AWS Key Management Service (KMS) patterns using AWS SDK for Java 2.x. Use when creating/managing encryption keys, encrypting/decrypting data, generating data keys, digital signing, key rotation, or integrating encryption into Spring Boot applications.
Install with Tessl CLI
npx tessl i github:giuseppe-trisciuoglio/developer-kit --skill aws-sdk-java-v2-kms84
Quality
86%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Quality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a well-crafted skill description that excels across all dimensions. It clearly identifies the technology stack (AWS KMS, Java SDK 2.x, Spring Boot), lists specific capabilities, and provides explicit trigger guidance with the 'Use when...' clause covering multiple relevant scenarios.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions: 'creating/managing encryption keys, encrypting/decrypting data, generating data keys, digital signing, key rotation, integrating encryption into Spring Boot applications.' | 3 / 3 |
Completeness | Clearly answers both what ('AWS KMS patterns using AWS SDK for Java 2.x') and when with explicit 'Use when...' clause listing six specific trigger scenarios. | 3 / 3 |
Trigger Term Quality | Includes natural keywords users would say: 'encryption keys', 'encrypting/decrypting', 'data keys', 'digital signing', 'key rotation', 'KMS', 'AWS', 'Spring Boot'. Good coverage of domain-specific terms. | 3 / 3 |
Distinctiveness Conflict Risk | Highly specific niche combining AWS KMS + Java SDK 2.x + Spring Boot. Unlikely to conflict with general encryption skills or other AWS services due to specific technology stack mentioned. | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
72%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This is a solid, actionable skill with excellent executable code examples covering KMS operations from basic encryption to envelope encryption and Spring Boot integration. The main weaknesses are some verbosity in introductory sections and missing validation/error recovery workflows for cryptographic operations that could fail or leave sensitive data exposed.
Suggestions
Remove or significantly condense the 'When to Use' and 'Overview' sections - Claude can infer appropriate use cases from the code patterns
Add explicit validation checkpoints to the envelope encryption workflow (e.g., verify data key generation succeeded before proceeding, validate decrypted data integrity)
Include error recovery patterns for common KMS failures (throttling, key disabled, invalid ciphertext) with specific exception handling examples
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill includes some unnecessary sections like 'When to Use' that explain obvious use cases Claude would infer. The Overview section is somewhat redundant. However, the code examples themselves are lean and the best practices section, while lengthy, provides value. | 2 / 3 |
Actionability | Excellent executable code examples throughout - all snippets are copy-paste ready with proper imports, complete method signatures, and realistic usage patterns. The envelope encryption and digital signature examples are particularly well-constructed with full working code. | 3 / 3 |
Workflow Clarity | While individual operations are clear, the skill lacks explicit validation checkpoints for critical operations. The envelope encryption pattern mentions clearing keys from memory but doesn't include verification steps. No error recovery workflows for failed encryption/decryption operations. | 2 / 3 |
Progressive Disclosure | Well-structured with clear sections progressing from basic to advanced. References to detailed documentation are clearly signaled at the end with one-level-deep links to technical guides, testing, and best practices files. | 3 / 3 |
Total | 10 / 12 Passed |
Validation
68%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 11 / 16 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
allowed_tools_field | 'allowed-tools' contains unusual tool name(s) | Warning |
metadata_version | 'metadata' field is not a dictionary | Warning |
license_field | 'license' field is missing | Warning |
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
body_steps | No step-by-step structure detected (no ordered list); consider adding a simple workflow | Warning |
Total | 11 / 16 Passed | |
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.