CtrlK
BlogDocsLog inGet started
Tessl Logo

path-traversal-finder

Path Traversal Finder - Auto-activating skill for Security Fundamentals. Triggers on: path traversal finder, path traversal finder Part of the Security Fundamentals skill category.

36

0.98x

Quality

3%

Does it follow best practices?

Impact

98%

0.98x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./planned-skills/generated/03-security-fundamentals/path-traversal-finder/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

7%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This description is essentially a placeholder that provides almost no useful information for skill selection. It only states the skill name and category without explaining what actions it performs, what it detects, or when Claude should use it. The repeated trigger term is the skill's own name, which defeats the purpose of trigger-based selection.

Suggestions

Add specific actions the skill performs, e.g., 'Scans code and URLs for path traversal vulnerabilities, detects ../ sequences, identifies directory escape attempts, and flags insecure file path handling.'

Include a 'Use when...' clause with natural trigger terms: 'Use when reviewing code for security vulnerabilities, checking for directory traversal, LFI/RFI attacks, or when users mention ../, file path security, or directory escape.'

Add file types or contexts where this applies, e.g., 'Analyzes web application code, URL parameters, and file handling logic for path traversal risks.'

DimensionReasoningScore

Specificity

The description only names the skill ('Path Traversal Finder') without describing any concrete actions. There are no verbs indicating what the skill actually does - no mention of scanning, detecting, analyzing, or any specific capabilities.

1 / 3

Completeness

The description fails to answer 'what does this do' beyond the name, and the 'when' guidance is circular (triggers on its own name). There is no explicit 'Use when...' clause or meaningful trigger guidance.

1 / 3

Trigger Term Quality

The trigger terms listed are just 'path traversal finder' repeated twice. This is the skill name itself, not natural keywords users would say. Missing terms like 'directory traversal', '../', 'LFI', 'file inclusion', 'security scan', etc.

1 / 3

Distinctiveness Conflict Risk

The term 'path traversal' is somewhat specific to a security domain, which provides some distinctiveness. However, the lack of concrete actions means it could overlap with other security scanning or vulnerability detection skills.

2 / 3

Total

5

/

12

Passed

Implementation

0%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This skill is essentially a placeholder with no substantive content. It describes what a path traversal finder skill would do without providing any actual guidance, code, payloads, detection techniques, or workflows. The entire content could be replaced with a single sentence and lose nothing of value.

Suggestions

Add concrete path traversal payloads and detection patterns (e.g., '../', '..\', URL-encoded variants, null byte injections)

Include executable code examples for testing path traversal in common contexts (file uploads, URL parameters, API endpoints)

Provide a clear workflow: 1) Identify input vectors, 2) Test with payloads, 3) Validate findings, 4) Document/remediate

Add references to OWASP path traversal resources and link to related skills for input validation and secure file handling

DimensionReasoningScore

Conciseness

The content is padded with generic boilerplate that explains nothing Claude doesn't already know. Phrases like 'provides automated assistance' and 'follows industry best practices' are meaningless filler with no actionable content.

1 / 3

Actionability

There is zero concrete guidance - no code examples, no specific commands, no actual techniques for finding path traversal vulnerabilities. The skill describes what it claims to do rather than instructing how to do it.

1 / 3

Workflow Clarity

No workflow is provided whatsoever. For a security skill about finding path traversal vulnerabilities, there should be clear steps for detection, testing payloads, validation approaches, and remediation guidance.

1 / 3

Progressive Disclosure

The content is a monolithic block of vague descriptions with no references to detailed materials, no examples file, no payload lists, and no links to related security resources that would be essential for this topic.

1 / 3

Total

4

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
jeremylongshore/claude-code-plugins-plus-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.