Create production-ready Kubernetes manifests for Deployments, Services, ConfigMaps, and Secrets following best practices and security standards. Use when generating Kubernetes YAML manifests, creating K8s resources, or implementing production-grade Kubernetes configurations.
86
81%
Does it follow best practices?
Impact
97%
1.15xAverage score across 3 eval scenarios
Risky
Do not use without reviewing
Quality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a strong skill description that clearly communicates what it does (creates specific Kubernetes resource types with production standards) and when to use it (with an explicit 'Use when' clause containing natural trigger terms including the K8s abbreviation). It uses proper third-person voice and is concise without being vague.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions and resource types: 'Kubernetes manifests for Deployments, Services, ConfigMaps, and Secrets' with qualifiers like 'production-ready', 'best practices and security standards'. | 3 / 3 |
Completeness | Clearly answers both 'what' (create production-ready Kubernetes manifests for specific resource types following best practices) and 'when' (explicit 'Use when' clause covering generating YAML manifests, creating K8s resources, or implementing production-grade configurations). | 3 / 3 |
Trigger Term Quality | Includes strong natural trigger terms users would say: 'Kubernetes manifests', 'K8s resources', 'Kubernetes YAML', 'Kubernetes configurations', 'Deployments', 'Services', 'ConfigMaps', 'Secrets', and the abbreviation 'K8s'. | 3 / 3 |
Distinctiveness Conflict Risk | Clearly scoped to Kubernetes manifest generation with specific resource types named. The domain is distinct enough (Kubernetes/K8s) that it's unlikely to conflict with general YAML, Docker, or other infrastructure skills. | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
62%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
The skill provides highly actionable, production-ready Kubernetes manifest templates with a well-structured workflow and explicit validation steps. However, it is excessively verbose—much of the content explains concepts Claude already knows (what ConfigMaps are, when to use StatefulSets, basic kubectl troubleshooting) and could be cut by 50%+ without losing value. The referenced bundle files don't exist, undermining the progressive disclosure structure.
Suggestions
Cut the 'Purpose', 'When to Use This Skill', 'Gather Requirements' questions, 'Next Steps', 'Related Skills', and 'Troubleshooting' sections entirely—Claude knows these concepts and can infer requirements from context.
Remove explanatory prose like 'Prevents resource starvation' and 'Ensures Kubernetes can manage your application' from the Best Practices Summary—just list the practices.
Move Common Patterns, security context details, and multi-resource organization into separate referenced files to reduce the main file size and make the progressive disclosure references real.
Consolidate the inline YAML examples to show one complete, annotated manifest rather than separate snippets for each resource type—this would dramatically reduce length while remaining actionable.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | Extremely verbose at ~350+ lines. Includes extensive 'Questions to ask' lists, 'When to Use This Skill' bullets, explanations of concepts Claude already knows (what ConfigMaps are for, what StatefulSets are, storage access modes), a 'Purpose' section restating the title, 'Next Steps' and 'Related Skills' sections that add little actionable value, and a 'Troubleshooting' section covering basic kubectl commands Claude already knows. | 1 / 3 |
Actionability | Provides fully executable, copy-paste-ready YAML manifests for every resource type (Deployment, Service, ConfigMap, Secret, PVC, SecurityContext). Validation commands are concrete and executable. Templates are complete and realistic. | 3 / 3 |
Workflow Clarity | Clear 10-step sequential workflow from requirements gathering through validation. Step 10 includes explicit validation commands (dry-run, kubeval, kube-score, kube-linter) with a testing checklist. The security section includes a checklist. The workflow has a logical dependency order (ConfigMap/Secret before Deployment). | 3 / 3 |
Progressive Disclosure | References external files like `references/deployment-spec.md`, `references/service-spec.md`, and `assets/` templates, which is good structure. However, no bundle files are provided, making these references dead links. The main file itself is monolithic with content that should be in those referenced files (e.g., the full security context YAML, troubleshooting, common patterns could all be separate). | 2 / 3 |
Total | 9 / 12 Passed |
Validation
90%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 10 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
skill_md_line_count | SKILL.md is long (535 lines); consider splitting into references/ and linking | Warning |
Total | 10 / 11 Passed | |
b09ec7f
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.