CtrlK
BlogDocsLog inGet started
Tessl Logo

groq-security-basics

Apply Groq security best practices for API key management and data protection. Use when securing API keys, implementing least privilege access, or auditing Groq security configuration. Trigger with phrases like "groq security", "groq secrets", "secure groq", "groq API key security".

85

Quality

83%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

Quality

Discovery

89%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a well-structured skill description that clearly defines its scope around Groq security best practices and provides explicit trigger guidance. Its main weakness is that the capability actions could be more concrete and specific—listing particular security operations rather than broad categories like 'data protection'. Overall it is a solid description that would enable accurate skill selection.

Suggestions

Replace broad terms like 'data protection' and 'API key management' with more concrete actions such as 'rotate API keys', 'store secrets in environment variables', 'configure role-based access controls', or 'audit API key usage logs'.

DimensionReasoningScore

Specificity

Names the domain (Groq security) and some actions (API key management, data protection, least privilege access, auditing), but the actions are somewhat generic security concepts rather than highly specific concrete operations like 'rotate API keys', 'encrypt secrets at rest', or 'configure RBAC policies'.

2 / 3

Completeness

Clearly answers both 'what' (apply Groq security best practices for API key management and data protection) and 'when' (securing API keys, implementing least privilege access, auditing Groq security configuration), with explicit trigger phrases provided.

3 / 3

Trigger Term Quality

Includes explicit trigger phrases ('groq security', 'groq secrets', 'secure groq', 'groq API key security') and natural keywords like 'API key management', 'least privilege access', and 'auditing Groq security configuration' that users would naturally say.

3 / 3

Distinctiveness Conflict Risk

The Groq-specific focus combined with security-specific triggers creates a clear niche that is unlikely to conflict with general security skills or general Groq usage skills. The trigger terms are well-scoped to this particular intersection.

3 / 3

Total

11

/

12

Passed

Implementation

77%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a solid, actionable security skill with excellent executable examples covering key management, rotation, leak prevention, and server-side patterns. Its main weakness is length — the prompt injection defense and audit logging sections add significant bulk and are not Groq-specific, making the skill less concise than it could be. The workflow is well-structured with good validation checkpoints, particularly in the key rotation procedure.

Suggestions

Move the prompt injection defense and audit logging sections to separate referenced files, keeping only a brief mention and link in the main skill.

Remove the Prerequisites section — Claude already knows about environment variables and secret management solutions.

DimensionReasoningScore

Conciseness

The skill is mostly efficient with good code examples, but includes some unnecessary content like the Prerequisites section (Claude knows what env vars and secret managers are), and the prompt injection defense section is somewhat generic/not Groq-specific. The audit logging section is also quite verbose for what it adds.

2 / 3

Actionability

Excellent executable code throughout — bash commands for key storage across multiple platforms, a working pre-commit hook, complete TypeScript server-side patterns, and concrete curl commands for verification. All examples are copy-paste ready with real commands and realistic code.

3 / 3

Workflow Clarity

Steps are clearly sequenced from key storage through rotation, leak prevention, usage patterns, and auditing. The key rotation procedure includes explicit verification (curl check for 200) and a monitoring period before deletion. The security checklist serves as a final validation checkpoint.

3 / 3

Progressive Disclosure

The content is well-structured with clear headers and a logical flow, but it's quite long (~150 lines of substantive content) with detailed code blocks that could be split into referenced files (e.g., prompt injection defense, audit logging patterns). The reference to 'groq-prod-checklist' at the end is good but the main file tries to cover too much inline.

2 / 3

Total

10

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
jeremylongshore/claude-code-plugins-plus-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.