CtrlK
BlogDocsLog inGet started
Tessl Logo

forensics-data-collector

Forensics Data Collector - Auto-activating skill for Security Advanced. Triggers on: forensics data collector, forensics data collector Part of the Security Advanced skill category.

35

1.07x

Quality

3%

Does it follow best practices?

Impact

95%

1.07x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./planned-skills/generated/04-security-advanced/forensics-data-collector/SKILL.md
SKILL.md
Quality
Evals
Security

Evaluation results

91%

3%

Forensic Data Collection Tool for Incident Response

Production-ready forensic collection script

Criteria
Without context
With context

Step-by-step structure

100%

100%

Runnable script

100%

100%

Error handling present

100%

100%

Hash/integrity verification

100%

100%

Write-blocking or read-only approach

30%

50%

Collection scope documented

100%

100%

Output format standardized

100%

100%

Timestamp recorded

100%

100%

Validation step included

60%

60%

Chain of custody reference

90%

100%

Without context: $0.4489 · 2m 40s · 14 turns · 15 in / 10,469 out tokens

With context: $0.5866 · 2m 46s · 25 turns · 182 in / 9,527 out tokens

98%

14%

GDPR-Compliant Forensic Investigation Process for a Healthcare Platform

GDPR-compliant forensics data collection process

Criteria
Without context
With context

GDPR data minimization

100%

100%

GDPR retention policy

100%

100%

Access logging requirement

100%

100%

Personal data handling

100%

100%

Step-by-step procedure

100%

100%

Output validation step

60%

80%

Legal basis documentation

100%

100%

Breach notification consideration

100%

100%

Encryption or pseudonymization

100%

100%

Industry standards reference

0%

100%

Without context: $0.4963 · 3m 35s · 17 turns · 18 in / 10,293 out tokens

With context: $0.6067 · 3m 24s · 25 turns · 98 in / 10,544 out tokens

97%

4%

Insider Threat Forensics Investigation: Plan and Automated Collection

Threat-modeled forensics with automated collection tooling

Criteria
Without context
With context

Threat actors identified

70%

90%

Attack vector analysis

91%

100%

Pentest methodology applied

90%

90%

Production-ready collection script

100%

100%

Step-by-step investigation procedure

100%

100%

Output validation included

100%

100%

Insider threat specific artifacts

90%

90%

Risk-prioritized collection

87%

100%

Industry best practices cited

100%

100%

Threat model diagram or table

100%

100%

Without context: $0.8868 · 5m 16s · 22 turns · 22 in / 20,171 out tokens

With context: $0.9747 · 5m 39s · 26 turns · 24 in / 21,107 out tokens

Repository
jeremylongshore/claude-code-plugins-plus-skills
Evaluated
Agent
Claude Code
Model
Claude Sonnet 4.6

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.