CtrlK
BlogDocsLog inGet started
Tessl Logo

security-review

認証の追加、ユーザー入力の処理、シークレットの操作、APIエンドポイントの作成、支払い/機密機能の実装時にこのスキルを使用します。包括的なセキュリティチェックリストとパターンを提供します。

63

Quality

54%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./docs/ja-JP/skills/security-review/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

67%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

The description effectively communicates when to use the skill by listing specific trigger scenarios upfront, and it clearly states what it provides (security checklists and patterns). However, the actual capabilities could be more concrete (e.g., specific security checks performed), and the trigger terms could include more natural variations and common security terminology that users would mention.

Suggestions

Add more specific concrete actions beyond 'checklists and patterns', such as 'input validation against injection attacks, HTTPS enforcement, password hashing recommendations, CORS configuration'.

Include additional natural trigger terms users might say, such as 'security review', 'vulnerability check', 'OWASP', 'XSS', 'SQL injection', or their Japanese equivalents like 'セキュリティレビュー', '脆弱性'.

DimensionReasoningScore

Specificity

The description names several specific domains (authentication, user input handling, secrets, API endpoints, payment/sensitive features) but describes the output vaguely as 'comprehensive security checklist and patterns' without listing concrete actions like 'validate input against injection attacks, enforce HTTPS, hash passwords'.

2 / 3

Completeness

The description explicitly answers both 'what' (provides comprehensive security checklists and patterns) and 'when' (when adding authentication, handling user input, working with secrets, creating API endpoints, implementing payment/sensitive features), with clear trigger scenarios listed upfront.

3 / 3

Trigger Term Quality

Includes relevant trigger terms like '認証' (authentication), 'ユーザー入力' (user input), 'シークレット' (secrets), 'APIエンドポイント' (API endpoints), '支払い' (payment), but misses common variations users might say such as 'security review', 'vulnerability', 'OWASP', 'SQL injection', 'XSS', 'password hashing', or English equivalents that might be used in mixed-language contexts.

2 / 3

Distinctiveness Conflict Risk

The security focus is fairly distinct, but terms like 'API endpoints' and 'authentication' could overlap with general API development or authentication-specific skills. The scope is broad enough (covering auth, input, secrets, APIs, payments) that it might conflict with more specialized skills in any of those individual areas.

2 / 3

Total

9

/

12

Passed

Implementation

42%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

The skill provides highly actionable, executable security patterns with clear FAIL/PASS examples across 10 categories, which is its primary strength. However, it is excessively verbose for a SKILL.md—most of this security knowledge is already known to Claude, and the monolithic structure with everything inline makes it a poor use of context window. It would benefit greatly from being restructured as a concise overview with references to detailed sub-files.

Suggestions

Restructure as a concise overview (~50-80 lines) with the deploy checklist and brief category summaries, moving detailed code examples for each category into separate referenced files (e.g., SECRETS.md, INPUT_VALIDATION.md, AUTH.md).

Remove explanations of well-known concepts (SQL injection, XSS, CSRF basics) and focus only on project-specific patterns, preferred libraries, and non-obvious configurations.

Add a clear workflow sequence: e.g., 'When reviewing code: 1. Run npm audit → 2. Check secrets → 3. Review input validation → 4. Verify auth/authz → 5. Run security tests → 6. If any fail, fix and re-run from step 1.'

Remove the closing motivational statement ('Security is not optional...') as it adds no actionable value for Claude.

DimensionReasoningScore

Conciseness

The skill is extremely verbose at ~400+ lines, covering 10 security categories with full code examples for each. Much of this content (SQL injection basics, XSS prevention, CSRF patterns, rate limiting) is well-known to Claude and doesn't need to be spelled out with FAIL/PASS examples. The closing 'Security is not optional' reminder is unnecessary padding.

1 / 3

Actionability

Every section provides fully executable TypeScript/SQL/bash code examples with clear FAIL/PASS patterns. The code is copy-paste ready with specific libraries (zod, DOMPurify, express-rate-limit) and concrete implementations including error handling.

3 / 3

Workflow Clarity

Each section has verification checklists which is good, and there's a comprehensive deploy-before checklist. However, there's no clear sequencing of when/how to apply these checks in a workflow, no feedback loops for when issues are found, and no prioritization guidance. The sections are presented as a flat list rather than a structured review process.

2 / 3

Progressive Disclosure

This is a monolithic wall of text with all 10 security categories fully expanded inline. Content like blockchain security, CSRF details, and dependency management could easily be split into separate reference files. The external resources at the bottom are links to third-party sites rather than structured internal references. No content is deferred to supplementary files.

1 / 3

Total

7

/

12

Passed

Validation

100%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation11 / 11 Passed

Validation for skill structure

No warnings or errors.

Repository
affaan-m/everything-claude-code
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.