CtrlK
BlogDocsLog inGet started
Tessl Logo

ideogram-security-basics

Apply Ideogram security best practices for API key management and access control. Use when securing API keys, implementing key rotation, or auditing Ideogram security configuration. Trigger with phrases like "ideogram security", "ideogram secrets", "secure ideogram", "ideogram API key security", "ideogram key rotation".

85

Quality

83%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

Quality

Discovery

89%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a well-structured skill description that clearly defines its scope (Ideogram API key security), provides explicit trigger conditions, and includes natural user phrases. Its main weakness is that the specific capabilities listed are somewhat high-level—terms like 'best practices' and 'access control' could be more concrete with specific actions. Overall, it performs well across all dimensions.

Suggestions

Replace 'best practices' with more concrete actions, e.g., 'Store API keys in environment variables, configure key rotation schedules, audit key usage logs' to improve specificity.

DimensionReasoningScore

Specificity

Names the domain (Ideogram API key security) and some actions (API key management, access control, key rotation, auditing), but the actions are somewhat generic and not deeply concrete—e.g., it doesn't specify what 'best practices' entail or what specific operations are performed.

2 / 3

Completeness

Clearly answers both 'what' (apply Ideogram security best practices for API key management and access control) and 'when' (securing API keys, implementing key rotation, auditing security configuration), with explicit trigger phrases provided.

3 / 3

Trigger Term Quality

Explicitly lists natural trigger phrases like 'ideogram security', 'ideogram secrets', 'secure ideogram', 'ideogram API key security', 'ideogram key rotation'. These are terms a user would naturally use when seeking this functionality, with good variation coverage.

3 / 3

Distinctiveness Conflict Risk

Highly specific to Ideogram API key security, which is a narrow niche. The repeated 'Ideogram' qualifier and security-specific focus make it very unlikely to conflict with general security skills or other Ideogram skills (e.g., image generation).

3 / 3

Total

11

/

12

Passed

Implementation

77%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a solid, actionable security skill with executable code examples and clear workflows including validation steps. Its main weakness is length — several sections (proxy pattern, prompt sanitization) could be split into referenced files to improve token efficiency. Minor verbosity in prerequisites and output sections adds tokens without value.

Suggestions

Move the proxy pattern and prompt sanitization code into separate referenced files (e.g., PROXY.md, SANITIZATION.md) to reduce the main skill's token footprint.

Remove the 'Prerequisites' and 'Output' sections — Claude doesn't need to be told about environment variables, and the output section just restates the content.

DimensionReasoningScore

Conciseness

The content is mostly efficient with concrete code examples, but includes some unnecessary sections like 'Prerequisites' (Claude knows what env vars are), the 'Output' section which just restates what was already covered, and some light over-explanation. The prompt sanitization section is arguably beyond the core scope of API key security.

2 / 3

Actionability

Fully executable code examples throughout — bash scripts, TypeScript functions, curl commands, and git hooks are all copy-paste ready with specific Ideogram API endpoints, headers, and payload structures.

3 / 3

Workflow Clarity

The key rotation procedure is clearly sequenced with numbered steps including verification (curl check for HTTP status code) before proceeding to delete the old key. The overall flow from storage → rotation → exposure prevention → pre-commit hooks → sanitization is logical with explicit validation checkpoints.

3 / 3

Progressive Disclosure

The content is well-structured with clear headings and a security checklist, but it's fairly long and monolithic. The proxy pattern, prompt sanitization, and pre-commit hook sections could be referenced as separate files. The 'Next Steps' reference to `ideogram-prod-checklist` is good but the inline content is heavy.

2 / 3

Total

10

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
jeremylongshore/claude-code-plugins-plus-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.