CtrlK
BlogDocsLog inGet started
Tessl Logo

spec-miner

Reverse-engineering specialist that extracts specifications from existing codebases. Use when working with legacy or undocumented systems, inherited projects, or old codebases with no documentation. Invoke to map code dependencies, generate API documentation from source, identify undocumented business logic, figure out what code does, or create architecture documentation from implementation. Trigger phrases: reverse engineer, old codebase, no docs, no documentation, figure out how this works, inherited project, legacy analysis, code archaeology, undocumented features.

97

1.21x
Quality

100%

Does it follow best practices?

Impact

95%

1.21x

Average score across 6 eval scenarios

SecuritybySnyk

Risky

Do not use without reviewing

SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a well-crafted skill description that excels across all dimensions. It provides specific concrete actions, comprehensive natural trigger terms that users would actually say, explicit 'Use when' guidance, and a clearly defined niche that distinguishes it from general coding or documentation skills. The explicit trigger phrases section is particularly strong.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: 'map code dependencies', 'generate API documentation from source', 'identify undocumented business logic', 'figure out what code does', 'create architecture documentation from implementation'.

3 / 3

Completeness

Clearly answers both what (reverse-engineering, extracting specifications, mapping dependencies, generating documentation) AND when with explicit 'Use when' clause covering legacy systems, inherited projects, undocumented codebases, plus explicit trigger phrases.

3 / 3

Trigger Term Quality

Excellent coverage of natural terms users would say including 'reverse engineer', 'old codebase', 'no docs', 'figure out how this works', 'inherited project', 'legacy analysis', 'code archaeology' - these match how users naturally describe these situations.

3 / 3

Distinctiveness Conflict Risk

Clear niche focused specifically on reverse-engineering and undocumented/legacy code analysis. The trigger phrases like 'code archaeology', 'no docs', 'inherited project' are distinct and unlikely to conflict with general coding or documentation skills.

3 / 3

Total

12

/

12

Passed

Implementation

100%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a well-crafted skill that demonstrates excellent token efficiency while providing highly actionable guidance. The workflow is clear with appropriate validation checkpoints, and the progressive disclosure pattern appropriately separates overview content from detailed references. The EARS format quick reference and exploration patterns provide immediate value without requiring external file loads for basic usage.

DimensionReasoningScore

Conciseness

The content is lean and efficient, avoiding explanations of concepts Claude already knows. Every section serves a purpose with no padding or unnecessary context about what reverse engineering is or why documentation matters.

3 / 3

Actionability

Provides concrete, executable Glob and Grep patterns with real regex examples. The EARS format table gives specific, copy-paste ready templates with clear examples for each requirement type.

3 / 3

Workflow Clarity

Clear 5-step workflow with an explicit validation checkpoint after exploration ('Confirm sufficient file coverage before proceeding'). The workflow includes a feedback loop for incomplete exploration before proceeding to documentation.

3 / 3

Progressive Disclosure

Excellent structure with a concise overview in the main file and well-signaled one-level-deep references to four specific reference files. The reference table clearly indicates when to load each resource.

3 / 3

Total

12

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

Total

10

/

11

Passed

Repository
jeffallan/claude-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.