to verify these exist, and the main SKILL.md itself is quite long (~200+ lines) with inline content (provider mappings, injection configurations) that could be split into reference files. The references are one-level deep and clearly signaled, which is good. | 2 / 3 |
Total | 9 / 12 Passed |
Validation
90%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 10 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
Total | 10 / 11 Passed | |
1fe948f
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.