CtrlK
BlogDocsLog inGet started
Tessl Logo

gtfobins-validate

Validate shell builtins against GTFOBins attack patterns to ensure exploits are blocked by the sandbox

73

Quality

67%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Advisory

Suggest reviewing before use

Optimize this skill with Tessl

npx tessl skill review --optimize ./.claude/skills/gtfobins-validate/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

57%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

The description targets a clear and distinctive security niche (GTFOBins shell builtin validation), which makes it unlikely to conflict with other skills. However, it lacks an explicit 'Use when...' clause and could benefit from listing more concrete actions and natural trigger terms that users might employ when seeking this functionality.

Suggestions

Add an explicit 'Use when...' clause, e.g., 'Use when checking shell commands for GTFOBins exploits, auditing sandbox security, or testing if builtins can be abused for privilege escalation.'

Include additional natural trigger terms users might say, such as 'privilege escalation', 'security audit', 'command injection', 'LOLBAS', or 'escape sandbox'.

DimensionReasoningScore

Specificity

The description names a specific domain (shell builtins, GTFOBins attack patterns, sandbox) and a core action (validate/ensure exploits are blocked), but it doesn't list multiple concrete actions—it's essentially one action described with context.

2 / 3

Completeness

The 'what' is reasonably clear (validate shell builtins against GTFOBins patterns), but there is no explicit 'Use when...' clause or equivalent trigger guidance, which caps this at 2 per the rubric guidelines.

2 / 3

Trigger Term Quality

Includes relevant technical keywords like 'shell builtins', 'GTFOBins', 'sandbox', and 'exploits', which are terms a security-focused user might use. However, it misses common variations like 'privilege escalation', 'security audit', 'LOLBAS', or 'command injection' that users might naturally say.

2 / 3

Distinctiveness Conflict Risk

This is a very specific niche—GTFOBins validation against shell builtins in a sandbox context. It is highly unlikely to conflict with other skills given the narrow and specialized domain.

3 / 3

Total

9

/

12

Passed

Implementation

77%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a strong, highly actionable security validation skill with a clear multi-step workflow, explicit validation checkpoints, and executable test patterns. Its main weakness is moderate verbosity — the known attack patterns section and notes partially duplicate information from the workflow, and the entire document could benefit from splitting reference material into separate files. The security preamble against prompt injection is well-justified and appropriately prominent.

Suggestions

Consider extracting the 'Known GTFOBins attack patterns' reference section and detailed test templates into a separate PATTERNS.md or REFERENCE.md file to reduce the main skill's token footprint.

Remove the Notes section at the bottom, as its three bullet points restate information already covered in the Step 3 classification table.

DimensionReasoningScore

Conciseness

The skill is reasonably well-structured but includes some redundant content. The 'Known GTFOBins attack patterns' section partially duplicates what the workflow already describes, and the Notes section restates information from the classification table. The security preamble is justified given the threat model but is somewhat verbose.

2 / 3

Actionability

The skill provides fully executable Go test patterns, specific file paths, exact bash commands to run tests, concrete flag examples (e.g., `-c-0`, `--files0-from`), and clear naming conventions. The test templates are copy-paste ready with only command-specific substitutions needed.

3 / 3

Workflow Clarity

The 6-step workflow is clearly sequenced with explicit validation checkpoints: Step 5 runs tests and verifies, the 'Critical findings' section defines a stop-and-report feedback loop for exploitable techniques, and the classification table in Step 3 provides clear decision criteria for each attack category.

3 / 3

Progressive Disclosure

The content is well-organized with clear sections and a logical hierarchy, but it's a long monolithic document (~180 lines of substantive content) with no references to external files. The known attack patterns section and detailed test templates could be split into separate reference files. However, no bundle files exist to support such splitting.

2 / 3

Total

10

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

10

/

11

Passed

Repository
DataDog/rshell
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.