CtrlK
BlogDocsLog inGet started
Tessl Logo

coderabbit-enterprise-rbac

Configure CodeRabbit enterprise access control, seat management, and organization policies. Use when managing who gets AI reviews, configuring organization-level defaults, or implementing access policies for CodeRabbit across teams. Trigger with phrases like "coderabbit SSO", "coderabbit RBAC", "coderabbit enterprise", "coderabbit roles", "coderabbit permissions", "coderabbit seats".

84

Quality

82%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Advisory

Suggest reviewing before use

SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a strong skill description that clearly defines its scope around CodeRabbit enterprise administration, provides explicit 'Use when' guidance, and includes well-chosen trigger terms. It uses proper third-person voice and is concise without being vague. The description would effectively differentiate this skill from others in a large skill library.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: 'access control', 'seat management', 'organization policies', 'configuring organization-level defaults', and 'implementing access policies across teams'.

3 / 3

Completeness

Clearly answers both 'what' (configure access control, seat management, organization policies) and 'when' (explicit 'Use when...' clause plus explicit trigger phrases), satisfying all completeness requirements.

3 / 3

Trigger Term Quality

Includes a rich set of natural trigger terms users would actually say: 'coderabbit SSO', 'coderabbit RBAC', 'coderabbit enterprise', 'coderabbit roles', 'coderabbit permissions', 'coderabbit seats'. These cover common variations of enterprise access management terminology.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive with the 'CodeRabbit enterprise' niche and specific trigger terms like 'coderabbit SSO', 'coderabbit RBAC', 'coderabbit seats' that are unlikely to conflict with other skills.

3 / 3

Total

12

/

12

Passed

Implementation

64%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a solid, actionable skill with concrete YAML configurations, specific navigation paths, and a working audit script. Its main weaknesses are the lack of validation checkpoints between workflow steps and the monolithic structure that could benefit from splitting detailed configs and scripts into bundle files. Some sections (SSO/compliance, access model explanation) could be more concise.

Suggestions

Add explicit validation checkpoints between steps, e.g., after Step 3 instruct to run `@coderabbitai configuration` in a PR to verify org defaults are applied before proceeding to repo overrides.

Extract the audit bash script and detailed YAML examples into bundle files (e.g., scripts/audit-reviews.sh, examples/org-config.yaml) and reference them from the main SKILL.md.

Trim the SSO/compliance section (Step 6) to essential action items — the informational content about SOC 2 certification and data residency details is not actionable guidance Claude needs.

DimensionReasoningScore

Conciseness

The skill is reasonably well-structured but includes some unnecessary verbosity. The markdown code blocks used for plain-text instructions (Steps 1, 2, 6) add visual noise without value. The SSO/compliance section is largely informational content Claude already knows or could infer. The ASCII diagram, while helpful, is somewhat redundant given the textual explanations that follow.

2 / 3

Actionability

The skill provides concrete, executable YAML configurations, a working bash audit script, specific dashboard navigation paths, and exact file locations (.github/.coderabbit.yaml). The path_instructions examples with security-specific review criteria are copy-paste ready and highly actionable.

3 / 3

Workflow Clarity

Steps are clearly sequenced (1-6) and logically ordered from access control through auditing. However, there are no explicit validation checkpoints between steps — for example, no step to verify the org config is actually being applied before proceeding to repo overrides, and no feedback loop for confirming seat assignments are correct. The error handling table partially compensates but is reactive rather than integrated into the workflow.

2 / 3

Progressive Disclosure

The content is well-organized with clear sections and a helpful error handling table, but it's a long monolithic document (~180 lines of content) with no bundle files to offload detailed configurations or the audit script. The YAML examples and bash script could be separate referenced files. The 'Next Steps' reference to 'coderabbit-cost-tuning' is good but the main content itself could benefit from splitting.

2 / 3

Total

9

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
jeremylongshore/claude-code-plugins-plus-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.