Configure Documenso enterprise role-based access control and team management. Use when implementing team permissions, configuring organizational roles, or setting up enterprise access controls. Trigger with phrases like "documenso RBAC", "documenso teams", "documenso permissions", "documenso enterprise", "documenso roles".
80
77%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./plugins/saas-packs/documenso-pack/skills/documenso-enterprise-rbac/SKILL.mdQuality
Discovery
89%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a well-structured skill description that clearly identifies its niche (Documenso enterprise RBAC), provides explicit 'Use when' guidance, and lists specific trigger phrases. Its main weakness is that the capability description could be more granular—listing specific concrete actions rather than restating the domain in slightly different ways. Overall, it would perform well in a multi-skill selection scenario.
Suggestions
Add more specific concrete actions to improve specificity, e.g., 'create and manage teams, assign member roles, configure permission levels, set up organization-wide access policies' rather than the current higher-level descriptions.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Names the domain (Documenso enterprise RBAC and team management) and some actions (implementing team permissions, configuring organizational roles, setting up enterprise access controls), but these are somewhat generic descriptions of the domain rather than listing multiple distinct concrete actions like 'create teams, assign roles, manage member permissions, configure access policies'. | 2 / 3 |
Completeness | Clearly answers both 'what' (configure Documenso enterprise RBAC and team management) and 'when' (explicit 'Use when...' clause with specific scenarios, plus a 'Trigger with phrases like...' section). Both components are explicitly stated. | 3 / 3 |
Trigger Term Quality | Explicitly lists natural trigger phrases including 'documenso RBAC', 'documenso teams', 'documenso permissions', 'documenso enterprise', 'documenso roles'. These are terms users would naturally use when seeking help with this specific functionality, and the product-specific prefixing reduces false matches. | 3 / 3 |
Distinctiveness Conflict Risk | Highly distinctive due to the product-specific qualifier 'Documenso' combined with the specific domain of RBAC/team management. The trigger terms are all prefixed with 'documenso', making conflicts with generic access control or other product skills very unlikely. | 3 / 3 |
Total | 11 / 12 Passed |
Implementation
64%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This skill provides solid, actionable guidance for Documenso enterprise RBAC with executable code and a useful permission matrix. Its main weaknesses are including generic application patterns (RBAC middleware, audit logging, multi-tenant caching) that inflate token cost without adding Documenso-specific value, and lacking validation checkpoints for security-sensitive operations like SSO configuration and tenant isolation.
Suggestions
Extract generic application-level patterns (RBAC middleware, audit logging, multi-tenant service) into a separate reference file, keeping only Documenso-specific configuration in the main skill.
Add explicit validation/verification steps: e.g., after SSO setup, include a test command or checklist; after multi-tenant setup, include a tenant isolation verification step.
Remove or condense the application-level RBAC code (Step 2) — Claude knows how to write Express middleware and permission checks; focus on what Documenso's built-in roles actually enforce via the API.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill is reasonably efficient but includes some unnecessary elements — the application-level RBAC middleware pattern (Step 2) and audit logging wrapper (Step 4) are generic patterns Claude already knows how to implement. The multi-tenant architecture (Step 5) is also a standard caching client pattern. The Documenso-specific content (team model, API key scoping, SSO config, permission matrix) earns its place. | 2 / 3 |
Actionability | The skill provides fully executable TypeScript code examples with proper imports, concrete API calls (e.g., `client.documents.sendV0()`), specific SSO configuration steps with actual URLs, and a clear permission matrix. The code is copy-paste ready and includes practical details like environment variable naming and error scenarios. | 3 / 3 |
Workflow Clarity | Steps are clearly numbered and sequenced, but there are no validation checkpoints. For enterprise RBAC configuration involving SSO setup and multi-tenant isolation (which are security-sensitive operations), there should be explicit verification steps — e.g., 'verify SSO works with a test user before enforcing,' 'run tenant isolation tests before production.' Step 3 mentions 'Test with a non-admin user first' but lacks a feedback loop for failure. | 2 / 3 |
Progressive Disclosure | The content is well-structured with clear sections and a logical progression, but it's quite long (~180 lines of substantive content) with detailed code examples that could be split into referenced files (e.g., RBAC middleware, audit logging, multi-tenant patterns). The single reference to 'documenso-migration-deep-dive' at the end is good but the main body could benefit from offloading the application-level patterns. | 2 / 3 |
Total | 9 / 12 Passed |
Validation
81%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 9 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
allowed_tools_field | 'allowed-tools' contains unusual tool name(s) | Warning |
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
Total | 9 / 11 Passed | |
3e83543
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.