CtrlK
BlogDocsLog inGet started
Tessl Logo

implement-posix-command

Implement a new POSIX command as a builtin in the safe shell interpreter

65

Quality

58%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Advisory

Suggest reviewing before use

Optimize this skill with Tessl

npx tessl skill review --optimize ./.claude/skills/implement-posix-command/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

40%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

The description identifies a clear and distinctive niche (implementing POSIX builtins in a safe shell interpreter), which reduces conflict risk. However, it lacks a 'Use when...' clause entirely, provides only a single action verb, and could benefit from more natural trigger terms that users might actually say when requesting this kind of work.

Suggestions

Add an explicit 'Use when...' clause, e.g., 'Use when the user asks to add, implement, or create a new shell builtin command in the safe shell interpreter.'

Include natural trigger term variations such as 'add a command', 'new builtin', 'shell command implementation', 'safe-sh', or 'extend the shell'.

List more specific concrete actions, e.g., 'Implements argument parsing, registers the command in the builtin table, handles edge cases per POSIX spec, and adds tests.'

DimensionReasoningScore

Specificity

It names a specific domain (POSIX command, builtin, safe shell interpreter) and one action (implement), but doesn't list multiple concrete actions or elaborate on what implementing entails (e.g., parsing arguments, registering the command, writing tests).

2 / 3

Completeness

It describes what (implement a new POSIX command as a builtin) but completely lacks a 'Use when...' clause or any explicit trigger guidance for when Claude should select this skill. Per the rubric, a missing 'Use when...' clause caps completeness at 2, and the 'what' itself is also thin, so this scores a 1.

1 / 3

Trigger Term Quality

Includes some relevant technical keywords like 'POSIX command', 'builtin', and 'shell interpreter', but misses common variations users might say such as 'add a command', 'shell builtin', 'new shell command', or 'safe-sh'. The term 'safe shell interpreter' is somewhat niche and may not match how users phrase requests.

2 / 3

Distinctiveness Conflict Risk

The description targets a very specific niche—adding builtins to a safe shell interpreter—which is unlikely to conflict with other skills. The combination of 'POSIX command', 'builtin', and 'safe shell interpreter' creates a distinct trigger profile.

3 / 3

Total

8

/

12

Passed

Implementation

77%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a highly actionable and well-structured skill for implementing POSIX commands as shell builtins. Its greatest strengths are the precise, executable code examples and the rigorous 10-step workflow with explicit gate checks, parallel execution rules, and multi-pass validation. Its main weakness is length — at 500+ lines with no bundle files for progressive disclosure, it pushes the limits of token efficiency, though most content genuinely earns its place given the complexity of the task.

Suggestions

Split detailed checklists (pentest cases in Step 8, fuzz seed sources in Step 9, code review criteria in Step 7) into separate reference files to reduce the main SKILL.md to an overview with pointers, improving progressive disclosure and conciseness.

Remove or condense the GNU equivalence test scenario table and the detailed 'How to get GNU $ARGUMENTS' instructions — Claude can determine appropriate test scenarios from the approved flag list without a 16-row prescriptive table.

DimensionReasoningScore

Conciseness

The skill is extremely detailed and thorough, but it's also very long (~500+ lines) with significant repetition. Template variables like $ARGUMENTS are used throughout, and some sections (e.g., the GNU equivalence test table, the pentest checklist) are exhaustive but could be more concise. However, most content is genuinely instructive rather than explaining things Claude already knows — the verbosity serves the complexity of the task.

2 / 3

Actionability

The skill provides fully executable Go code snippets, exact bash commands, specific file paths, concrete YAML schema examples, and precise function signatures. Every step has copy-paste-ready code and specific instructions — from test helper functions to registry entries to CI configuration. Nothing is left vague or abstract.

3 / 3

Workflow Clarity

The 10-step workflow is explicitly sequenced with gate checks, parallel step handling, and convergence points. Each step has clear entry conditions (TaskList verification), explicit validation checkpoints (run tests, verify builds fail, re-run after fixes), and feedback loops (fix → re-validate → only proceed when green). The second-pass review in Step 7 is a particularly strong validation checkpoint.

3 / 3

Progressive Disclosure

The skill references external files well (RULES.md, existing builtins like cat.go, SHELL_FEATURES.md), but the SKILL.md itself is monolithic — all 10 steps with full detail are inline in a single very long document. Steps 7-9 alone contain extensive checklists and code that could be split into separate reference files. Without bundle files to offload detail, the single-file approach creates a wall of text.

2 / 3

Total

10

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

skill_md_line_count

SKILL.md is long (611 lines); consider splitting into references/ and linking

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
DataDog/rshell
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.