CtrlK
BlogDocsLog inGet started
Tessl Logo

vulnerability-report-generator

Vulnerability Report Generator - Auto-activating skill for Security Advanced. Triggers on: vulnerability report generator, vulnerability report generator Part of the Security Advanced skill category.

36

1.01x

Quality

3%

Does it follow best practices?

Impact

100%

1.01x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./planned-skills/generated/04-security-advanced/vulnerability-report-generator/SKILL.md
SKILL.md
Quality
Evals
Security

Evaluation results

100%

Penetration Test Report

Penetration test report generation

Criteria
Without context
With context

Executive summary present

100%

100%

All 5 findings documented

100%

100%

Severity ratings assigned

100%

100%

CWE or CVE references

100%

100%

Remediation guidance

100%

100%

Technical detail preserved

100%

100%

findings_summary.json structure

100%

100%

Step-by-step structure

100%

100%

Production-ready quality

100%

100%

Critical finding prominence

100%

100%

Impact statements

100%

100%

Report completeness

100%

100%

Without context: $0.3732 · 2m 16s · 16 turns · 16 in / 7,349 out tokens

With context: $0.4642 · 2m 42s · 20 turns · 23 in / 8,760 out tokens

100%

Compliance Vulnerability Gap Assessment

Compliance framework vulnerability assessment

Criteria
Without context
With context

All 6 gaps documented

100%

100%

SOC 2 criteria mapped

100%

100%

GDPR articles mapped

100%

100%

Risk ratings assigned

100%

100%

Remediation recommendations

100%

100%

gap_matrix.json structure

100%

100%

GDPR 72-hour requirement

100%

100%

Data separation concern

100%

100%

Structured report format

100%

100%

Production-ready document

100%

100%

Prioritization present

100%

100%

Without context: $0.3742 · 2m 5s · 13 turns · 14 in / 6,852 out tokens

With context: $0.6161 · 3m 13s · 27 turns · 26 in / 10,701 out tokens

100%

1%

Threat Model for Payment Processing Service

Threat modeling report

Criteria
Without context
With context

Threat methodology named

100%

100%

Assets identified

100%

100%

Trust boundaries defined

87%

100%

Data flows documented

100%

100%

Redis no-auth threat

100%

100%

Credentials exposure threat

100%

100%

Likelihood and impact ratings

100%

100%

Mitigations specified

100%

100%

threat_model_summary.json structure

100%

100%

Multiple threat categories

100%

100%

Production-ready document

100%

100%

At least 6 threats enumerated

100%

100%

Without context: $0.4165 · 2m 3s · 18 turns · 17 in / 7,479 out tokens

With context: $0.4492 · 2m 55s · 18 turns · 308 in / 9,235 out tokens

Repository
jeremylongshore/claude-code-plugins-plus-skills
Evaluated
Agent
Claude Code
Model
Claude Sonnet 4.6

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.