CtrlK
BlogDocsLog inGet started
Tessl Logo

vertex-engine-inspector

Inspect and validate Vertex AI Agent Engine deployments including Code Execution Sandbox, Memory Bank, A2A protocol compliance, and security posture. Generates production readiness scores. Use when asked to inspect, validate, or audit an Agent Engine deployment. Trigger with "inspect agent engine", "validate agent engine deployment", "check agent engine config", "audit agent engine security", "agent engine readiness check", "vertex engine health", or "reasoning engine status".

78

Quality

75%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Advisory

Suggest reviewing before use

Optimize this skill with Tessl

npx tessl skill review --optimize ./plugins/ai-ml/jeremy-vertex-engine/skills/vertex-engine-inspector/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a strong skill description that clearly articulates specific capabilities (inspecting Code Execution Sandbox, Memory Bank, A2A protocol compliance, security posture, and generating readiness scores), provides explicit 'Use when' guidance, and includes a comprehensive list of natural trigger terms. The description is concise, uses third person voice correctly, and occupies a clear niche that minimizes conflict risk with other skills.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: inspect and validate deployments, covers specific components (Code Execution Sandbox, Memory Bank, A2A protocol compliance, security posture), and mentions generating production readiness scores.

3 / 3

Completeness

Clearly answers both 'what' (inspect and validate Vertex AI Agent Engine deployments across multiple dimensions, generate readiness scores) and 'when' (explicit 'Use when' clause with specific trigger phrases).

3 / 3

Trigger Term Quality

Provides extensive natural trigger terms including 'inspect agent engine', 'validate agent engine deployment', 'check agent engine config', 'audit agent engine security', 'agent engine readiness check', 'vertex engine health', and 'reasoning engine status'. These cover multiple natural phrasings a user might use.

3 / 3

Distinctiveness Conflict Risk

Highly specific niche targeting Vertex AI Agent Engine deployments specifically, with distinct trigger terms that are unlikely to conflict with general cloud, Kubernetes, or other deployment validation skills.

3 / 3

Total

12

/

12

Passed

Implementation

50%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This skill provides a well-structured overview of a complex inspection workflow with clear categorization and useful error handling. Its main weaknesses are the lack of executable code examples (no Python SDK snippets, no curl commands), missing validation checkpoints in the workflow, and references to bundle files that don't exist. The content would benefit significantly from concrete, copy-paste-ready code blocks and actual reference file implementations.

Suggestions

Add executable Python SDK code snippets for key operations (e.g., connecting to Agent Engine, retrieving metrics, listing agents) and curl commands for A2A endpoint testing instead of just describing them in prose.

Add explicit validation checkpoints between workflow steps (e.g., 'Verify agent metadata was retrieved successfully before proceeding to runtime config parsing') and error recovery loops.

Create the referenced bundle files (inspection-workflow.md, inspection-categories.md, example-inspection-report.md, errors.md) or inline the critical content—especially the example inspection report which would make the expected output format concrete.

Replace the narrative scenario descriptions in Examples with actual input/output pairs showing a concrete agent ID, the commands run, and a truncated sample YAML report.

DimensionReasoningScore

Conciseness

The skill includes some unnecessary verbosity—the Overview largely restates the description, the Prerequisites section explains what tools are for, and the Examples section describes scenarios narratively rather than showing concrete inputs/outputs. However, it's not egregiously padded and most sections carry useful information.

2 / 3

Actionability

The instructions list specific steps and mention SDK calls like `client.agent_engines.get(name=...)` and endpoint paths, but there is no executable code—no Python snippets, no complete curl commands, no actual SDK usage examples. The guidance is specific in intent but not copy-paste ready. Key details like how to calculate weighted scores or what thresholds to use are deferred to reference files that don't exist in the bundle.

2 / 3

Workflow Clarity

The 10-step workflow is clearly sequenced and covers the inspection phases logically. However, there are no explicit validation checkpoints or feedback loops (e.g., what to do if step 3 fails before proceeding to step 4). For a multi-step inspection involving security audits and destructive-adjacent operations like IAM validation, the absence of intermediate verification steps caps this at 2.

2 / 3

Progressive Disclosure

The skill references four external files (inspection-workflow.md, inspection-categories.md, example-inspection-report.md, errors.md) which is good progressive disclosure structure. However, none of these bundle files actually exist, making the references non-functional. The main file itself is moderately long but not a wall of text—the error handling table and examples could arguably be in reference files but are reasonably placed inline.

2 / 3

Total

8

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
jeremylongshore/claude-code-plugins-plus-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.