Execute use when detecting infrastructure drift from desired state. Trigger with phrases like "check for drift", "infrastructure drift detection", "compare actual vs desired state", or "detect configuration changes". Identifies discrepancies between current infrastructure and IaC definitions using terraform plan, cloudformation drift detection, or manual comparison.
78
75%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
Optimize this skill with Tessl
npx tessl skill review --optimize ./plugins/devops/infrastructure-drift-detector/skills/detecting-infrastructure-drift/SKILL.mdQuality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a well-crafted skill description that clearly defines its purpose, provides explicit trigger phrases, and names specific tools and actions. It covers both the 'what' and 'when' effectively with natural language triggers. The only minor issue is the slightly awkward opening 'Execute use when' phrasing, but the content itself is strong and distinctive.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions: detecting infrastructure drift, comparing actual vs desired state, identifying discrepancies between current infrastructure and IaC definitions, using terraform plan, cloudformation drift detection, and manual comparison. | 3 / 3 |
Completeness | Clearly answers both 'what' (identifies discrepancies between current infrastructure and IaC definitions using specific tools) and 'when' (explicit trigger phrases like 'check for drift', 'infrastructure drift detection', etc.). | 3 / 3 |
Trigger Term Quality | Includes strong natural trigger terms users would say: 'check for drift', 'infrastructure drift detection', 'compare actual vs desired state', 'detect configuration changes', plus tool-specific terms like 'terraform plan' and 'cloudformation drift detection'. | 3 / 3 |
Distinctiveness Conflict Risk | Occupies a clear niche around infrastructure drift detection with distinct triggers like 'drift', 'terraform plan', 'cloudformation drift detection', and 'actual vs desired state' that are unlikely to conflict with other skills. | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
50%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This skill provides a reasonable overview of infrastructure drift detection across multiple IaC tools, with useful error handling and external references. However, it suffers from a lack of executable code examples (no scripts for parsing output or generating reports), missing validation/feedback loops in the workflow, and tries to cover too many tools and concerns (detection, remediation, prevention, CI/CD, alerting) at a surface level rather than providing deep, actionable guidance for any single path.
Suggestions
Add executable code blocks showing how to parse terraform plan output and generate a structured drift report (e.g., a Python or bash script that processes the JSON output of `terraform plan -json`)
Add explicit validation checkpoints: after remediation, re-run drift detection to confirm resources are back in compliance before proceeding
Split multi-tool coverage into separate referenced files (e.g., TERRAFORM_DRIFT.md, CLOUDFORMATION_DRIFT.md) and keep SKILL.md as a concise router that identifies the tool and delegates
Remove the natural language Examples section and replace with a concrete example showing actual terraform plan output and the expected drift report format
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill includes some unnecessary content like the 'Current State' section with shell commands that run on load, explanations of what drift is (Claude knows this), and the Examples section which just lists natural language prompts rather than providing actionable technical examples. The Prerequisites section is somewhat verbose with information Claude could infer. However, the error handling table and instructions are reasonably efficient. | 2 / 3 |
Actionability | The skill provides specific commands like `terraform plan -detailed-exitcode` and `aws cloudformation detect-stack-drift`, and the error handling table has concrete solutions. However, there are no executable code blocks or scripts showing how to parse drift output, generate structured reports, or set up CI/CD pipelines. Steps 5-9 are abstract guidance rather than concrete, executable instructions. | 2 / 3 |
Workflow Clarity | The 9-step workflow is sequenced logically, but lacks explicit validation checkpoints and feedback loops. There's no 'if drift detection fails, do X' branching, no verification step after remediation to confirm drift is resolved, and steps 5-9 shift from concrete detection to vague advisory guidance (investigate root cause, schedule recurring detection) without clear decision points. | 2 / 3 |
Progressive Disclosure | The content is organized into clear sections (Overview, Prerequisites, Instructions, Output, Error Handling, Examples, Resources) which is good structure. However, it's somewhat monolithic — the error handling table, multi-tool coverage (Terraform/CloudFormation/Pulumi), and CI/CD setup guidance could be split into separate referenced files. The Resources section provides external links but there are no bundle files to support progressive disclosure. | 2 / 3 |
Total | 8 / 12 Passed |
Validation
81%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 9 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
allowed_tools_field | 'allowed-tools' contains unusual tool name(s) | Warning |
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
Total | 9 / 11 Passed | |
3a2d27d
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.