Configure CodeRabbit enterprise access control, seat management, and organization policies. Use when managing who gets AI reviews, configuring organization-level defaults, or implementing access policies for CodeRabbit across teams. Trigger with phrases like "coderabbit SSO", "coderabbit RBAC", "coderabbit enterprise", "coderabbit roles", "coderabbit permissions", "coderabbit seats".
84
82%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
Quality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a well-crafted skill description that clearly defines its scope (CodeRabbit enterprise access control and administration), provides explicit trigger guidance with natural user phrases, and occupies a distinct niche. It follows best practices by using third person voice, including a 'Use when' clause, and listing specific trigger phrases.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions: 'access control', 'seat management', 'organization policies', 'configuring organization-level defaults', and 'implementing access policies across teams'. | 3 / 3 |
Completeness | Clearly answers both 'what' (configure access control, seat management, organization policies) and 'when' (explicit 'Use when...' clause plus 'Trigger with phrases like...' providing concrete trigger terms). | 3 / 3 |
Trigger Term Quality | Excellent coverage of natural trigger terms including 'coderabbit SSO', 'coderabbit RBAC', 'coderabbit enterprise', 'coderabbit roles', 'coderabbit permissions', 'coderabbit seats' — these are terms users would naturally use when seeking help with enterprise access control. | 3 / 3 |
Distinctiveness Conflict Risk | Highly distinctive — scoped specifically to CodeRabbit enterprise administration (SSO, RBAC, seats, permissions). Unlikely to conflict with general code review skills or other tool configurations due to the specific product and enterprise admin focus. | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
64%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This is a solid enterprise configuration skill with highly actionable YAML configs, a useful audit script, and a clear access control model diagram. Its main weaknesses are moderate verbosity (Steps 1, 2, and 6 use markdown code blocks for prose instructions rather than being more concise), and the lack of explicit validation checkpoints between configuration steps to confirm each change took effect before proceeding.
Suggestions
Add validation checkpoints between steps, e.g., after Step 1: 'Verify: open a test PR on a selected repo and confirm CodeRabbit posts a review comment' and after Step 3: 'Verify: run `@coderabbitai configuration` in a PR comment to confirm org config is applied'.
Convert Steps 1, 2, and 6 from markdown-in-code-blocks to concise bullet points or tables — the code fence formatting adds visual noise without adding executable value.
Consider splitting the detailed YAML examples (Steps 3-4) and the audit bash script (Step 5) into separate reference files linked from the main skill to reduce length.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill includes some unnecessary explanatory content (e.g., the Prerequisites section listing things Claude can infer, the markdown code blocks used for non-code instructions in Steps 1, 2, and 6). The ASCII diagram is useful but could be more compact. Some inline comments are helpful but others are redundant. | 2 / 3 |
Actionability | Provides concrete, copy-paste ready YAML configurations, a working bash audit script, specific dashboard navigation paths, and exact bot account names to exclude. The path_instructions examples with security-specific checks are highly actionable. | 3 / 3 |
Workflow Clarity | Steps are clearly sequenced from repository access → seats → org config → repo overrides → audit → SSO. However, there are no validation checkpoints between steps (e.g., no 'verify CodeRabbit is reviewing PRs after Step 1 before proceeding' or 'validate YAML config before deploying'). For configuration operations that could silently fail, this is a gap. | 2 / 3 |
Progressive Disclosure | The content is well-structured with clear sections and a resources section linking to external docs. However, the skill is quite long (~180 lines of content) and could benefit from splitting detailed YAML examples or the audit script into separate reference files. The 'Next Steps' reference to coderabbit-cost-tuning is good progressive disclosure. | 2 / 3 |
Total | 9 / 12 Passed |
Validation
81%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 9 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
allowed_tools_field | 'allowed-tools' contains unusual tool name(s) | Warning |
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
Total | 9 / 11 Passed | |
70e9fa4
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.