CtrlK
BlogDocsLog inGet started
Tessl Logo

ideogram-security-basics

Apply Ideogram security best practices for API key management and access control. Use when securing API keys, implementing key rotation, or auditing Ideogram security configuration. Trigger with phrases like "ideogram security", "ideogram secrets", "secure ideogram", "ideogram API key security", "ideogram key rotation".

85

Quality

83%

Does it follow best practices?

Impact

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

Quality

Discovery

89%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a solid description that clearly identifies its niche (Ideogram API key security), provides explicit trigger phrases, and answers both what and when. Its main weakness is that the specific capabilities listed are somewhat high-level — terms like 'best practices' and 'access control' could be more concrete with specific actions.

Suggestions

Replace 'best practices' with more concrete actions, e.g., 'Store API keys in environment variables, configure key rotation schedules, audit key usage logs' to improve specificity.

DimensionReasoningScore

Specificity

Names the domain (Ideogram API key security) and some actions (API key management, access control, key rotation, auditing), but the actions are somewhat generic and not deeply concrete — e.g., it doesn't specify what 'best practices' entail or what specific operations are performed.

2 / 3

Completeness

Clearly answers both 'what' (apply Ideogram security best practices for API key management and access control) and 'when' (securing API keys, implementing key rotation, auditing security configuration), with explicit trigger phrases.

3 / 3

Trigger Term Quality

Explicitly lists natural trigger phrases like 'ideogram security', 'ideogram secrets', 'secure ideogram', 'ideogram API key security', 'ideogram key rotation' — these are terms a user would naturally say and cover good variations.

3 / 3

Distinctiveness Conflict Risk

The description is narrowly scoped to Ideogram-specific API key security, which is a clear niche unlikely to conflict with general security skills or other API-related skills due to the repeated 'Ideogram' qualifier.

3 / 3

Total

11

/

12

Passed

Implementation

77%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a solid, actionable security skill with executable code examples and clear multi-step workflows including validation checkpoints. Its main weakness is moderate verbosity — some sections (Prerequisites, Output) add little value, and the inline code examples could be split into referenced files for better progressive disclosure. The error handling table and security checklist are effective summaries.

Suggestions

Remove the 'Prerequisites' and 'Output' sections — they restate obvious context and already-covered content, saving tokens.

Consider extracting the proxy pattern and prompt sanitization into separate referenced files (e.g., PROXY.md, SANITIZATION.md) to improve progressive disclosure and reduce the main file's length.

DimensionReasoningScore

Conciseness

Generally efficient but includes some unnecessary elements: the 'Prerequisites' section stating 'Understanding of environment variables' is obvious for Claude, the 'Output' section restates what was already covered, and some inline comments are redundant. The proxy pattern example is thorough but could be trimmed.

2 / 3

Actionability

Provides fully executable code examples throughout: bash scripts with proper flags, TypeScript functions that are copy-paste ready, a working curl verification command, and a concrete pre-commit hook. The key rotation procedure includes specific platform commands (Vercel, GitHub Actions, AWS).

3 / 3

Workflow Clarity

Steps are clearly sequenced (1-5) with explicit validation checkpoints: Step 1 validates key at startup with fail-fast, Step 2 includes a curl verification before deleting the old key, Step 4 provides a pre-commit hook as a safety gate. The key rotation procedure has a clear feedback loop (verify new key works before deleting old key).

3 / 3

Progressive Disclosure

Content is well-structured with clear sections and a security checklist summary, but it's somewhat monolithic — the proxy pattern and prompt sanitization examples could be split into referenced files. The 'Next Steps' reference to 'ideogram-prod-checklist' is good but there are no bundle files to support it. No bundle files are provided despite the content length warranting some separation.

2 / 3

Total

10

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
jeremylongshore/claude-code-plugins-plus-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.