Use when adding authentication (login, logout, protected routes) to Express.js web applications - integrates express-openid-connect for session-based auth.
84
81%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
Quality
Discovery
89%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a well-crafted description that clearly communicates when to use the skill with an explicit 'Use when' clause and relevant trigger terms. It is highly distinctive due to the specific technology stack (Express.js + express-openid-connect). The main area for improvement is listing more concrete actions beyond login/logout/protected routes to better convey the full scope of capabilities.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Names the domain (authentication in Express.js) and some actions (login, logout, protected routes), but doesn't list comprehensive concrete actions like session management details, middleware configuration, or callback handling. | 2 / 3 |
Completeness | Clearly answers both 'what' (adding authentication with login, logout, protected routes using express-openid-connect) and 'when' (explicit 'Use when adding authentication... to Express.js web applications'). | 3 / 3 |
Trigger Term Quality | Includes strong natural trigger terms users would say: 'authentication', 'login', 'logout', 'protected routes', 'Express.js', 'session-based auth', and the specific library 'express-openid-connect'. Good coverage of how users would phrase auth-related requests. | 3 / 3 |
Distinctiveness Conflict Risk | Highly distinctive — scoped specifically to Express.js authentication using express-openid-connect with session-based auth. The combination of framework, library, and auth pattern makes it unlikely to conflict with other skills. | 3 / 3 |
Total | 11 / 12 Passed |
Implementation
72%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This is a well-structured Auth0 Express integration skill with strong actionability and good progressive disclosure. The main weaknesses are some redundancy in the content (duplicate route definitions, Quick Reference partially duplicating code examples) and a lack of explicit validation/verification steps in the workflow, particularly around confirming Auth0 Dashboard configuration and testing the auth flow.
Suggestions
Remove the duplicate '/' route definition in Step 4 - consolidate into a single example that shows both authenticated and unauthenticated states.
Add explicit validation checkpoints to the workflow, e.g., after Step 2 verify env vars are loaded correctly, after Step 5 provide specific checks like 'Verify: clicking Login redirects to Auth0, after login /profile shows your name, /logout returns you to home page'.
Trim the Quick Reference section to only include information not already demonstrated in the code examples, or remove it entirely since the references point to a full API Reference file.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The content is mostly efficient but includes some redundancy - there are two duplicate '/' route definitions in Step 4, the 'When NOT to Use' section is somewhat verbose, and the Quick Reference section partially duplicates information already shown in the code examples. The inline comments in code are helpful but some explanatory text could be trimmed. | 2 / 3 |
Actionability | The skill provides fully executable, copy-paste ready code examples including bash commands for installation, complete .env configuration, working Express middleware setup, and route examples. The common mistakes table provides specific, actionable fixes. | 3 / 3 |
Workflow Clarity | The 5-step workflow is clearly sequenced and logical, but lacks explicit validation checkpoints. Step 5 is just 'start and test' with no guidance on what to verify, how to confirm the callback URL is working, or what to do if login fails. For an auth integration that involves external service configuration (Auth0 Dashboard settings), missing verification steps is a notable gap. | 2 / 3 |
Progressive Disclosure | Excellent progressive disclosure structure: a concise quick start in the main file with clear, well-signaled one-level-deep references to Setup Guide, Integration Guide, and API Reference. The content is appropriately split between overview and detailed documentation. | 3 / 3 |
Total | 10 / 12 Passed |
Validation
90%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 10 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
metadata_version | 'metadata.version' is missing | Warning |
Total | 10 / 11 Passed | |
9777204
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.