CtrlK
BlogDocsLog inGet started
Tessl Logo

zero-trust-config-helper

Zero Trust Config Helper - Auto-activating skill for Security Advanced. Triggers on: zero trust config helper, zero trust config helper Part of the Security Advanced skill category.

36

1.00x

Quality

3%

Does it follow best practices?

Impact

100%

1.00x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./planned-skills/generated/04-security-advanced/zero-trust-config-helper/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

7%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This description is severely lacking in all key areas. It reads as auto-generated boilerplate with no actual content about the skill's capabilities, use cases, or meaningful trigger terms. The description provides no value for skill selection as it doesn't explain what the skill does or when it should be used.

Suggestions

Add specific concrete actions the skill performs, e.g., 'Configures zero trust network policies, sets up identity verification rules, defines microsegmentation boundaries, audits access control configurations'

Include a 'Use when...' clause with natural trigger terms like 'zero trust architecture', 'network access policy', 'identity-based security', 'least privilege access', 'security perimeter'

Remove the redundant trigger term repetition and replace with diverse, user-natural phrases that would indicate need for this skill

DimensionReasoningScore

Specificity

The description contains no concrete actions whatsoever. 'Zero Trust Config Helper' is just a name, and 'Auto-activating skill for Security Advanced' provides no information about what the skill actually does.

1 / 3

Completeness

The description fails to answer both 'what does this do' and 'when should Claude use it'. There is no explanation of capabilities and no meaningful trigger guidance beyond the skill's own name.

1 / 3

Trigger Term Quality

The only trigger terms listed are 'zero trust config helper' repeated twice, which is the skill's own name rather than natural keywords users would say. Missing terms like 'zero trust architecture', 'network security', 'access control', 'authentication policy', etc.

1 / 3

Distinctiveness Conflict Risk

While 'zero trust' is a specific security domain, the lack of detail about what aspects of zero trust configuration this handles (network policies, identity management, microsegmentation, etc.) means it could overlap with other security-related skills.

2 / 3

Total

5

/

12

Passed

Implementation

0%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This skill is essentially a placeholder with no substantive content. It describes a capability ('zero trust config helper') without providing any actual guidance, code, configuration examples, or workflows. A zero trust configuration skill should include specific implementation patterns, validation steps, and concrete examples for identity providers, network policies, and access controls.

Suggestions

Add concrete configuration examples for common zero trust components (e.g., identity provider setup, network segmentation rules, policy-as-code templates)

Include a step-by-step workflow with validation checkpoints for implementing zero trust architecture (e.g., 1. Inventory assets, 2. Define trust boundaries, 3. Configure identity verification, 4. Validate policies)

Provide executable code or configuration snippets for specific platforms (AWS IAM policies, Azure AD Conditional Access, Kubernetes NetworkPolicies)

Reference detailed guides for specific zero trust frameworks (NIST 800-207, Google BeyondCorp) with links to implementation checklists

DimensionReasoningScore

Conciseness

The content is padded with generic boilerplate that explains nothing Claude doesn't already know. Phrases like 'provides automated assistance' and 'follows industry best practices' are meaningless filler with no actual technical content.

1 / 3

Actionability

There is zero concrete guidance - no code, no commands, no configuration examples, no specific steps. The skill describes what it claims to do but provides no executable instructions for actually implementing zero trust configurations.

1 / 3

Workflow Clarity

No workflow is defined at all. For a security configuration task that involves multiple components (identity verification, network segmentation, policy enforcement), there should be clear sequenced steps with validation checkpoints.

1 / 3

Progressive Disclosure

The content is a flat, uninformative structure with no references to detailed materials, no links to configuration templates, compliance checklists, or architecture guides that would be essential for zero trust implementation.

1 / 3

Total

4

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

allowed_tools_field

'allowed-tools' contains unusual tool name(s)

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
jeremylongshore/claude-code-plugins-plus-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.