CtrlK
BlogDocsLog inGet started
Tessl Logo

security-policy-generator

Security Policy Generator - Auto-activating skill for Security Advanced. Triggers on: security policy generator, security policy generator Part of the Security Advanced skill category.

36

1.01x

Quality

3%

Does it follow best practices?

Impact

97%

1.01x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./planned-skills/generated/04-security-advanced/security-policy-generator/SKILL.md
SKILL.md
Quality
Evals
Security

Evaluation results

100%

SOC2 Readiness: Access Control and Incident Response Policies

SOC2 compliance policy generation

Criteria
Without context
With context

Sequential structure

100%

100%

No placeholder text

100%

100%

Production completeness - access control

100%

100%

Production completeness - incident response

100%

100%

SOC2 Trust Services Criteria reference

100%

100%

Industry framework alignment

100%

100%

SOC2 control mapping

100%

100%

Audit-ready language

100%

100%

Authentication requirements specificity

100%

100%

Policy ownership

100%

100%

Without context: $0.5287 · 3m 21s · 18 turns · 19 in / 10,457 out tokens

With context: $0.7189 · 4m 15s · 26 turns · 25 in / 12,855 out tokens

91%

1%

EU Market Expansion: GDPR Data Protection Policy and Data Breach Notification Procedure

GDPR data protection policy

Criteria
Without context
With context

Sequential breach procedure

100%

100%

No placeholder text

50%

60%

GDPR article citations

100%

100%

72-hour notification requirement

100%

100%

Data subject rights coverage

100%

100%

Lawful basis for processing

100%

100%

Data processor obligations

100%

100%

Production completeness

100%

100%

Policy scope and ownership

100%

100%

Standard validation reference

0%

0%

Without context: $0.5237 · 4m 26s · 13 turns · 16 in / 13,230 out tokens

With context: $0.6143 · 3m 53s · 22 turns · 600 in / 11,977 out tokens

100%

Enterprise Penetration Testing Program: Policy and Engagement Methodology

Penetration testing policy and procedure

Criteria
Without context
With context

Sequential methodology phases

100%

100%

No placeholder text

100%

100%

Rules of engagement coverage

100%

100%

Industry framework reference

100%

100%

Reporting phase included

100%

100%

Tester qualification criteria

100%

100%

Frequency and scope requirements

100%

100%

Production completeness - policy

100%

100%

Regulatory standard alignment

100%

100%

Pre-engagement scoping step

100%

100%

Without context: $0.4724 · 4m 8s · 12 turns · 13 in / 11,924 out tokens

With context: $0.7062 · 4m 30s · 27 turns · 103 in / 13,201 out tokens

Repository
jeremylongshore/claude-code-plugins-plus-skills
Evaluated
Agent
Claude Code
Model
Claude Sonnet 4.6

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.