CtrlK
BlogDocsLog inGet started
Tessl Logo

hybrid-cloud-networking

Configure secure, high-performance connectivity between on-premises infrastructure and cloud platforms using VPN and dedicated connections. Use when building hybrid cloud architectures, connecting data centers to cloud, or implementing secure cross-premises networking.

76

1.05x
Quality

63%

Does it follow best practices?

Impact

98%

1.05x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./tests/ext_conformance/artifacts/agents-wshobson/cloud-infrastructure/skills/hybrid-cloud-networking/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

89%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a solid skill description that clearly communicates both what the skill does and when to use it, with an explicit 'Use when' clause and good trigger terms. Its main weakness is that the capability description could be more specific by listing concrete actions (e.g., configuring IPSec tunnels, setting up AWS Direct Connect or Azure ExpressRoute, managing route propagation) rather than staying at a somewhat high level.

Suggestions

Add more specific concrete actions such as 'configure IPSec tunnels, set up AWS Direct Connect or Azure ExpressRoute, manage BGP peering and route propagation' to improve specificity.

DimensionReasoningScore

Specificity

The description names the domain (hybrid cloud networking) and some actions ('configure secure, high-performance connectivity', 'VPN and dedicated connections'), but doesn't list multiple specific concrete actions like configuring IPSec tunnels, setting up BGP peering, managing Direct Connect/ExpressRoute, or configuring route tables.

2 / 3

Completeness

Clearly answers both 'what' (configure secure connectivity between on-premises and cloud using VPN and dedicated connections) and 'when' (explicit 'Use when' clause covering hybrid cloud architectures, data center to cloud connections, and cross-premises networking).

3 / 3

Trigger Term Quality

Good coverage of natural terms users would say: 'VPN', 'dedicated connections', 'hybrid cloud', 'data centers to cloud', 'on-premises', 'cross-premises networking'. These are terms a user would naturally use when needing this skill.

3 / 3

Distinctiveness Conflict Risk

The description carves out a clear niche around hybrid cloud connectivity with specific triggers like 'VPN', 'dedicated connections', 'on-premises to cloud', and 'cross-premises networking' that are unlikely to conflict with general cloud or networking skills.

3 / 3

Total

11

/

12

Passed

Implementation

37%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This skill provides a broad overview of hybrid cloud networking options across AWS, Azure, and GCP with some useful Terraform examples, but it reads more like a reference document than an actionable skill. It lacks sequential workflows with validation checkpoints, which is critical for infrastructure operations, and includes generic best-practice lists that Claude already knows. The content would benefit from being restructured around a clear implementation workflow with verification steps.

Suggestions

Add a clear step-by-step workflow (e.g., 'Setting up AWS Site-to-Site VPN') with explicit validation checkpoints like verifying tunnel status, testing connectivity, and confirming BGP route propagation before proceeding.

Remove generic advice lists (security best practices, cost optimization) that Claude already knows, or replace them with specific, actionable commands/configurations unique to hybrid networking.

Convert the BGP configuration section from pseudocode to actual executable configuration (e.g., real router config or Terraform aws_dx_bgp_peer resource).

Split per-cloud-provider details into separate reference files and keep the main skill focused on the decision framework and a single end-to-end workflow example.

DimensionReasoningScore

Conciseness

The skill includes some unnecessary explanatory content (e.g., bullet-point descriptions of what VPN and Direct Connect are, which Claude already knows), and the security best practices and cost optimization sections are generic lists that don't add skill-specific value. However, the code examples are reasonably focused.

2 / 3

Actionability

The Terraform code blocks are concrete and executable, which is good. However, many sections are bullet-point lists of general advice (security best practices, cost optimization, routing configuration) rather than specific, actionable instructions. The BGP configuration is pseudocode rather than actual router config, and key details like Direct Connect setup are deferred to reference files.

2 / 3

Workflow Clarity

There is no clear sequential workflow for setting up hybrid connectivity. The content presents options and patterns but never walks through a step-by-step process with validation checkpoints. For operations involving network infrastructure changes (which are potentially disruptive), there are no verification steps, rollback procedures, or feedback loops.

1 / 3

Progressive Disclosure

References to external files exist (references/vpn-setup.md, references/direct-connect.md) and related skills are mentioned, which is good. However, the main file is quite long with inline content that could be split out (e.g., per-cloud provider details), and the references are not well-signaled with descriptions of what they contain.

2 / 3

Total

7

/

12

Passed

Validation

100%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation11 / 11 Passed

Validation for skill structure

No warnings or errors.

Repository
Dicklesworthstone/pi_agent_rust
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.