Configure CodeRabbit for security-focused code review with secret detection and vulnerability scanning. Use when setting up security review rules, configuring secret detection in PRs, or hardening CodeRabbit configuration for compliance requirements. Trigger with phrases like "coderabbit security", "coderabbit secrets", "secure coderabbit", "coderabbit vulnerability detection", "coderabbit security review".
84
82%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
Quality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a strong skill description that clearly defines its scope (CodeRabbit security configuration), lists concrete capabilities (secret detection, vulnerability scanning, compliance hardening), and provides explicit trigger guidance with natural user phrases. The description is well-structured with distinct 'what', 'when', and 'trigger' sections, making it easy for Claude to select appropriately.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions: 'Configure CodeRabbit', 'security-focused code review', 'secret detection', and 'vulnerability scanning'. These are clear, actionable capabilities. | 3 / 3 |
Completeness | Clearly answers both 'what' (configure CodeRabbit for security-focused code review with secret detection and vulnerability scanning) and 'when' (setting up security review rules, configuring secret detection in PRs, hardening for compliance) with explicit trigger phrases. | 3 / 3 |
Trigger Term Quality | Excellent coverage of natural trigger terms including 'coderabbit security', 'coderabbit secrets', 'secure coderabbit', 'coderabbit vulnerability detection', 'coderabbit security review', plus contextual phrases like 'secret detection in PRs' and 'compliance requirements'. | 3 / 3 |
Distinctiveness Conflict Risk | Highly distinctive — the combination of 'CodeRabbit' (a specific tool) with 'security-focused' configuration creates a very clear niche. Unlikely to conflict with general security skills or general CodeRabbit configuration skills. | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
64%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This is a highly actionable skill with concrete, executable configuration and scripts that Claude can directly apply. However, it's overly long for a single SKILL.md file—the detailed YAML configurations and scripts would be better split into referenced files. The workflow lacks explicit validation checkpoints between steps, which is important for security-sensitive configuration changes.
Suggestions
Add explicit validation checkpoints between steps, e.g., 'After Step 1, verify the config loads correctly with `coderabbit validate` or the audit script before proceeding to CI integration.'
Split the detailed path_instructions YAML and the GitHub Actions workflow into separate referenced files (e.g., SECURITY-CONFIG.yaml, SECURITY-WORKFLOW.md) to improve progressive disclosure.
Remove the Security Coverage table and Prerequisites section—Claude already understands these security categories and can infer prerequisites from the configuration content.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The security coverage table and overview section explain things Claude already knows (what SQL injection is, what XSS is, etc.). The path_instructions YAML is necessarily verbose as configuration, but the surrounding prose and the 'Prerequisites' section add little value. The table mapping categories to complementary tools is informational padding. | 2 / 3 |
Actionability | Provides fully executable YAML configuration, a complete GitHub Actions workflow, a runnable bash/Python audit script, and concrete CodeRabbit comment examples. All code blocks are copy-paste ready with specific patterns, regex, and configuration values. | 3 / 3 |
Workflow Clarity | Steps are numbered and sequenced (configure → integrate CI → train learnings → audit), but there are no explicit validation checkpoints between steps. The audit script in Step 4 serves as a post-hoc validation but isn't integrated into the workflow as a 'validate before proceeding' gate. For a security-focused skill involving potentially destructive configuration changes, explicit verification steps between stages would be expected. | 2 / 3 |
Progressive Disclosure | The skill is a long monolithic document (~200 lines of YAML/code) that could benefit from splitting the detailed path_instructions, the CI workflow, and the audit script into separate referenced files. The Resources section provides external links and there's a 'Next Steps' reference, but the core content is all inline rather than appropriately split. | 2 / 3 |
Total | 9 / 12 Passed |
Validation
81%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 9 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
allowed_tools_field | 'allowed-tools' contains unusual tool name(s) | Warning |
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
Total | 9 / 11 Passed | |
70e9fa4
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.