Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build secure, scalable access control systems. Use when implementing auth systems, securing APIs, or debugging security issues.
83
75%
Does it follow best practices?
Impact
100%
1.19xAverage score across 3 eval scenarios
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./tests/ext_conformance/artifacts/agents-wshobson/developer-essentials/skills/auth-implementation-patterns/SKILL.mdQuality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a strong skill description that clearly identifies its domain (auth/authz patterns), lists specific technologies and concepts (JWT, OAuth2, RBAC, session management), and provides explicit trigger guidance. The only minor issue is the use of imperative 'Master' at the start, which reads slightly like instructional text rather than a pure third-person capability description, but the rest of the description uses appropriate voice.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions and patterns: JWT, OAuth2, session management, RBAC, securing APIs, debugging security issues, and building access control systems. | 3 / 3 |
Completeness | Clearly answers both 'what' (authentication/authorization patterns including JWT, OAuth2, session management, RBAC for secure access control) and 'when' (explicit 'Use when implementing auth systems, securing APIs, or debugging security issues'). | 3 / 3 |
Trigger Term Quality | Includes strong natural keywords users would say: 'authentication', 'authorization', 'JWT', 'OAuth2', 'session management', 'RBAC', 'auth systems', 'securing APIs', 'security issues'. These cover common variations well. | 3 / 3 |
Distinctiveness Conflict Risk | The description carves out a clear niche around authentication and authorization specifically, with distinct trigger terms like JWT, OAuth2, RBAC, and session management that are unlikely to conflict with other skills. | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
50%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
The skill provides excellent, executable code examples covering a comprehensive range of auth patterns, which is its primary strength. However, it is severely bloated—explaining basic concepts Claude already knows, including generic best practices lists, and inlining hundreds of lines of code that should be in referenced files. The content would be far more effective as a concise overview with pointers to detailed pattern files.
Suggestions
Remove the 'Core Concepts' section entirely and trim 'Best Practices' and 'Common Pitfalls' to only non-obvious, project-specific guidance—Claude already knows standard security principles.
Move detailed code patterns (JWT, Session, OAuth2, RBAC) into separate referenced files (e.g., references/jwt-pattern.md) and keep SKILL.md as a concise overview with brief descriptions and links.
Add an explicit implementation workflow with sequencing and validation checkpoints, e.g., '1. Choose auth strategy → 2. Implement basic auth → 3. Test with curl examples → 4. Add authorization layer → 5. Security audit against checklist'.
Cut the file length by at least 50% by removing redundant comments within code examples and eliminating explanatory text that restates what the code already shows.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | Extremely verbose at ~500+ lines. Explains basic concepts Claude already knows (AuthN vs AuthZ definitions, what sessions are, what OAuth is). The 'Core Concepts' section is entirely unnecessary. Best practices and common pitfalls lists are generic security knowledge Claude already possesses. Much of this could be cut by 60%+ without losing actionable value. | 1 / 3 |
Actionability | The code examples are fully executable TypeScript with proper imports, type definitions, and complete implementations. Patterns for JWT, refresh tokens, sessions, OAuth2, RBAC, permission-based access, and resource ownership are all copy-paste ready with concrete usage examples. | 3 / 3 |
Workflow Clarity | Individual patterns are clear and well-structured, but there's no overarching workflow for implementing an auth system end-to-end. No validation checkpoints (e.g., 'test your JWT flow before adding refresh tokens'). For security-critical operations like auth implementation, the lack of verification steps and sequencing guidance is a notable gap. | 2 / 3 |
Progressive Disclosure | References to external files exist at the bottom (references/jwt-best-practices.md, scripts/token-validator.ts, etc.), but the main file is a monolithic wall of code that should have much of its content split into those referenced files. The SKILL.md should be an overview pointing to detailed pattern files, not contain every pattern inline. | 2 / 3 |
Total | 8 / 12 Passed |
Validation
90%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 10 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
skill_md_line_count | SKILL.md is long (648 lines); consider splitting into references/ and linking | Warning |
Total | 10 / 11 Passed | |
6e3d68c
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.