CtrlK
BlogDocsLog inGet started
Tessl Logo

arn-infra-secrets

This skill should be used when the user says "manage secrets", "arn infra secrets", "infra secrets", "secrets management", "set up secrets", "configure secrets", "audit secrets", "secrets audit", "rotate secrets", "secret storage", "vault setup", "key management", "credential management", "secrets scan", "check for exposed secrets", "secrets provider", "arn-infra-secrets", "set up secret manager", "configure secret injection", "environment variables", "env vars", "secure env vars", or wants to set up, configure, audit, or manage secrets and credential storage for their infrastructure deployment.

59

Quality

49%

Does it follow best practices?

Impact

No eval scenarios have been run

SecuritybySnyk

Risky

Do not use without reviewing

Optimize this skill with Tessl

npx tessl skill review --optimize ./plugins/arn-infra/skills/arn-infra-secrets/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

37%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

The description is essentially a long list of trigger phrases with no explanation of what the skill actually does. While the trigger term coverage is excellent, the complete absence of concrete capability descriptions makes it impossible for Claude to understand the skill's scope or differentiate it from other infrastructure/security skills. The description needs a clear 'what it does' section listing specific actions.

Suggestions

Add a concrete capability summary before the trigger list, e.g., 'Configures secrets management providers (AWS Secrets Manager, HashiCorp Vault), scans codebases for exposed credentials, sets up secret injection into environment variables, and audits secret rotation policies.'

Restructure into a 'what it does' section followed by a 'Use when...' clause rather than leading with an exhaustive trigger phrase list, which obscures the skill's actual purpose.

Narrow the scope or clarify boundaries — specify which providers/tools are supported and what is out of scope to reduce overlap with generic infrastructure or security scanning skills.

DimensionReasoningScore

Specificity

The description lists no concrete actions or capabilities. It only provides trigger phrases and a vague closing clause about setting up, configuring, auditing, or managing secrets. There is no explanation of what the skill actually does (e.g., 'creates Vault configurations', 'scans codebases for exposed credentials', 'rotates AWS Secrets Manager keys').

1 / 3

Completeness

While the 'when' is thoroughly addressed via the long list of trigger phrases, the 'what does this do' is essentially absent — there is no description of the skill's actual capabilities, outputs, or behaviors. The rubric requires both to be present; the 'what' is very weak.

1 / 3

Trigger Term Quality

The description includes an extensive list of natural trigger terms covering many variations a user might say, including 'manage secrets', 'rotate secrets', 'env vars', 'credential management', 'vault setup', 'secrets scan', 'check for exposed secrets', and more. This provides excellent keyword coverage.

3 / 3

Distinctiveness Conflict Risk

The domain of secrets management is fairly specific, but the description is so broad (covering auditing, scanning, rotation, storage, vault setup, key management, credential management, environment variables) that it could overlap with dedicated env-var management skills, security scanning skills, or infrastructure provisioning skills.

2 / 3

Total

7

/

12

Passed

Implementation

62%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a well-structured workflow skill with clear sequencing, good error handling, and appropriate user confirmation gates. Its main weaknesses are moderate verbosity (repeated experience-level branching instructions, inline reference material that could be externalized) and a lack of fully executable code examples — the guidance is specific but often descriptive rather than copy-paste ready. The progressive disclosure intent is sound but hard to fully validate without bundle files.

Suggestions

Add executable code/command examples for at least one provider's setup (e.g., complete Terraform block for AWS Secrets Manager, or a full SOPS configuration example) rather than listing one-liner references.

Extract the provider mapping table and injection configuration details into separate reference files (e.g., `secrets-providers.md`, `secrets-injection.md`) to reduce the main skill's length and improve progressive disclosure.

Consolidate the repeated 'For beginners/experts' instructions into a single reusable pattern or reference at the top of the skill instead of repeating it in Steps 3, 4, and 5.

DimensionReasoningScore

Conciseness

The skill is fairly long and includes some redundant phrasing (e.g., repeating 'For beginners, simplify guidance to the most common pattern only. For experts, show all available options with configuration details.' three times). The provider mapping tables and injection references are useful but could be tighter. Some sections explain things Claude could infer, but overall it's not egregiously verbose.

2 / 3

Actionability

The skill provides structured steps and specific provider mappings (e.g., Terraform data sources, fly.io commands, GitHub Actions secrets), but lacks executable code examples. The IaC references are one-liners without full context, the secrets provider setup steps are high-level descriptions rather than copy-paste commands, and the scanning step delegates entirely to an agent without showing what to do if manual fallback is needed beyond grep.

2 / 3

Workflow Clarity

The 6-step workflow is clearly sequenced with explicit validation checkpoints: scanning before recommending, user confirmation before executing setup, audit verification after configuration, and a summary with next steps. Error handling covers multiple failure modes with specific recovery paths. The feedback loop of scan → configure → audit → remediate is well-defined.

3 / 3

Progressive Disclosure

The skill references external files like `secrets-providers.md`, `secrets-audit-checklist.md`, `experience-derivation.md`, and `tooling-manifest.json`, which suggests good intent for progressive disclosure. However, no bundle files were provided to verify these exist, and the main SKILL.md itself is quite long (~200+ lines) with inline content (provider mappings, injection configurations) that could be split into reference files. The references are one-level deep and clearly signaled, which is good.

2 / 3

Total

9

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

10

/

11

Passed

Repository
AppsVortex/arness
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.