CtrlK
CommunityDocumentationLog inGet started
Tessl Logo

implementing-database-audit-logging

tessl i github:jeremylongshore/claude-code-plugins-plus-skills --skill implementing-database-audit-logging

Process use when you need to track database changes for compliance and security monitoring. This skill implements audit logging using triggers, application-level logging, CDC, or native logs. Trigger with phrases like "implement database audit logging", "add audit trails", "track database changes", or "monitor database activity for compliance".

75%

Overall

SKILL.md
Review
Evals

Validation

81%
CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

metadata_version

'metadata' field is not a dictionary

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

13

/

16

Passed

Implementation

57%

This skill provides a comprehensive framework for database audit logging with good organizational structure and clear resource references. However, it lacks concrete executable code examples, relying instead on references to template files. The workflow is logical but would benefit from integrated validation checkpoints and explicit feedback loops for error recovery.

Suggestions

Add at least one complete, executable SQL example inline (e.g., a PostgreSQL audit trigger) rather than only referencing external template files

Integrate validation checkpoints within Steps 3-4 rather than deferring all validation to Step 6 (e.g., 'After creating audit table, verify with: SELECT * FROM audit_log LIMIT 1')

Remove boilerplate phrases like 'This skill provides automated assistance for database audit logger tasks' and the empty Overview/Examples sections at the end

Condense the audit strategy comparison into a decision table rather than verbose prose with pros/cons lists

DimensionReasoningScore

Conciseness

The content is reasonably organized but includes some unnecessary verbosity, particularly in the boilerplate sections ('This skill provides automated assistance...') and explanations of concepts Claude would know (pros/cons of each audit strategy could be more concise). The prerequisites section is thorough but could be tighter.

2 / 3

Actionability

Instructions describe what to do but lack executable code examples. References to template files exist but no actual SQL code is shown inline. Steps like 'Create AFTER INSERT/UPDATE/DELETE triggers' lack concrete implementation examples that could be copy-pasted.

2 / 3

Workflow Clarity

Steps are clearly sequenced (1-6) with logical progression, and Step 6 includes validation. However, validation checkpoints are only at the end rather than integrated throughout, and there's no explicit feedback loop for fixing issues discovered during validation.

2 / 3

Progressive Disclosure

Good structure with clear sections and well-signaled references to external files (templates, queries, docs). Resources section provides one-level-deep navigation to specific files for different needs. Content is appropriately split between overview and detailed resources.

3 / 3

Total

9

/

12

Passed

Activation

90%

This is a solid skill description with excellent trigger term coverage and clear when/what guidance. The main weakness is that the capabilities could be more concrete - it describes implementation approaches (triggers, CDC) rather than specific actions the skill performs. The description effectively distinguishes itself from other database or logging skills.

Suggestions

Replace 'Process use when' at the start with a clearer action verb - the current phrasing is awkward and unclear

Add more specific concrete actions like 'creates audit tables', 'configures change data capture', 'generates compliance reports' to improve specificity

DimensionReasoningScore

Specificity

Names the domain (database audit logging) and lists implementation approaches (triggers, application-level logging, CDC, native logs), but doesn't describe concrete actions like 'create audit tables', 'configure change capture', or 'generate compliance reports'.

2 / 3

Completeness

Clearly answers both what (implements audit logging using triggers, application-level logging, CDC, or native logs) and when (explicit 'Trigger with phrases like...' clause providing specific usage scenarios and trigger terms).

3 / 3

Trigger Term Quality

Includes good natural trigger phrases users would say: 'implement database audit logging', 'add audit trails', 'track database changes', 'monitor database activity for compliance'. These cover common variations of how users would request this functionality.

3 / 3

Distinctiveness Conflict Risk

Clear niche focused specifically on database audit logging and compliance monitoring. The specific triggers ('audit trails', 'track database changes', 'compliance') distinguish it from general database skills or logging skills.

3 / 3

Total

11

/

12

Passed

Reviewed

Table of Contents

ValidationImplementationActivation

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.