Network Security Scanner - Auto-activating skill for Security Advanced. Triggers on: network security scanner, network security scanner Part of the Security Advanced skill category.
Install with Tessl CLI
npx tessl i github:jeremylongshore/claude-code-plugins-plus-skills --skill network-security-scannerOverall
score
19%
Does it follow best practices?
Validation for skill structure
Activation
7%This description is severely underdeveloped, functioning more as a placeholder than a useful skill description. It lacks any concrete actions, meaningful trigger terms, or guidance on when to use it. The redundant trigger term and reliance on category labels provide no value for skill selection.
Suggestions
Add specific concrete actions the skill performs (e.g., 'Scans network ports, identifies open services, detects common vulnerabilities, analyzes firewall configurations').
Include a 'Use when...' clause with natural trigger terms users would say (e.g., 'Use when the user asks to scan a network, check for open ports, audit security, or detect vulnerabilities').
Remove the redundant trigger term and boilerplate category text, replacing with functional description that distinguishes this from other security skills.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | The description contains no concrete actions whatsoever. It only states it's a 'Network Security Scanner' without explaining what it actually does (e.g., port scanning, vulnerability detection, traffic analysis). | 1 / 3 |
Completeness | The description fails to answer both 'what does this do' and 'when should Claude use it'. It only provides a category label and redundant trigger phrase without any functional description or explicit usage guidance. | 1 / 3 |
Trigger Term Quality | The trigger terms are redundantly listed ('network security scanner, network security scanner') and represent only technical jargon. Missing natural user terms like 'scan ports', 'check vulnerabilities', 'network audit', 'security check'. | 1 / 3 |
Distinctiveness Conflict Risk | While 'network security scanner' is somewhat specific to a domain, the lack of concrete capabilities means it could overlap with other security-related skills. The term 'Security Advanced' category doesn't help distinguish its unique purpose. | 2 / 3 |
Total | 5 / 12 Passed |
Implementation
0%This skill content is essentially a placeholder template with no substantive information about network security scanning. It describes what the skill should do rather than providing any actual guidance, code examples, tool references, or workflows. The content fails on all dimensions by being entirely meta-descriptive without actionable content.
Suggestions
Add concrete examples of network security scanning tools (nmap, masscan, etc.) with executable command-line examples and expected output formats
Include a clear workflow for conducting a network security scan: reconnaissance -> port scanning -> service enumeration -> vulnerability assessment, with validation steps between phases
Provide specific code snippets or command examples for common scanning scenarios (e.g., TCP SYN scan, service version detection, OS fingerprinting)
Remove all meta-description content ('This skill provides...', 'Capabilities include...') and replace with actual technical guidance
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The content is padded with generic boilerplate that provides no actual value. Phrases like 'Provides step-by-step guidance' and 'Follows industry best practices' are vague filler that Claude doesn't need to be told. | 1 / 3 |
Actionability | There is zero concrete guidance, no executable code, no specific commands, and no actual instructions for performing network security scanning. The content only describes what the skill claims to do without showing how. | 1 / 3 |
Workflow Clarity | No workflow is provided whatsoever. Despite claiming to provide 'step-by-step guidance,' there are no actual steps, sequences, or validation checkpoints for any network security scanning task. | 1 / 3 |
Progressive Disclosure | The content is a monolithic block of meta-description with no structure pointing to detailed materials, no references to external documentation, and no organized navigation to actual scanning techniques or tools. | 1 / 3 |
Total | 4 / 12 Passed |
Validation
69%Validation — 11 / 16 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
description_trigger_hint | Description may be missing an explicit 'when to use' trigger hint (e.g., 'Use when...') | Warning |
allowed_tools_field | 'allowed-tools' contains unusual tool name(s) | Warning |
metadata_version | 'metadata' field is not a dictionary | Warning |
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
body_steps | No step-by-step structure detected (no ordered list); consider adding a simple workflow | Warning |
Total | 11 / 16 Passed | |
Reviewed
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.