CtrlK
BlogDocsLog inGet started
Tessl Logo

ideogram-enterprise-rbac

Implement team-based access control and credit management for Ideogram. Use when managing multiple teams with separate budgets, enforcing content policies, or implementing API key isolation for enterprise Ideogram usage. Trigger with phrases like "ideogram RBAC", "ideogram enterprise", "ideogram teams", "ideogram permissions", "ideogram multi-tenant".

64

Quality

77%

Does it follow best practices?

Impact

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./plugins/saas-packs/ideogram-pack/skills/ideogram-enterprise-rbac/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

89%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a well-structured skill description that clearly identifies its niche (enterprise Ideogram access control), provides explicit 'Use when' guidance, and includes specific trigger phrases. The main weakness is that the capability actions could be more granular—listing specific operations rather than broad categories would improve specificity.

Suggestions

List more concrete actions such as 'create teams, assign roles, set credit limits, rotate API keys, audit usage' to improve specificity from domain-level to action-level detail.

DimensionReasoningScore

Specificity

Names the domain (team-based access control and credit management for Ideogram) and some actions (managing teams, enforcing content policies, implementing API key isolation), but the actions are somewhat high-level rather than listing multiple concrete operations like 'create teams, assign roles, set credit limits, rotate API keys'.

2 / 3

Completeness

Clearly answers both 'what' (implement team-based access control and credit management for Ideogram) and 'when' (managing multiple teams with separate budgets, enforcing content policies, implementing API key isolation) with explicit trigger phrases provided.

3 / 3

Trigger Term Quality

Includes a strong set of natural trigger terms: 'ideogram RBAC', 'ideogram enterprise', 'ideogram teams', 'ideogram permissions', 'ideogram multi-tenant'. Also includes natural phrases like 'separate budgets', 'content policies', and 'API key isolation' that users would plausibly say.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive due to the specific combination of Ideogram + enterprise access control/RBAC/multi-tenant. The trigger terms are niche and unlikely to conflict with generic access control or other image generation skills.

3 / 3

Total

11

/

12

Passed

Implementation

64%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a well-structured, highly actionable skill with concrete TypeScript implementations for enterprise RBAC on Ideogram's API. Its main weaknesses are verbosity (the full inline code is extensive for a SKILL.md) and the lack of explicit validation checkpoints between implementation steps. The content would benefit from offloading detailed code into bundle files and adding verification steps.

Suggestions

Add explicit validation checkpoints between steps, e.g., 'Test teamGenerate with a sample prompt before proceeding to usage dashboard' or 'Verify content policy catches expected blocked terms with unit tests.'

Move the detailed TypeScript implementations into bundle files (e.g., team-config.ts, content-policy.ts, budget-enforcer.ts) and keep only concise summaries with references in SKILL.md.

Trim the architecture diagram or simplify it — Claude can infer the proxy pattern from the code without a full ASCII diagram.

DimensionReasoningScore

Conciseness

The skill is fairly long with extensive code blocks. While the code is useful, the architecture diagram and some explanatory text could be trimmed. The content is mostly efficient but the sheer volume (~200+ lines of TypeScript) for what is essentially an application-layer proxy pattern is more than strictly necessary for Claude to implement this.

2 / 3

Actionability

The skill provides fully executable TypeScript code with concrete interfaces, functions, API endpoints, and configuration examples. Each step has copy-paste ready code with specific Ideogram API details (endpoints, models, pricing, style types).

3 / 3

Workflow Clarity

The steps are clearly sequenced (1-6) and build logically on each other. However, there are no explicit validation checkpoints between steps — no 'verify the proxy works before adding budget enforcement' or 'test content filtering with sample prompts before deploying.' The key rotation process in Step 6 does include a verification step, but the main implementation workflow lacks feedback loops.

2 / 3

Progressive Disclosure

The content is largely monolithic — all implementation details are inline in a single file with no bundle files to offload detailed code. The error handling table and resources section are well-organized, and there's a reference to 'ideogram-migration-deep-dive', but the bulk of the TypeScript code could benefit from being split into referenced files rather than being entirely inline.

2 / 3

Total

9

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
jeremylongshore/claude-code-plugins-plus-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.