CtrlK
BlogDocsLog inGet started
Tessl Logo

coderabbit-enterprise-rbac

Configure CodeRabbit enterprise access control, seat management, and organization policies. Use when managing who gets AI reviews, configuring organization-level defaults, or implementing access policies for CodeRabbit across teams. Trigger with phrases like "coderabbit SSO", "coderabbit RBAC", "coderabbit enterprise", "coderabbit roles", "coderabbit permissions", "coderabbit seats".

84

Quality

82%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Advisory

Suggest reviewing before use

SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a well-crafted skill description that clearly defines its scope (CodeRabbit enterprise access control and administration), provides explicit trigger guidance with natural user phrases, and occupies a distinct niche. It follows best practices by using third person voice, including a 'Use when' clause, and listing specific trigger phrases.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: 'access control', 'seat management', 'organization policies', 'configuring organization-level defaults', and 'implementing access policies across teams'.

3 / 3

Completeness

Clearly answers both 'what' (configure access control, seat management, organization policies) and 'when' (explicit 'Use when...' clause plus 'Trigger with phrases like...' providing concrete trigger terms).

3 / 3

Trigger Term Quality

Excellent coverage of natural trigger terms including 'coderabbit SSO', 'coderabbit RBAC', 'coderabbit enterprise', 'coderabbit roles', 'coderabbit permissions', 'coderabbit seats' — these are terms users would naturally use when seeking help with enterprise access control.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive — scoped specifically to CodeRabbit enterprise administration (SSO, RBAC, seats, permissions). Unlikely to conflict with general code review skills or other tool configurations due to the specific product and enterprise admin focus.

3 / 3

Total

12

/

12

Passed

Implementation

64%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a solid enterprise configuration skill with highly actionable YAML configs, a useful audit script, and a clear access control model diagram. Its main weaknesses are moderate verbosity (Steps 1, 2, and 6 use markdown code blocks for prose instructions rather than being more concise), and the lack of explicit validation checkpoints between configuration steps to confirm each change took effect before proceeding.

Suggestions

Add validation checkpoints between steps, e.g., after Step 1: 'Verify: open a test PR on a selected repo and confirm CodeRabbit posts a review comment' and after Step 3: 'Verify: run `@coderabbitai configuration` in a PR comment to confirm org config is applied'.

Convert Steps 1, 2, and 6 from markdown-in-code-blocks to concise bullet points or tables — the code fence formatting adds visual noise without adding executable value.

Consider splitting the detailed YAML examples (Steps 3-4) and the audit bash script (Step 5) into separate reference files linked from the main skill to reduce length.

DimensionReasoningScore

Conciseness

The skill includes some unnecessary explanatory content (e.g., the Prerequisites section listing things Claude can infer, the markdown code blocks used for non-code instructions in Steps 1, 2, and 6). The ASCII diagram is useful but could be more compact. Some inline comments are helpful but others are redundant.

2 / 3

Actionability

Provides concrete, copy-paste ready YAML configurations, a working bash audit script, specific dashboard navigation paths, and exact bot account names to exclude. The path_instructions examples with security-specific checks are highly actionable.

3 / 3

Workflow Clarity

Steps are clearly sequenced from repository access → seats → org config → repo overrides → audit → SSO. However, there are no validation checkpoints between steps (e.g., no 'verify CodeRabbit is reviewing PRs after Step 1 before proceeding' or 'validate YAML config before deploying'). For configuration operations that could silently fail, this is a gap.

2 / 3

Progressive Disclosure

The content is well-structured with clear sections and a resources section linking to external docs. However, the skill is quite long (~180 lines of content) and could benefit from splitting detailed YAML examples or the audit script into separate reference files. The 'Next Steps' reference to coderabbit-cost-tuning is good progressive disclosure.

2 / 3

Total

9

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
jeremylongshore/claude-code-plugins-plus-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.