CtrlK
BlogDocsLog inGet started
Tessl Logo

checking-owasp-compliance

This skill uses the owasp-compliance-checker plugin to automatically identify potential security vulnerabilities based on the OWASP Top 10 (2021) list. It helps ensure your application adheres to industry-standard security practices by providing a detailed analysis of compliance gaps and offering remediation guidance. Use this skill when you need to audit your code for OWASP compliance, identify and fix vulnerabilities, or generate a compliance report. Trigger this skill by asking to "check OWASP compliance", "scan for OWASP vulnerabilities", or using the `/owasp` shortcut.

89

1.07x
Quality

53%

Does it follow best practices?

Impact

97%

1.07x

Average score across 9 eval scenarios

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./backups/skill-structure-cleanup-20251108-073936/plugins/security/owasp-compliance-checker/skills/owasp-compliance-checker/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a strong skill description that clearly articulates what the skill does (OWASP Top 10 vulnerability identification, compliance gap analysis, remediation guidance), when to use it (auditing, fixing vulnerabilities, generating reports), and how to trigger it (specific phrases and shortcut). The only minor issue is the use of second person ('your application', 'your code'), which slightly deviates from the preferred third-person voice, but the overall quality is high.

DimensionReasoningScore

Specificity

Lists multiple concrete actions: identify security vulnerabilities, analyze compliance gaps, provide remediation guidance, audit code, fix vulnerabilities, and generate compliance reports. These are specific and actionable.

3 / 3

Completeness

Clearly answers both 'what' (identify vulnerabilities based on OWASP Top 10, analyze compliance gaps, offer remediation guidance) and 'when' ('Use this skill when you need to audit your code for OWASP compliance, identify and fix vulnerabilities, or generate a compliance report'). Explicit trigger guidance is also provided.

3 / 3

Trigger Term Quality

Includes strong natural trigger terms: 'check OWASP compliance', 'scan for OWASP vulnerabilities', '/owasp' shortcut, 'audit your code', 'compliance report', 'OWASP Top 10'. These cover natural user phrasings well.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive with a clear niche: OWASP Top 10 compliance checking via a specific plugin. The domain (OWASP security compliance) and specific triggers ('/owasp', 'OWASP compliance') make it unlikely to conflict with general security or code review skills.

3 / 3

Total

12

/

12

Passed

Implementation

7%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This skill content is largely descriptive rather than instructive. It explains what the skill does in abstract terms but provides no concrete commands, configuration details, sample outputs, or executable examples. The content is padded with generic advice and repeated information that Claude already knows, making it both verbose and unactionable.

Suggestions

Add concrete, executable examples showing exact plugin invocation syntax (e.g., the actual command or API call to run the owasp-compliance-checker) and sample output/report format.

Remove the 'When to Use This Skill', 'Best Practices', and 'Integration' sections entirely — they add no actionable information and repeat what's in the description or state obvious advice.

Include a real example showing a scan result with specific vulnerability findings and the exact remediation steps, so Claude knows what output to produce and how to guide the user.

Add validation/error handling steps: what to do if the plugin is not installed, if the scan fails, or if the report contains false positives.

DimensionReasoningScore

Conciseness

The content is verbose and padded with information Claude already knows. Sections like 'When to Use This Skill' repeat the description, 'Best Practices' offers generic advice (regular scanning, stay updated), and the 'How It Works' section explains obvious plugin behavior. The 'Integration' section is vague filler.

1 / 3

Actionability

There are no concrete commands, code snippets, API calls, or executable examples. The 'examples' merely describe what the skill 'will do' in abstract terms without showing actual plugin invocation syntax, configuration, command-line usage, or sample output. Nothing is copy-paste ready.

1 / 3

Workflow Clarity

The workflow steps are superficial ('activate plugin', 'scan codebase', 'generate report') with no actual commands, no validation checkpoints, no error handling, and no feedback loops. There is no guidance on what to do if the scan fails or how to interpret results.

1 / 3

Progressive Disclosure

The content is organized into sections with headers, which provides some structure. However, there are no references to external files, no bundle files to support deeper content, and inline content that could be trimmed doesn't justify its length. It's not a monolithic wall of text but also not well-structured for progressive disclosure.

2 / 3

Total

5

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
jeremylongshore/claude-code-plugins-plus-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.