CtrlK
BlogDocsLog inGet started
Tessl Logo

detecting-infrastructure-drift

Execute use when detecting infrastructure drift from desired state. Trigger with phrases like "check for drift", "infrastructure drift detection", "compare actual vs desired state", or "detect configuration changes". Identifies discrepancies between current infrastructure and IaC definitions using terraform plan, cloudformation drift detection, or manual comparison.

78

Quality

75%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Advisory

Suggest reviewing before use

Optimize this skill with Tessl

npx tessl skill review --optimize ./plugins/devops/infrastructure-drift-detector/skills/detecting-infrastructure-drift/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a well-crafted skill description that clearly defines its purpose, provides explicit trigger phrases, and names specific tools and actions. It covers both the 'what' and 'when' effectively with natural language triggers. The only minor issue is the slightly awkward opening 'Execute use when' phrasing, but the content itself is strong and distinctive.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: detecting infrastructure drift, comparing actual vs desired state, identifying discrepancies between current infrastructure and IaC definitions, using terraform plan, cloudformation drift detection, and manual comparison.

3 / 3

Completeness

Clearly answers both 'what' (identifies discrepancies between current infrastructure and IaC definitions using specific tools) and 'when' (explicit trigger phrases like 'check for drift', 'infrastructure drift detection', etc.).

3 / 3

Trigger Term Quality

Includes strong natural trigger terms users would say: 'check for drift', 'infrastructure drift detection', 'compare actual vs desired state', 'detect configuration changes', plus tool-specific terms like 'terraform plan' and 'cloudformation drift detection'.

3 / 3

Distinctiveness Conflict Risk

Occupies a clear niche around infrastructure drift detection with distinct triggers like 'drift', 'terraform plan', 'cloudformation drift detection', and 'actual vs desired state' that are unlikely to conflict with other skills.

3 / 3

Total

12

/

12

Passed

Implementation

50%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This skill provides a reasonable overview of infrastructure drift detection across multiple IaC tools, with useful error handling and external references. However, it suffers from a lack of executable code examples (no scripts for parsing output or generating reports), missing validation/feedback loops in the workflow, and tries to cover too many tools and concerns (detection, remediation, prevention, CI/CD, alerting) at a surface level rather than providing deep, actionable guidance for any single path.

Suggestions

Add executable code blocks showing how to parse terraform plan output and generate a structured drift report (e.g., a Python or bash script that processes the JSON output of `terraform plan -json`)

Add explicit validation checkpoints: after remediation, re-run drift detection to confirm resources are back in compliance before proceeding

Split multi-tool coverage into separate referenced files (e.g., TERRAFORM_DRIFT.md, CLOUDFORMATION_DRIFT.md) and keep SKILL.md as a concise router that identifies the tool and delegates

Remove the natural language Examples section and replace with a concrete example showing actual terraform plan output and the expected drift report format

DimensionReasoningScore

Conciseness

The skill includes some unnecessary content like the 'Current State' section with shell commands that run on load, explanations of what drift is (Claude knows this), and the Examples section which just lists natural language prompts rather than providing actionable technical examples. The Prerequisites section is somewhat verbose with information Claude could infer. However, the error handling table and instructions are reasonably efficient.

2 / 3

Actionability

The skill provides specific commands like `terraform plan -detailed-exitcode` and `aws cloudformation detect-stack-drift`, and the error handling table has concrete solutions. However, there are no executable code blocks or scripts showing how to parse drift output, generate structured reports, or set up CI/CD pipelines. Steps 5-9 are abstract guidance rather than concrete, executable instructions.

2 / 3

Workflow Clarity

The 9-step workflow is sequenced logically, but lacks explicit validation checkpoints and feedback loops. There's no 'if drift detection fails, do X' branching, no verification step after remediation to confirm drift is resolved, and steps 5-9 shift from concrete detection to vague advisory guidance (investigate root cause, schedule recurring detection) without clear decision points.

2 / 3

Progressive Disclosure

The content is organized into clear sections (Overview, Prerequisites, Instructions, Output, Error Handling, Examples, Resources) which is good structure. However, it's somewhat monolithic — the error handling table, multi-tool coverage (Terraform/CloudFormation/Pulumi), and CI/CD setup guidance could be split into separate referenced files. The Resources section provides external links but there are no bundle files to support progressive disclosure.

2 / 3

Total

8

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
jeremylongshore/claude-code-plugins-plus-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.