Validate input, secure auth tokens, and prevent injection attacks in TypeScript. Use when validating input, handling auth tokens, sanitizing data, or managing secrets and sensitive configuration.
81
78%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./.github/skills/typescript/typescript-security/SKILL.mdQuality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a well-crafted skill description that clearly communicates specific security-related capabilities in TypeScript, includes an explicit 'Use when' clause with multiple natural trigger terms, and occupies a distinct niche. It uses proper third-person voice and is concise without being vague.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions: 'Validate input', 'secure auth tokens', and 'prevent injection attacks', all within a named technology (TypeScript). | 3 / 3 |
Completeness | Clearly answers both 'what' (validate input, secure auth tokens, prevent injection attacks in TypeScript) and 'when' with an explicit 'Use when...' clause listing multiple trigger scenarios. | 3 / 3 |
Trigger Term Quality | Includes strong natural keywords users would say: 'validating input', 'auth tokens', 'sanitizing data', 'injection attacks', 'secrets', 'sensitive configuration'. These cover common variations of security-related queries. | 3 / 3 |
Distinctiveness Conflict Risk | Targets a clear niche: security-focused TypeScript tasks including input validation, auth tokens, injection prevention, and secrets management. This is distinct from general TypeScript coding skills or other domain-specific skills. | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
57%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This skill provides a solid security checklist with appropriate library recommendations and a good progressive disclosure structure pointing to a reference file. However, it lacks executable code examples in the main body (deferring too much to the reference), has some redundancy (duplicate reference links, explanations of concepts Claude knows), and could benefit from clearer workflow sequencing for multi-step security implementation tasks.
Suggestions
Add at least one complete, executable code example for a core pattern (e.g., a full Zod validation + 400 error response) directly in the skill body rather than deferring everything to the reference file.
Remove the duplicate reference link — keep only the one at the bottom under '## References' to reduce redundancy.
Trim explanatory parentheticals that Claude already knows (e.g., 'Cross-Site Scripting (XSS)', 'command injection (OWASP A03)') to improve conciseness.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | Mostly efficient but has some redundancy — the reference link appears twice (top and bottom), and some explanations like 'Cross-Site Scripting (XSS)' and 'command injection (OWASP A03)' explain things Claude already knows. The bold formatting is also excessive and adds visual noise. | 2 / 3 |
Actionability | Provides specific tool/library recommendations and some inline code snippets (e.g., parameterized queries, execFileSync usage), but lacks complete executable examples. Most guidance is directive rather than copy-paste ready — actual code patterns are deferred to the reference file. | 2 / 3 |
Workflow Clarity | The verification step mentioning getDiagnostics is a good checkpoint, but the overall workflow is not clearly sequenced — it reads more like a checklist of concerns than a step-by-step process. For security validation tasks involving multiple steps (validate → sanitize → authenticate), explicit sequencing with validation checkpoints would improve clarity. | 2 / 3 |
Progressive Disclosure | Good structure with a concise overview in the main file and clear one-level-deep references to REFERENCE.md for detailed patterns. Sections are well-organized by concern (input validation, injection prevention, authentication, anti-patterns) with clear navigation. | 3 / 3 |
Total | 9 / 12 Passed |
Validation
81%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 9 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
metadata_version | 'metadata.version' is missing | Warning |
metadata_field | 'metadata' should map string keys to string values | Warning |
Total | 9 / 11 Passed | |
4c72e76
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.