CtrlK
BlogDocsLog inGet started
Tessl Logo

s3-bucket-policy-generator

S3 Bucket Policy Generator - Auto-activating skill for AWS Skills. Triggers on: s3 bucket policy generator, s3 bucket policy generator Part of the AWS Skills skill category.

40

0.98x
Quality

11%

Does it follow best practices?

Impact

93%

0.98x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./planned-skills/generated/13-aws-skills/s3-bucket-policy-generator/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

22%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This description is essentially just a title repeated as a trigger term with boilerplate metadata. It fails to describe any concrete actions the skill performs and lacks an explicit 'Use when...' clause. The redundant trigger term and absence of natural keyword variations significantly limit its effectiveness for skill selection.

Suggestions

Add concrete actions describing what the skill does, e.g., 'Generates JSON S3 bucket policies for access control, including public access, cross-account access, IP restrictions, and VPC endpoint policies.'

Add an explicit 'Use when...' clause, e.g., 'Use when the user needs to create, modify, or troubleshoot S3 bucket policies, restrict bucket access, or configure S3 permissions.'

Expand trigger terms to include natural variations like 'S3 permissions', 'bucket access control', 'restrict S3 access', 'S3 policy JSON', and 'cross-account S3 access'.

DimensionReasoningScore

Specificity

The description names the domain (S3 bucket policies) but does not describe any concrete actions. It says 'S3 Bucket Policy Generator' but doesn't explain what generating a policy entails—no mention of specific capabilities like defining access rules, setting permissions, configuring principals, or outputting JSON policies.

1 / 3

Completeness

The 'what' is extremely weak—it only names itself without explaining what it does. The 'when' is limited to a repeated trigger phrase with no explicit 'Use when...' clause describing scenarios. Both components are very weak.

1 / 3

Trigger Term Quality

It includes 's3 bucket policy generator' as a trigger term (listed twice redundantly), which is a relevant keyword. However, it misses common natural variations users might say like 'S3 permissions', 'bucket access policy', 'IAM policy for S3', 'restrict S3 access', or 'S3 ACL'.

2 / 3

Distinctiveness Conflict Risk

The mention of 'S3 bucket policy' provides some specificity within the AWS domain, but 'AWS Skills' is broad and could overlap with other AWS-related skills. Without clearer scoping of what distinguishes this from general IAM policy or S3 configuration skills, there's moderate conflict risk.

2 / 3

Total

6

/

12

Passed

Implementation

0%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This skill is an empty placeholder that provides no actual guidance on generating S3 bucket policies. It contains only meta-descriptions and trigger phrases, with zero actionable content—no policy JSON templates, no IAM patterns, no security best practices, and no examples. It fails on every dimension of the rubric.

Suggestions

Add concrete S3 bucket policy JSON examples covering common use cases (e.g., public read, cross-account access, VPC endpoint restriction, enforce SSL).

Include a step-by-step workflow: identify principal → choose actions → define resource ARN → add conditions → validate with `aws s3api get-bucket-policy` or dry-run.

Provide a parameterized template or code snippet that generates policies programmatically, with copy-paste ready examples.

Remove all meta-description sections ('When to Use', 'Example Triggers', 'Capabilities') and replace with actual instructional content that teaches how to construct secure bucket policies.

DimensionReasoningScore

Conciseness

The content is entirely filler and meta-description. It explains what the skill does in abstract terms without providing any actual S3 bucket policy content, examples, or instructions. Every section restates the same vague idea.

1 / 3

Actionability

There is zero concrete guidance—no policy JSON examples, no IAM principal patterns, no specific S3 actions, no executable code or commands. It only describes what it could do rather than actually doing it.

1 / 3

Workflow Clarity

No workflow, steps, or process is defined. Generating S3 bucket policies involves understanding principals, actions, resources, and conditions, none of which are addressed or sequenced.

1 / 3

Progressive Disclosure

No references to supporting files, no structured navigation, and no bundle files exist. The content is a shallow placeholder with no depth or organization beyond boilerplate headings.

1 / 3

Total

4

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
jeremylongshore/claude-code-plugins-plus-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.