CtrlK
BlogDocsLog inGet started
Tessl Logo

auditing-cloud-cluster-security

Audits the security posture of a CockroachDB cluster (Cloud or self-hosted) across network, authentication, authorization, encryption, audit logging, and backup dimensions. Use when assessing cluster security readiness, preparing for compliance reviews, or investigating security configuration gaps.

90

Quality

88%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is an excellent skill description that clearly identifies the specific technology (CockroachDB), lists concrete security dimensions being audited, and provides explicit trigger guidance via a 'Use when' clause. It uses proper third-person voice throughout and covers natural trigger terms that users would employ when needing a CockroachDB security audit.

DimensionReasoningScore

Specificity

Lists multiple specific concrete dimensions of security auditing: network, authentication, authorization, encryption, audit logging, and backup. Also specifies the target (CockroachDB cluster) and deployment types (Cloud or self-hosted).

3 / 3

Completeness

Clearly answers both 'what' (audits security posture across six named dimensions for CockroachDB clusters) and 'when' (explicit 'Use when' clause covering security readiness assessment, compliance reviews, and investigating security configuration gaps).

3 / 3

Trigger Term Quality

Includes strong natural keywords users would say: 'security posture', 'CockroachDB', 'cluster', 'compliance reviews', 'security configuration', 'audit logging', 'encryption', 'authentication', 'authorization', 'backup'. Good coverage of terms a user needing this skill would naturally use.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive due to the specific combination of CockroachDB + security auditing. The named dimensions and specific database technology make it very unlikely to conflict with other skills.

3 / 3

Total

12

/

12

Passed

Implementation

77%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a well-structured, highly actionable security audit skill with clear step-by-step workflows, executable commands, and explicit evaluation criteria for every check. Its main weakness is verbosity — the document is quite long with some redundancy between the workflow steps, the Pass/Warn/Fail criteria table, and the severity adjustments table. The progressive disclosure structure references supporting files appropriately but the main document retains too much detail that could be offloaded.

Suggestions

Move the Severity Adjustments and Compliance Overrides tables to a reference file (e.g., references/severity-matrix.md) to reduce the main SKILL.md length while keeping the workflow steps lean.

Remove the 'When to Use This Skill' section — these use cases are already covered in the skill description and are obvious to Claude given the skill's title and content.

DimensionReasoningScore

Conciseness

The skill is comprehensive but verbose for its purpose. Many tables repeat information (e.g., check applicability appears in both the workflow and the Pass/Warn/Fail criteria table), and the severity adjustments and compliance overrides sections add significant length. Some sections like 'When to Use This Skill' explain obvious use cases Claude could infer. However, the domain complexity justifies much of the length.

2 / 3

Actionability

Every audit step includes executable bash commands and SQL queries that are copy-paste ready. The evaluation criteria are specific and concrete (e.g., 'FAIL if more than 5 users have admin role', 'FAIL if 0.0.0.0/0 is in the IP allowlist'). Commands include proper flags like `-starttls postgres` for openssl and `-o json` for ccloud output.

3 / 3

Workflow Clarity

The workflow is clearly sequenced (Steps 0-8) with explicit validation at Step 0 (prerequisite verification with degradation handling), clear evaluation criteria at each step with PASS/WARN/FAIL outcomes, and a structured report format. The tool availability check with impact-if-missing table is an excellent validation checkpoint. The read-only safety constraint is clearly stated upfront.

3 / 3

Progressive Disclosure

The skill references multiple external files (references/permissions.md, references/sql-queries.md, references/ccloud-commands.md, references/sample-report.md) and remediation skills, which is good structure. However, no bundle files were provided, so we cannot verify these exist. The main SKILL.md itself is very long (~400+ lines) and could benefit from moving the detailed severity adjustment tables and compliance override tables into a reference file.

2 / 3

Total

10

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

skill_md_line_count

SKILL.md is long (549 lines); consider splitting into references/ and linking

Warning

Total

10

/

11

Passed

Repository
cockroachlabs/cockroachdb-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.