CtrlK
BlogDocsLog inGet started
Tessl Logo

fullstack-guardian

Builds security-focused full-stack web applications by implementing integrated frontend and backend components with layered security at every level. Covers the complete stack from database to UI, enforcing auth, input validation, output encoding, and parameterized queries across all layers. Use when implementing features across frontend and backend, building REST APIs with corresponding UI, connecting frontend components to backend endpoints, creating end-to-end data flows from database to UI, or implementing CRUD operations with UI forms. Distinct from frontend-only, backend-only, or API-only skills in that it simultaneously addresses all three perspectives—Frontend, Backend, and Security—within a single implementation workflow. Invoke for full-stack feature work, web app development, authenticated API routes with views, microservices, real-time features, monorepo architecture, or technology selection decisions.

89

Quality

86%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a strong, well-crafted description that clearly articulates specific capabilities, provides explicit trigger guidance with both 'Use when' and 'Invoke for' clauses, and proactively differentiates itself from adjacent skills. It uses proper third-person voice throughout and covers a comprehensive set of natural trigger terms. The only minor concern is slight verbosity, but the content is substantive rather than padded.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: implementing integrated frontend and backend components, enforcing auth, input validation, output encoding, parameterized queries, building REST APIs with UI, connecting frontend to backend endpoints, creating end-to-end data flows, implementing CRUD operations with UI forms.

3 / 3

Completeness

Clearly answers both 'what' (builds security-focused full-stack web apps with layered security, auth, validation, etc.) and 'when' with explicit 'Use when...' and 'Invoke for...' clauses listing specific trigger scenarios like implementing features across frontend and backend, building REST APIs with UI, full-stack feature work, etc.

3 / 3

Trigger Term Quality

Includes strong natural keywords users would say: 'full-stack', 'REST APIs', 'CRUD operations', 'UI forms', 'frontend', 'backend', 'web app development', 'authenticated API routes', 'microservices', 'real-time features', 'monorepo architecture'. Good coverage of terms a developer would naturally use.

3 / 3

Distinctiveness Conflict Risk

Explicitly distinguishes itself from frontend-only, backend-only, or API-only skills, and carves out a clear niche as the skill that simultaneously addresses frontend, backend, and security perspectives. The security-focused full-stack framing is distinctive and reduces conflict risk.

3 / 3

Total

12

/

12

Passed

Implementation

72%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a well-structured full-stack security skill with strong actionability through its concrete three-perspective example and excellent progressive disclosure via the reference table. Its main weaknesses are some redundancy in the constraints section and a workflow that lacks explicit post-implementation validation checkpoints, which is important for security-focused work.

Suggestions

Add an explicit post-implementation validation step to the Core Workflow (e.g., 'Re-run security-checklist.md against completed code; verify no regressions before handoff') to close the feedback loop.

Consolidate the MUST DO / MUST NOT DO lists—remove items that are already demonstrated in the example or that Claude inherently knows, keeping only project-specific constraints.

DimensionReasoningScore

Conciseness

Generally efficient but has some unnecessary verbosity—the constraints section restates things Claude already knows (e.g., 'prevent SQL injection', 'prevent XSS' after already showing parameterized queries and output sanitization). The MUST NOT list largely mirrors the MUST DO list in negative form. However, the reference table and example are well-structured and earn their tokens.

2 / 3

Actionability

The three-perspective example provides fully executable Python and TypeScript code with concrete patterns (parameterized queries, auth dependencies, explicit response schemas, client-side guards). The security annotations explain specific defensive choices. The workflow steps and reference table give clear, concrete guidance on what to do and when.

3 / 3

Workflow Clarity

The core workflow has a clear 6-step sequence with a security checkpoint before coding, which is good. However, there are no explicit validation/verification steps after implementation—step 5 says 'testing each component as you go' but doesn't specify how to validate or what constitutes passing. For a skill involving security-critical operations across multiple layers, the lack of a concrete verification step (e.g., run security checklist again post-implementation) is a gap.

2 / 3

Progressive Disclosure

Excellent progressive disclosure with a well-organized reference table that clearly signals when to load each reference file. The main SKILL.md serves as a concise overview with the three-perspective example inline (appropriately, as it's the core teaching), while detailed guidance is deferred to one-level-deep reference files with clear 'Load When' conditions.

3 / 3

Total

10

/

12

Passed

Validation

100%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation11 / 11 Passed

Validation for skill structure

No warnings or errors.

Repository
jeffallan/claude-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.