CtrlK
BlogDocsLog inGet started
Tessl Logo

log-analysis-security

Log Analysis Security - Auto-activating skill for Security Advanced. Triggers on: log analysis security, log analysis security Part of the Security Advanced skill category.

33

0.98x

Quality

0%

Does it follow best practices?

Impact

93%

0.98x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./planned-skills/generated/04-security-advanced/log-analysis-security/SKILL.md
SKILL.md
Quality
Evals
Security

Evaluation results

99%

2%

SSH Authentication Log Investigation

Brute force detection and production-ready analysis script

Criteria
Without context
With context

Step-by-step structure

100%

100%

Production-ready script

100%

100%

Script reads log file

100%

100%

Brute force detection logic

100%

100%

Pentesting tool signature recognition

90%

100%

Structured findings output

100%

100%

Severity or risk assessment

100%

100%

Recommended remediation

100%

100%

Standards reference

87%

87%

Written output artifact

100%

100%

Timeline analysis

87%

100%

Without context: $0.5233 · 2m 27s · 20 turns · 21 in / 9,192 out tokens

With context: $0.5603 · 2m 29s · 21 turns · 54 in / 9,480 out tokens

82%

-5%

Web Application Access Log Compliance Audit

Compliance framework log audit (SOC2/GDPR)

Criteria
Without context
With context

SOC2 criteria mapping

0%

0%

GDPR article mapping

100%

100%

Step-by-step analysis process

100%

100%

PII/personal data access detection

100%

100%

Access anomaly identification

100%

100%

Compliance gap findings

100%

100%

Structured report format

100%

100%

Standards-validated recommendations

100%

100%

Written report artifact

100%

100%

Data retention or log retention note

90%

40%

Without context: $0.4354 · 2m 56s · 13 turns · 14 in / 9,083 out tokens

With context: $0.6769 · 3m 36s · 25 turns · 56 in / 12,405 out tokens

100%

2%

Application Security Threat Assessment

Threat modeling from application security logs

Criteria
Without context
With context

Threat actors identified

100%

100%

Attack vectors documented

100%

100%

Impact assessment

100%

100%

Step-by-step analysis

80%

100%

Risk rating per threat

100%

100%

STRIDE or MITRE ATT&CK reference

100%

100%

Evidence traceability

100%

100%

Mitigations per threat

100%

100%

Structured threat model output

100%

100%

Production-ready analysis

100%

100%

Without context: $0.4166 · 2m 39s · 13 turns · 14 in / 8,687 out tokens

With context: $0.4636 · 2m 30s · 18 turns · 17 in / 8,363 out tokens

Repository
jeremylongshore/claude-code-plugins-plus-skills
Evaluated
Agent
Claude Code
Model
Claude Sonnet 4.6

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.