CtrlK
BlogDocsLog inGet started
Tessl Logo

path-traversal-finder

Path Traversal Finder - Auto-activating skill for Security Fundamentals. Triggers on: path traversal finder, path traversal finder Part of the Security Fundamentals skill category.

36

0.98x
Quality

3%

Does it follow best practices?

Impact

98%

0.98x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./planned-skills/generated/03-security-fundamentals/path-traversal-finder/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

7%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This description is essentially a title repeated with minimal elaboration. It fails to describe what the skill actually does, provides no meaningful trigger terms beyond the skill's own name, and lacks any explicit guidance on when Claude should select it. It would be nearly indistinguishable from a generic security skill in a multi-skill environment.

Suggestions

Add concrete actions the skill performs, e.g., 'Detects path traversal vulnerabilities in code by identifying unsanitized file path inputs, ../ sequences, and directory escape patterns.'

Add an explicit 'Use when...' clause with natural trigger terms like 'directory traversal', '../', 'file path vulnerability', 'LFI', 'local file inclusion', 'path manipulation'.

Remove the redundant repeated trigger term and replace with diverse, natural keywords users would actually use when seeking help with this type of vulnerability.

DimensionReasoningScore

Specificity

The description names the domain ('path traversal') but does not describe any concrete actions. There is no mention of what the skill actually does—no verbs like 'detect', 'scan', 'analyze', or 'report'. It reads more like a label than a capability description.

1 / 3

Completeness

The description fails to answer 'what does this do' beyond naming itself, and the 'when' clause is essentially just restating the skill name as a trigger phrase. There is no explicit 'Use when...' guidance with meaningful context.

1 / 3

Trigger Term Quality

The only trigger term listed is 'path traversal finder' repeated twice. It misses natural variations users would say such as 'directory traversal', '../', 'dot-dot-slash', 'file inclusion vulnerability', 'LFI', or 'path manipulation'. Coverage is extremely narrow.

1 / 3

Distinctiveness Conflict Risk

The term 'path traversal' is fairly specific to a particular vulnerability class, which provides some distinctiveness. However, the vague framing ('Security Fundamentals' category) and lack of concrete actions could cause overlap with other security-related skills.

2 / 3

Total

5

/

12

Passed

Implementation

0%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This skill is essentially a placeholder or template with no actual instructional content. It describes what a path traversal finder skill would do in abstract terms but provides zero actionable guidance—no code, no patterns, no detection techniques, no examples of path traversal attacks or defenses. It fails on every dimension of the rubric.

Suggestions

Add concrete, executable code examples showing how to detect path traversal patterns (e.g., regex for '../', URL-encoded variants, canonicalization checks) in at least one language.

Define a clear workflow: 1) Identify user-controlled file path inputs, 2) Check for traversal patterns, 3) Apply canonicalization and validate against allowed directories, 4) Test with known payloads.

Include specific path traversal payloads and patterns to detect (e.g., '../', '..\', '%2e%2e%2f', null bytes) and concrete mitigation code (e.g., os.path.realpath() comparison in Python).

Remove all meta-description sections (Purpose, When to Use, Example Triggers, Capabilities) and replace with actual technical content that teaches Claude how to find and remediate path traversal vulnerabilities.

DimensionReasoningScore

Conciseness

The content is padded with generic filler text that provides no actionable information. Phrases like 'Provides step-by-step guidance' and 'Follows industry best practices' are empty platitudes. The entire file explains what the skill supposedly does without ever actually doing it.

1 / 3

Actionability

There is zero concrete guidance on path traversal detection or prevention—no code examples, no specific patterns to look for (e.g., '../', '%2e%2e'), no commands, no tools, no regex patterns, no validation logic. The skill describes rather than instructs.

1 / 3

Workflow Clarity

No workflow, steps, or process is defined. The skill claims to provide 'step-by-step guidance' but contains none. For a security-related task involving vulnerability detection, the complete absence of any sequenced process or validation checkpoints is a critical gap.

1 / 3

Progressive Disclosure

The content is a monolithic block of generic marketing-style text with no references to supporting files, no structured sections with real content, and no bundle files to reference. The sections that exist (Purpose, When to Use, Capabilities) are all meta-description with no substance.

1 / 3

Total

4

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
jeremylongshore/claude-code-plugins-plus-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.