CtrlK
BlogDocsLog inGet started
Tessl Logo

exa-security-basics

Secure Exa API keys, implement content moderation, and manage domain restrictions. Use when securing API keys, auditing Exa security configuration, or implementing content safety filtering. Trigger with phrases like "exa security", "exa secrets", "secure exa", "exa API key security", "exa content moderation".

89

Quality

88%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Advisory

Suggest reviewing before use

SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a well-crafted skill description that clearly specifies concrete capabilities, provides explicit trigger guidance with natural user phrases, and occupies a distinct niche around Exa API security and content moderation. It follows third-person voice correctly and is concise without unnecessary padding.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: 'Secure Exa API keys', 'implement content moderation', and 'manage domain restrictions'. These are distinct, actionable capabilities.

3 / 3

Completeness

Clearly answers both 'what' (secure API keys, implement content moderation, manage domain restrictions) and 'when' (explicit 'Use when...' clause with triggers, plus a 'Trigger with phrases like...' section).

3 / 3

Trigger Term Quality

Provides explicit trigger phrases like 'exa security', 'exa secrets', 'secure exa', 'exa API key security', 'exa content moderation' — these are natural terms a user would say. Also includes keywords like 'content safety filtering' and 'auditing Exa security configuration'.

3 / 3

Distinctiveness Conflict Risk

Highly specific to Exa API security and content moderation — the combination of 'Exa' branding with security/moderation concerns creates a clear niche that is unlikely to conflict with general security or general API skills.

3 / 3

Total

12

/

12

Passed

Implementation

77%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a solid, actionable security skill with executable code examples covering all key concerns (API key management, content moderation, domain filtering, query sanitization). Its main weakness is moderate verbosity — some prerequisite explanations and inline comments are unnecessary for Claude — and the content could be better split across files given its length. The workflow is well-structured with validation steps and a comprehensive security checklist.

Suggestions

Remove the Prerequisites section and overview explanation of basic concepts (env vars, .gitignore, what Exa authentication is) — Claude already knows these.

Consider extracting the detailed examples (git history scanning, key rotation procedure) and the error handling table into a separate reference file to keep SKILL.md leaner.

DimensionReasoningScore

Conciseness

The skill is mostly efficient with good code examples, but includes some unnecessary elements like the Prerequisites section (Claude knows what .gitignore and env vars are), and some inline comments that explain obvious things. The overview paragraph also explains basic concepts Claude already knows (e.g., 'Exa authenticates via the x-api-key header').

2 / 3

Actionability

Fully executable TypeScript and bash code throughout. Every step includes copy-paste ready code with concrete examples — API key validation, content moderation flags, domain filtering, query sanitization, key rotation with curl verification. The code is specific and complete.

3 / 3

Workflow Clarity

Clear 5-step sequence covering key management → content moderation → domain filtering → query sanitization → environment isolation. Includes a security checklist with validation checkpoints, an error handling table with detection/mitigation pairs, and a key rotation procedure with explicit verification step (curl check) before revoking the old key.

3 / 3

Progressive Disclosure

The content is well-structured with clear sections and a security checklist, but it's quite long (~130 lines of content) and could benefit from splitting detailed examples (git scanning, key rotation) or the domain filtering patterns into separate reference files. The 'Next Steps' reference to 'exa-prod-checklist' is good but the main file is somewhat monolithic.

2 / 3

Total

10

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
jeremylongshore/claude-code-plugins-plus-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.