Use when you need to add or review fuzz testing for Java APIs with CATS — including contract-driven negative testing, malformed payload validation, boundary input exploration, CI integration, reproducible failures, and local execution guidance. This should trigger for requests such as Add fuzz testing to a Java project; Use CATS for API negative testing; Review CI quality gates for API contract robustness; Improve boundary and malformed input test coverage. Part of cursor-rules-java project
68
60%
Does it follow best practices?
Impact
—
No eval scenarios have been run
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./skills/703-technologies-fuzzing-testing/SKILL.mdQuality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a strong skill description that clearly defines its scope (CATS-based fuzz testing for Java APIs), lists specific capabilities, and provides explicit trigger guidance with example user requests. The description is well-structured with both a 'Use when' clause and concrete trigger examples, making it easy for Claude to select appropriately. Minor note: it could be slightly more concise, but the detail serves the purpose of disambiguation well.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions: contract-driven negative testing, malformed payload validation, boundary input exploration, CI integration, reproducible failures, and local execution guidance. These are detailed and actionable capabilities. | 3 / 3 |
Completeness | Clearly answers both 'what' (add/review fuzz testing with CATS, including specific sub-capabilities) and 'when' (explicit 'Use when' clause at the start plus 'This should trigger for requests such as...' with concrete examples). Both dimensions are thoroughly addressed. | 3 / 3 |
Trigger Term Quality | Includes strong natural trigger terms users would say: 'fuzz testing', 'Java', 'CATS', 'API negative testing', 'CI quality gates', 'boundary', 'malformed input', 'contract robustness'. The explicit trigger examples ('Add fuzz testing to a Java project', 'Use CATS for API negative testing') cover natural user phrasings well. | 3 / 3 |
Distinctiveness Conflict Risk | Highly distinctive — the combination of CATS tool, fuzz testing, Java APIs, and contract-driven negative testing creates a very specific niche. Unlikely to conflict with general Java testing or other API testing skills due to the specificity of the tool and approach. | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
20%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This skill is essentially a thin wrapper around a reference file, providing no concrete CATS commands, configuration examples, or executable guidance in the body itself. The workflow steps are generic enough to apply to any technology, not specifically to CATS fuzz testing. The constraints section has useful safety checks but the overall content fails to teach Claude anything actionable without reading the external reference.
Suggestions
Add at least one concrete, executable CATS command example (e.g., `cats --contract=openapi.yaml --server=http://localhost:8080 --fuzzers=NegativeTestingFuzzer`) directly in the skill body so Claude can act without reading the reference.
Replace the generic workflow steps ('Apply technology-aligned changes', 'Gather scope') with specific actions like 'Add CATS to pom.xml', 'Create cats.yml configuration', 'Run baseline fuzz scan', with concrete code/config snippets for each.
Remove the 'What is covered' bullet list and 'When to use this skill' section — these duplicate the YAML frontmatter description and waste tokens without adding actionable guidance.
Include a minimal but complete example of a CI integration snippet (e.g., GitHub Actions step) or a sample CATS configuration to make the skill self-contained for common use cases.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill is verbose and padded with unnecessary context. The 'What is covered' bullet list, the 'When to use this skill' section (duplicating the description), and the 'Scope' sentence all add tokens without teaching Claude anything actionable. The actual workflow is generic (read reference, gather scope, apply changes, verify) and could be expressed in a fraction of the space. | 1 / 3 |
Actionability | There are no concrete code examples, no executable CATS commands, no sample configurations, and no specific API fuzzing patterns. The skill essentially says 'read the reference file' and provides only abstract workflow steps like 'Apply technology-aligned changes' without any specifics on what those changes look like. | 1 / 3 |
Workflow Clarity | The workflow has a clear 4-step sequence and the constraints section includes validation checkpoints (compile before, verify after). However, the steps themselves are generic and lack specificity — 'Apply technology-aligned changes' and 'Gather scope and decide target improvements' are not actionable instructions. The feedback loop for compilation failure is mentioned but the overall workflow lacks concrete validation checkpoints tied to CATS output. | 2 / 3 |
Progressive Disclosure | The skill references a single detailed file (references/703-technologies-fuzzing-testing.md) which is appropriate one-level-deep disclosure. However, since no bundle files were provided, we cannot verify the reference exists or is well-structured. The SKILL.md itself is almost entirely a pointer to that reference with very little standalone value, making the split feel like the skill body is too thin rather than appropriately layered. | 2 / 3 |
Total | 6 / 12 Passed |
Validation
100%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 11 / 11 Passed
Validation for skill structure
No warnings or errors.
ef4eba3
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.