This skill uses the pci-dss-validator plugin to assess codebases and infrastructure configurations for compliance with the Payment Card Industry Data Security Standard (PCI DSS). It identifies potential vulnerabilities and deviations from PCI DSS requirements. Use this skill when the user requests to "validate PCI compliance", "check PCI DSS", "assess PCI security", or "review PCI standards" for a given project or configuration. It helps ensure that systems handling cardholder data meet the necessary security controls.
86
48%
Does it follow best practices?
Impact
89%
1.08xAverage score across 12 eval scenarios
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./backups/skills-migration-20251108-070147/plugins/security/pci-dss-validator/skills/pci-dss-validator/SKILL.mdCompliance report structure and workflow
Scope defined
33%
100%
Analyze step present
37%
50%
Validation step present
100%
100%
Report compiled
100%
100%
Workflow order correct
40%
90%
Findings listed
100%
100%
Remediation per finding
100%
100%
Tracker items match findings
100%
100%
Tracker has progress fields
100%
100%
Infrastructure assessment and IaC integration
Scope defined
100%
100%
Analyze step present
50%
50%
Validation step present
100%
100%
Report compiled with summary
100%
100%
Plugin/tool referenced
35%
0%
Findings listed
100%
100%
Remediation per finding
100%
100%
IaC integration guidance
100%
100%
Remediation plan has status/owner fields
100%
100%
Continuous compliance program and integration
Periodic schedule defined
100%
100%
Static analysis integration
100%
100%
IaC tool integration
100%
100%
Both code and infra stages
100%
100%
Remediation tracking template
100%
100%
Tracker has run/date fields
100%
100%
Tracker has status/owner fields
100%
100%
Three-step workflow described
100%
100%
Report output in workflow
100%
100%
Scope addressed
100%
100%
Pre-deployment compliance validation
Scope defined first
100%
100%
Analyze step present
100%
100%
Validation step present
100%
100%
Report compiled with summary
100%
100%
Plugin/tool referenced
0%
28%
Pre-deployment framing
100%
100%
Specific violations listed
100%
100%
Remediation per finding
100%
100%
Remediation plan produced
100%
100%
Remediation plan has status/owner fields
100%
100%
Security vulnerability investigation
Investigation framing
100%
100%
Scope defined
100%
100%
Analyze step present
62%
37%
Plugin/tool referenced
0%
0%
Specific vulnerabilities identified
100%
100%
Risk context per finding
100%
100%
Remediation steps per finding
100%
100%
Report compiled with summary
100%
100%
Separate tracker produced
100%
100%
Tracker has date/discovery fields
50%
100%
Tracker has status/owner fields
100%
100%
Static analysis tool integration
Scope defined
100%
100%
Analyze step present
50%
66%
Validation step present
100%
100%
Compliance scanner referenced
14%
57%
Static analysis tool referenced
100%
100%
Both tools in runbook
33%
0%
Specific violations listed
100%
100%
Remediation per finding
100%
100%
Report compiled with summary
100%
100%
Runbook produced
100%
100%
Container configuration compliance
Scope defined
100%
100%
Analyze step present
100%
75%
Validation step present
100%
100%
Workflow order correct
100%
100%
Plugin/tool referenced
0%
100%
Container violations listed
100%
100%
Application violations listed
100%
100%
Remediation per finding
100%
100%
Report compiled with summary
100%
100%
Remediation tracker produced
100%
100%
Multi-service scope assessment
Scope covers all services
100%
100%
Analyze step present
37%
25%
Validation step present
100%
100%
Workflow order correct
100%
75%
Plugin/tool referenced
0%
100%
Auth service violations
100%
100%
Transaction service violations
100%
100%
Reporting service violations
100%
100%
Remediation per finding
100%
100%
Report compiled with summary
100%
100%
Remediation tracker produced
100%
100%
Periodic compliance review and tracking
Scope defined
100%
100%
Periodic framing
100%
100%
Analyze step present
50%
50%
Validation step present
100%
100%
Workflow order correct
100%
100%
Plugin/tool referenced
0%
100%
Specific violations listed
100%
100%
Remediation per finding
100%
100%
Report compiled with summary
100%
100%
Remediation tracker produced
100%
100%
Tracker supports multi-cycle tracking
100%
100%
CloudFormation infrastructure compliance assessment
Scope defined first
75%
100%
Analyze step present
28%
71%
Validation step present
100%
100%
Workflow order correct
100%
100%
Plugin/tool referenced
0%
100%
Unencrypted storage violations
100%
100%
Network security violations
100%
100%
Credential exposure violations
100%
100%
Logging/monitoring gaps identified
100%
100%
Unencrypted transmission identified
100%
100%
Remediation per finding
100%
100%
Report compiled with summary
100%
100%
Remediation plan with status/owner fields
100%
100%
Database data handling and retention compliance
Scope defined first
100%
100%
Analyze step present
28%
42%
Validation step present
100%
100%
Workflow order correct
85%
100%
Plugin/tool referenced
0%
0%
CVV storage violation identified
100%
100%
Track data or full PAN storage identified
100%
100%
Logging violation identified
100%
100%
Credential exposure identified
100%
100%
Unmasked data export identified
100%
100%
Remediation per finding
100%
100%
Report compiled with summary
100%
100%
Remediation tracker with status/owner
100%
100%
REST API endpoint compliance assessment
Scope defined first
100%
100%
Analyze step present
100%
66%
Validation step present
100%
100%
Workflow order correct
100%
100%
Plugin/tool referenced
0%
0%
Logging violation identified
100%
100%
Data storage violations identified
100%
100%
Weak hashing violation identified
100%
100%
Unauthenticated endpoint identified
100%
100%
Remediation per finding
100%
100%
Report compiled with summary
100%
100%
Remediation plan produced
100%
100%
Remediation plan has status/owner fields
100%
100%
13d35b8
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.