tessl i github:jeremylongshore/claude-code-plugins-plus-skills --skill implementing-database-audit-loggingProcess use when you need to track database changes for compliance and security monitoring. This skill implements audit logging using triggers, application-level logging, CDC, or native logs. Trigger with phrases like "implement database audit logging", "add audit trails", "track database changes", or "monitor database activity for compliance".
Validation
81%| Criteria | Description | Result |
|---|---|---|
allowed_tools_field | 'allowed-tools' contains unusual tool name(s) | Warning |
metadata_version | 'metadata' field is not a dictionary | Warning |
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
Total | 13 / 16 Passed | |
Implementation
57%This skill provides a comprehensive framework for database audit logging with good organizational structure and clear resource references. However, it lacks concrete executable code examples, relying instead on references to template files. The workflow is logical but would benefit from integrated validation checkpoints and explicit feedback loops for error recovery.
Suggestions
Add at least one complete, executable SQL example inline (e.g., a PostgreSQL audit trigger) rather than only referencing external template files
Integrate validation checkpoints within Steps 3-4 rather than deferring all validation to Step 6 (e.g., 'After creating audit table, verify with: SELECT * FROM audit_log LIMIT 1')
Remove boilerplate phrases like 'This skill provides automated assistance for database audit logger tasks' and the empty Overview/Examples sections at the end
Condense the audit strategy comparison into a decision table rather than verbose prose with pros/cons lists
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The content is reasonably organized but includes some unnecessary verbosity, particularly in the boilerplate sections ('This skill provides automated assistance...') and explanations of concepts Claude would know (pros/cons of each audit strategy could be more concise). The prerequisites section is thorough but could be tighter. | 2 / 3 |
Actionability | Instructions describe what to do but lack executable code examples. References to template files exist but no actual SQL code is shown inline. Steps like 'Create AFTER INSERT/UPDATE/DELETE triggers' lack concrete implementation examples that could be copy-pasted. | 2 / 3 |
Workflow Clarity | Steps are clearly sequenced (1-6) with logical progression, and Step 6 includes validation. However, validation checkpoints are only at the end rather than integrated throughout, and there's no explicit feedback loop for fixing issues discovered during validation. | 2 / 3 |
Progressive Disclosure | Good structure with clear sections and well-signaled references to external files (templates, queries, docs). Resources section provides one-level-deep navigation to specific files for different needs. Content is appropriately split between overview and detailed resources. | 3 / 3 |
Total | 9 / 12 Passed |
Activation
90%This is a solid skill description with excellent trigger term coverage and clear when/what guidance. The main weakness is that the capabilities could be more concrete - it describes implementation approaches (triggers, CDC) rather than specific actions the skill performs. The description effectively distinguishes itself from other database or logging skills.
Suggestions
Replace 'Process use when' at the start with a clearer action verb - the current phrasing is awkward and unclear
Add more specific concrete actions like 'creates audit tables', 'configures change data capture', 'generates compliance reports' to improve specificity
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Names the domain (database audit logging) and lists implementation approaches (triggers, application-level logging, CDC, native logs), but doesn't describe concrete actions like 'create audit tables', 'configure change capture', or 'generate compliance reports'. | 2 / 3 |
Completeness | Clearly answers both what (implements audit logging using triggers, application-level logging, CDC, or native logs) and when (explicit 'Trigger with phrases like...' clause providing specific usage scenarios and trigger terms). | 3 / 3 |
Trigger Term Quality | Includes good natural trigger phrases users would say: 'implement database audit logging', 'add audit trails', 'track database changes', 'monitor database activity for compliance'. These cover common variations of how users would request this functionality. | 3 / 3 |
Distinctiveness Conflict Risk | Clear niche focused specifically on database audit logging and compliance monitoring. The specific triggers ('audit trails', 'track database changes', 'compliance') distinguish it from general database skills or logging skills. | 3 / 3 |
Total | 11 / 12 Passed |
Reviewed
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.