CtrlK
CommunityDocumentationLog inGet started
Tessl Logo

spring-boot-security-jwt

tessl i github:giuseppe-trisciuoglio/developer-kit --skill spring-boot-security-jwt
github.com/giuseppe-trisciuoglio/developer-kit

JWT authentication and authorization patterns for Spring Boot 3.5.x covering token generation with JJWT, Bearer/cookie authentication, database/OAuth2 integration, and RBAC/permission-based access control using Spring Security 6.x.

Review Score

66%

Validation Score

9/16

Implementation Score

50%

Activation Score

83%

SKILL.md
Review
Evals

Generated

Validation

Total

9/16

Score

Passed
CriteriaScore

skill_md_line_count

SKILL.md is long (1014 lines); consider splitting into references/ and linking

description_trigger_hint

Description may be missing an explicit 'when to use' trigger hint (e.g., 'Use when...')

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

metadata_version

'metadata' field is not a dictionary

license_field

'license' field is missing

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

body_steps

No step-by-step structure detected (no ordered list); consider adding a simple workflow

Implementation

Suggestions 4

Score

50%

Overall Assessment

This skill provides comprehensive, production-ready JWT implementation code for Spring Boot 3.5.x with excellent actionability. However, it suffers from severe verbosity with duplicated configurations, unnecessary explanations, and a monolithic structure that should be split across reference files. The workflow lacks explicit validation checkpoints for a security-critical implementation.

Suggestions

  • Remove duplicate SecurityConfig implementations and consolidate into a single, canonical example
  • Move detailed implementations (entities, permission evaluators, testing code) to reference files, keeping SKILL.md under 200 lines as an overview
  • Add explicit validation checkpoints: 'Verify token generation works before proceeding to filter implementation', 'Test authentication endpoint before adding authorization'
  • Remove explanatory text Claude already knows (e.g., 'JWT authentication enables stateless, scalable security') and trust Claude's competence
DimensionScoreReasoning

Conciseness

1/3

Extremely verbose at 700+ lines with significant redundancy (SecurityConfig appears twice with slight variations, CORS configuration duplicated). Includes unnecessary explanations Claude already knows (what JWT is, what HTTPS is) and extensive boilerplate that could be condensed.

Actionability

3/3

Provides fully executable, copy-paste ready code examples throughout including complete Maven/Gradle dependencies, configuration files, service implementations, controllers, entities, and tests. All code is concrete and production-ready.

Workflow Clarity

2/3

The Quick Start section provides numbered steps but lacks explicit validation checkpoints. No feedback loops for error recovery when JWT validation fails or when security configuration is incorrect. Missing verification steps after implementing each component.

Progressive Disclosure

2/3

References external files (references/jwt-complete-configuration.md, etc.) but the main document is monolithic with 700+ lines of inline content. Much of the detailed implementation code (entities, permission evaluators, testing) could be moved to reference files, keeping SKILL.md as a concise overview.

Activation

Suggestions 2

Score

83%

Overall Assessment

This is a strong, technically specific description that clearly communicates capabilities with excellent trigger term coverage for the Spring Boot/JWT authentication domain. The main weakness is the absence of an explicit 'Use when...' clause, which would help Claude know exactly when to select this skill over others. The specificity of version numbers and technology stack provides excellent distinctiveness.

Suggestions

  • Add an explicit 'Use when...' clause, e.g., 'Use when implementing JWT auth in Spring Boot, securing REST APIs, or setting up role-based access control with Spring Security.'
  • Consider adding common user phrasings like 'secure API', 'login system', or 'protect endpoints' to capture more natural language triggers.
DimensionScoreReasoning

Specificity

3/3

Lists multiple specific concrete actions: 'token generation with JJWT', 'Bearer/cookie authentication', 'database/OAuth2 integration', and 'RBAC/permission-based access control'. Uses third person voice appropriately.

Completeness

2/3

Clearly answers 'what does this do' with comprehensive capability listing, but lacks an explicit 'Use when...' clause or equivalent trigger guidance. The when is only implied through the technical domain.

Trigger Term Quality

3/3

Excellent coverage of natural terms users would say: 'JWT', 'authentication', 'authorization', 'Spring Boot', 'token', 'Bearer', 'cookie', 'OAuth2', 'RBAC', 'permission', 'Spring Security'. These are terms developers naturally use when seeking help with auth.

Distinctiveness Conflict Risk

3/3

Highly specific niche combining JWT + Spring Boot 3.5.x + Spring Security 6.x + specific auth patterns. Version numbers and technology stack create clear boundaries that distinguish it from generic auth or other framework skills.