CtrlK
BlogDocsLog inGet started
Tessl Logo

dancon-cwe25-review

Perform a comprehensive code security review against the 2025 MITRE CWE Top 25 Most Dangerous Software Weaknesses (sourced from https://cwe.mitre.org/top25/). Use this skill every time the user asks for a code security review, security audit, vulnerability scan, CWE review, secure code review, source review, or any variant of "check my code for security issues". This skill runs 25 dedicated analysis passes -- one per CWE in the Top 25 -- each focused on finding ALL instances of its assigned weakness across the entire codebase. Results are risk-ranked from highest to lowest and every finding includes a specific, actionable remediation recommendation grounded in good software security engineering practice and principles.

90

2.78x
Quality

88%

Does it follow best practices?

Impact

92%

2.78x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is an excellent skill description that clearly communicates what the skill does (comprehensive CWE Top 25 security analysis with risk-ranked findings and remediation), when to use it (with an explicit and thorough list of trigger phrases), and how it works (25 dedicated passes). It uses proper third-person voice throughout and provides enough specificity to be clearly distinguishable from other code-related skills.

DimensionReasoningScore

Specificity

Lists multiple concrete actions: performs 25 dedicated analysis passes per CWE, risk-ranks results from highest to lowest, provides actionable remediation recommendations. Specifies the exact framework (2025 MITRE CWE Top 25) and methodology (one pass per CWE across entire codebase).

3 / 3

Completeness

Clearly answers both 'what' (comprehensive code security review against MITRE CWE Top 25, 25 analysis passes, risk-ranked findings with remediation) and 'when' (explicit 'Use this skill every time the user asks for...' clause with multiple trigger scenarios).

3 / 3

Trigger Term Quality

Excellent coverage of natural trigger terms: 'code security review', 'security audit', 'vulnerability scan', 'CWE review', 'secure code review', 'source review', 'check my code for security issues'. These are terms users would naturally use when requesting this type of analysis.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive with a clear niche: specifically tied to the 2025 MITRE CWE Top 25 framework, security-focused code review. The specific methodology (25 dedicated passes) and domain (security vulnerabilities) make it unlikely to conflict with general code review or other skills.

3 / 3

Total

12

/

12

Passed

Implementation

77%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a well-crafted, highly actionable skill that provides a comprehensive, structured workflow for conducting CWE Top 25 security reviews. Its greatest strengths are the precise, unambiguous instructions at every step and the clear risk-scoring methodology. Its main weaknesses are moderate verbosity (some redundancy in rules and the overview restating the workflow) and the large inline CWE table that could potentially be offloaded to the reference file.

Suggestions

Remove the Overview section or reduce it to 1-2 sentences, since the Workflow section already explains everything in detail — the current overview is largely redundant.

Consolidate the 'REDACTED' instruction to a single mention in Critical Rules rather than repeating it in Steps 3 and 5.

DimensionReasoningScore

Conciseness

The skill is reasonably well-structured but contains some redundancy — the CWE table is duplicated (once in the description, once in the body), the announcement/branding text is unnecessary filler, and some instructions repeat themselves (e.g., 'REDACTED' rule stated three times). The overview section largely restates what the workflow already explains. However, given the complexity of a 25-pass security review, most content earns its place.

2 / 3

Actionability

The skill provides highly concrete, executable guidance: specific file paths to read, exact formulas for risk scoring, precise severity point values, a complete CWE table with scores, detailed report structure with exact markdown headers, and clear per-finding recording requirements (file, lines, description, snippet, severity, remediation). Every step tells Claude exactly what to do.

3 / 3

Workflow Clarity

The workflow is clearly sequenced across 6 steps (0-5) with explicit validation checkpoints: Step 1 has a fallback chain (live fetch → compare dates → local copy → announce source), Step 2 has clear inclusion/exclusion criteria, Step 3 has exhaustive per-CWE pass requirements, Step 4 has a concrete scoring formula, and Step 5 has verification ('Check that it has been saved'). The feedback loop in Critical Rule 1 ('Repeat the pass until no weaknesses are identified') addresses exhaustiveness.

3 / 3

Progressive Disclosure

The skill references an external file (references/cwe_top25_2025.md) for detection heuristics and remediation guidance, which is good progressive disclosure. However, the main SKILL.md itself is quite long (~200+ lines) with the full 25-row CWE table inline, the complete report template, and all critical rules — some of this could be split into reference files. The structure is clear with headers but the content density is high for a single file.

2 / 3

Total

10

/

12

Passed

Validation

100%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation11 / 11 Passed

Validation for skill structure

No warnings or errors.

Repository
danielyan-consulting/skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.