CtrlK
BlogDocsLog inGet started
Tessl Logo

auth-implementation-patterns

Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build secure, scalable access control systems. Use when implementing auth systems, securing APIs, or debugging security issues.

83

1.19x
Quality

75%

Does it follow best practices?

Impact

100%

1.19x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./tests/ext_conformance/artifacts/agents-wshobson/developer-essentials/skills/auth-implementation-patterns/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a strong skill description that clearly identifies its domain (auth/authz patterns), lists specific technologies and concepts (JWT, OAuth2, RBAC, session management), and provides explicit trigger guidance. The only minor issue is the use of imperative 'Master' at the start, which reads slightly like instructional text rather than a pure third-person capability description, but the rest of the description uses appropriate voice.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions and patterns: JWT, OAuth2, session management, RBAC, securing APIs, debugging security issues, and building access control systems.

3 / 3

Completeness

Clearly answers both 'what' (authentication/authorization patterns including JWT, OAuth2, session management, RBAC for secure access control) and 'when' (explicit 'Use when implementing auth systems, securing APIs, or debugging security issues').

3 / 3

Trigger Term Quality

Includes strong natural keywords users would say: 'authentication', 'authorization', 'JWT', 'OAuth2', 'session management', 'RBAC', 'auth systems', 'securing APIs', 'security issues'. These cover common variations well.

3 / 3

Distinctiveness Conflict Risk

The description carves out a clear niche around authentication and authorization specifically, with distinct trigger terms like JWT, OAuth2, RBAC, and session management that are unlikely to conflict with other skills.

3 / 3

Total

12

/

12

Passed

Implementation

50%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

The skill provides excellent, executable code examples covering a comprehensive range of auth patterns, which is its primary strength. However, it is severely bloated—explaining basic concepts Claude already knows, including generic best practices lists, and inlining hundreds of lines of code that should be in referenced files. The content would be far more effective as a concise overview with pointers to detailed pattern files.

Suggestions

Remove the 'Core Concepts' section entirely and trim 'Best Practices' and 'Common Pitfalls' to only non-obvious, project-specific guidance—Claude already knows standard security principles.

Move detailed code patterns (JWT, Session, OAuth2, RBAC) into separate referenced files (e.g., references/jwt-pattern.md) and keep SKILL.md as a concise overview with brief descriptions and links.

Add an explicit implementation workflow with sequencing and validation checkpoints, e.g., '1. Choose auth strategy → 2. Implement basic auth → 3. Test with curl examples → 4. Add authorization layer → 5. Security audit against checklist'.

Cut the file length by at least 50% by removing redundant comments within code examples and eliminating explanatory text that restates what the code already shows.

DimensionReasoningScore

Conciseness

Extremely verbose at ~500+ lines. Explains basic concepts Claude already knows (AuthN vs AuthZ definitions, what sessions are, what OAuth is). The 'Core Concepts' section is entirely unnecessary. Best practices and common pitfalls lists are generic security knowledge Claude already possesses. Much of this could be cut by 60%+ without losing actionable value.

1 / 3

Actionability

The code examples are fully executable TypeScript with proper imports, type definitions, and complete implementations. Patterns for JWT, refresh tokens, sessions, OAuth2, RBAC, permission-based access, and resource ownership are all copy-paste ready with concrete usage examples.

3 / 3

Workflow Clarity

Individual patterns are clear and well-structured, but there's no overarching workflow for implementing an auth system end-to-end. No validation checkpoints (e.g., 'test your JWT flow before adding refresh tokens'). For security-critical operations like auth implementation, the lack of verification steps and sequencing guidance is a notable gap.

2 / 3

Progressive Disclosure

References to external files exist at the bottom (references/jwt-best-practices.md, scripts/token-validator.ts, etc.), but the main file is a monolithic wall of code that should have much of its content split into those referenced files. The SKILL.md should be an overview pointing to detailed pattern files, not contain every pattern inline.

2 / 3

Total

8

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

skill_md_line_count

SKILL.md is long (648 lines); consider splitting into references/ and linking

Warning

Total

10

/

11

Passed

Repository
Dicklesworthstone/pi_agent_rust
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.