CtrlK
BlogDocsLog inGet started
Tessl Logo

terraform-style-guide

Generate Terraform HCL code following HashiCorp's official style conventions and best practices. Use when writing, reviewing, or generating Terraform configurations.

80

1.19x
Quality

70%

Does it follow best practices?

Impact

97%

1.19x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./terraform/code-generation/skills/terraform-style-guide/SKILL.md
SKILL.md
Quality
Evals
Security

Evaluation results

100%

30%

Cloud Infrastructure for a Payments Microservice

File organization and naming conventions

Criteria
Without context
With context

terraform.tf exists

0%

100%

providers.tf exists

0%

100%

main.tf exists

100%

100%

variables.tf exists

100%

100%

outputs.tf exists

100%

100%

Variables alphabetical

0%

100%

Outputs alphabetical

0%

100%

Variable type and description

100%

100%

Output description

100%

100%

Lowercase underscore names

100%

100%

Singular resource names

100%

100%

Descriptive nouns without type

100%

100%

`main` for single unnamed resource

100%

100%

100%

14%

Multi-Region API Gateway Infrastructure

Code formatting and dynamic resource creation

Criteria
Without context
With context

Two-space indentation

100%

100%

Equals sign alignment

100%

100%

Meta-arguments first

100%

100%

for_each for multiple named instances

100%

100%

for_each set or map input

100%

100%

count for conditional alarm

100%

100%

Terraform version constraint operator

100%

100%

Provider version ~> operator

100%

100%

Output description

0%

100%

Variable type and description

25%

100%

REVIEW_NOTES.md present

100%

100%

92%

4%

Secure Data Storage for a Healthcare Analytics Platform

Security practices and ephemeral resources

Criteria
Without context
With context

S3 server-side encryption

100%

100%

S3 public access blocked

100%

100%

S3 versioning enabled

100%

100%

RDS native secrets management

100%

100%

No hardcoded credentials

100%

100%

No password variable passed to RDS

100%

100%

KMS key resource present

100%

100%

Sensitive outputs marked

0%

0%

Variable type and description

100%

100%

Output description

100%

100%

Terraform version in terraform.tf

42%

100%

Repository
hashicorp/agent-skills
Evaluated
Agent
Claude Code
Model
Claude Sonnet 4.6

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.