tessl i github:jeremylongshore/claude-code-plugins-plus-skills --skill scanning-for-vulnerabilitiesThis skill enables comprehensive vulnerability scanning using the vulnerability-scanner plugin. It identifies security vulnerabilities in code, dependencies, and configurations, including CVE detection. Use this skill when the user asks to scan for vulnerabilities, security issues, or CVEs in their project. Trigger phrases include "scan for vulnerabilities", "find security issues", "check for CVEs", "/scan", or "/vuln". The plugin performs static analysis, dependency checking, and configuration analysis to provide a detailed vulnerability report.
Validation
81%| Criteria | Description | Result |
|---|---|---|
metadata_version | 'metadata' field is not a dictionary | Warning |
license_field | 'license' field is missing | Warning |
body_output_format | No obvious output/return/format terms detected; consider specifying expected outputs | Warning |
Total | 13 / 16 Passed | |
Implementation
20%This skill content is overly verbose and lacks actionable guidance. It describes what the vulnerability-scanner plugin does conceptually but never shows how to actually invoke it, what commands or syntax to use, or what the output looks like. The content reads like marketing copy rather than executable instructions.
Suggestions
Replace abstract descriptions with concrete plugin invocation syntax (e.g., actual command or function call to trigger the scanner)
Add a real example showing input command and expected output format/structure
Remove sections explaining obvious concepts like 'When to Use This Skill' and 'How It Works' - Claude can infer these
Include specific flags, options, or configuration parameters the plugin accepts
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | Highly verbose with unnecessary explanations Claude already knows. Sections like 'How It Works', 'When to Use This Skill', and 'Integration' explain obvious concepts. The entire content could be reduced to a few lines showing how to invoke the plugin. | 1 / 3 |
Actionability | No concrete commands, code, or executable guidance. Examples describe what 'the skill will do' abstractly rather than showing actual plugin invocation syntax, command formats, or expected output structures. | 1 / 3 |
Workflow Clarity | Steps are listed but remain abstract ('Activate the vulnerability-scanner plugin'). No actual commands shown, no validation checkpoints for verifying scan completion, and no error handling guidance for failed scans. | 2 / 3 |
Progressive Disclosure | Content is organized into sections but everything is inline when much could be omitted or referenced. No links to detailed documentation, plugin API reference, or advanced configuration options. | 2 / 3 |
Total | 6 / 12 Passed |
Activation
100%This is a well-crafted skill description that excels across all dimensions. It provides specific capabilities (static analysis, dependency checking, CVE detection), explicit trigger guidance with natural user phrases, and clear 'Use when' instructions. The description is distinctive enough to avoid conflicts with other skills while being comprehensive about its security scanning focus.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions: 'identifies security vulnerabilities in code, dependencies, and configurations', 'CVE detection', 'static analysis, dependency checking, and configuration analysis', and 'detailed vulnerability report'. | 3 / 3 |
Completeness | Clearly answers both what (vulnerability scanning, CVE detection, static analysis, dependency checking) AND when ('Use this skill when the user asks to scan for vulnerabilities, security issues, or CVEs') with explicit trigger phrases listed. | 3 / 3 |
Trigger Term Quality | Excellent coverage of natural trigger terms users would say: 'scan for vulnerabilities', 'find security issues', 'check for CVEs', '/scan', '/vuln', plus mentions 'security vulnerabilities', 'CVE detection'. | 3 / 3 |
Distinctiveness Conflict Risk | Clear niche focused specifically on vulnerability scanning and security analysis with distinct triggers like '/scan', '/vuln', 'CVEs' that are unlikely to conflict with general code or document skills. | 3 / 3 |
Total | 12 / 12 Passed |
Reviewed
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.