Configure secure, high-performance connectivity between on-premises infrastructure and cloud platforms using VPN and dedicated connections. Use when building hybrid cloud architectures, connecting data centers to cloud, or implementing secure cross-premises networking.
76
63%
Does it follow best practices?
Impact
98%
1.05xAverage score across 3 eval scenarios
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./tests/ext_conformance/artifacts/agents-wshobson/cloud-infrastructure/skills/hybrid-cloud-networking/SKILL.mdQuality
Discovery
89%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a solid skill description that clearly communicates both what the skill does and when to use it, with an explicit 'Use when' clause and good trigger terms. Its main weakness is that the capability description could be more specific by listing concrete actions (e.g., configuring IPSec tunnels, setting up AWS Direct Connect or Azure ExpressRoute, managing route propagation) rather than staying at a somewhat high level.
Suggestions
Add more specific concrete actions such as 'configure IPSec tunnels, set up AWS Direct Connect or Azure ExpressRoute, manage BGP peering and route propagation' to improve specificity.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | The description names the domain (hybrid cloud networking) and some actions ('configure secure, high-performance connectivity', 'VPN and dedicated connections'), but doesn't list multiple specific concrete actions like configuring IPSec tunnels, setting up BGP peering, managing Direct Connect/ExpressRoute, or configuring route tables. | 2 / 3 |
Completeness | Clearly answers both 'what' (configure secure connectivity between on-premises and cloud using VPN and dedicated connections) and 'when' (explicit 'Use when' clause covering hybrid cloud architectures, data center to cloud connections, and cross-premises networking). | 3 / 3 |
Trigger Term Quality | Good coverage of natural terms users would say: 'VPN', 'dedicated connections', 'hybrid cloud', 'data centers to cloud', 'on-premises', 'cross-premises networking'. These are terms a user would naturally use when needing this skill. | 3 / 3 |
Distinctiveness Conflict Risk | The description carves out a clear niche around hybrid cloud connectivity with specific triggers like 'VPN', 'dedicated connections', 'on-premises to cloud', and 'cross-premises networking' that are unlikely to conflict with general cloud or networking skills. | 3 / 3 |
Total | 11 / 12 Passed |
Implementation
37%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This skill provides a broad overview of hybrid cloud networking options across AWS, Azure, and GCP with some useful Terraform examples, but it reads more like a reference document than an actionable skill. It lacks sequential workflows with validation checkpoints, which is critical for infrastructure operations, and includes generic best-practice lists that Claude already knows. The content would benefit from being restructured around a clear implementation workflow with verification steps.
Suggestions
Add a clear step-by-step workflow (e.g., 'Setting up AWS Site-to-Site VPN') with explicit validation checkpoints like verifying tunnel status, testing connectivity, and confirming BGP route propagation before proceeding.
Remove generic advice lists (security best practices, cost optimization) that Claude already knows, or replace them with specific, actionable commands/configurations unique to hybrid networking.
Convert the BGP configuration section from pseudocode to actual executable configuration (e.g., real router config or Terraform aws_dx_bgp_peer resource).
Split per-cloud-provider details into separate reference files and keep the main skill focused on the decision framework and a single end-to-end workflow example.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill includes some unnecessary explanatory content (e.g., bullet-point descriptions of what VPN and Direct Connect are, which Claude already knows), and the security best practices and cost optimization sections are generic lists that don't add skill-specific value. However, the code examples are reasonably focused. | 2 / 3 |
Actionability | The Terraform code blocks are concrete and executable, which is good. However, many sections are bullet-point lists of general advice (security best practices, cost optimization, routing configuration) rather than specific, actionable instructions. The BGP configuration is pseudocode rather than actual router config, and key details like Direct Connect setup are deferred to reference files. | 2 / 3 |
Workflow Clarity | There is no clear sequential workflow for setting up hybrid connectivity. The content presents options and patterns but never walks through a step-by-step process with validation checkpoints. For operations involving network infrastructure changes (which are potentially disruptive), there are no verification steps, rollback procedures, or feedback loops. | 1 / 3 |
Progressive Disclosure | References to external files exist (references/vpn-setup.md, references/direct-connect.md) and related skills are mentioned, which is good. However, the main file is quite long with inline content that could be split out (e.g., per-cloud provider details), and the references are not well-signaled with descriptions of what they contain. | 2 / 3 |
Total | 7 / 12 Passed |
Validation
100%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 11 / 11 Passed
Validation for skill structure
No warnings or errors.
6e3d68c
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.