CtrlK
BlogDocsLog inGet started
Tessl Logo

azure-deploy

Execute Azure deployments for ALREADY-PREPARED applications that have existing infra/{iac}/{project}/.azure/plan.md and infrastructure files. DO NOT use this skill when the user asks to CREATE a new application — use azure-prepare instead. This skill runs azd up, azd deploy, terraform apply, and az deployment commands with built-in error recovery. Requires infra/{iac}/{project}/.azure/plan.md from azure-prepare and validated status from azure-validate. WHEN: "run azd up", "run azd deploy", "execute deployment", "push to production", "push to cloud", "go live", "ship it", "bicep deploy", "terraform apply", "publish to Azure", "launch on Azure". DO NOT USE WHEN: "create and deploy", "build and deploy", "create a new app", "set up infrastructure", "create and deploy to Azure using Terraform" — use azure-prepare for these.

82

Quality

77%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Advisory

Suggest reviewing before use

Optimize this skill with Tessl

npx tessl skill review --optimize ./.github/skills/azure-deploy/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is an excellent skill description that excels across all dimensions. It provides specific concrete actions, comprehensive natural trigger terms, explicit when/when-not guidance, and clear differentiation from the related azure-prepare skill. The inclusion of both positive and negative trigger examples is a best practice that minimizes conflict risk.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: 'runs azd up, azd deploy, terraform apply, and az deployment commands with built-in error recovery.' Also specifies prerequisites like 'infra/{iac}/{project}/.azure/plan.md' and 'validated status from azure-validate.'

3 / 3

Completeness

Clearly answers both 'what' (execute Azure deployments for already-prepared applications, runs specific commands with error recovery) and 'when' (explicit WHEN clause with trigger phrases). Also includes explicit 'DO NOT USE WHEN' guidance to prevent misuse, which goes above and beyond.

3 / 3

Trigger Term Quality

Excellent coverage of natural trigger terms users would say: 'run azd up', 'push to production', 'push to cloud', 'go live', 'ship it', 'bicep deploy', 'terraform apply', 'publish to Azure', 'launch on Azure'. These are highly natural phrases a user would actually type.

3 / 3

Distinctiveness Conflict Risk

Exceptionally distinctive — explicitly differentiates itself from 'azure-prepare' with clear boundary conditions. The 'DO NOT use this skill when...' and 'DO NOT USE WHEN' clauses with specific counter-examples ('create and deploy', 'build and deploy') make it very unlikely to conflict with the preparation skill.

3 / 3

Total

12

/

12

Passed

Implementation

54%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

The skill has excellent workflow clarity and progressive disclosure with well-organized references and a clear step sequence. However, it suffers significantly from extreme repetition — the prerequisite validation requirement is restated 4-5 times in different sections, wasting substantial token budget. Actionability is moderate since actual deployment commands are entirely delegated to external references with no inline examples.

Suggestions

Consolidate the prerequisite/validation warnings into a single prominent block at the top, removing the duplicate statements from Rules, Gotchas, and the inline callout after the Steps table.

Add at least one concrete inline example of a deployment command (e.g., `azd up --environment dev` or `terraform apply -auto-approve`) so the skill is not entirely dependent on external references for core execution.

Remove the Triggers section or reduce it to a single line — this information is better suited for the YAML frontmatter description and repeats what's already there.

DimensionReasoningScore

Conciseness

The content is extremely verbose and repetitive. The prerequisite check about plan status being 'Validated' and not manually updating it is stated at least 4-5 times across the prerequisite block, rules, steps, gotchas, and validation proof check. The triggers section explains scope boundaries that are already covered in the description. Multiple warning blocks repeat the same information.

1 / 3

Actionability

The steps table provides a clear sequence but lacks concrete executable commands — it delegates almost everything to external references (recipes, checklists, verification docs). There are no inline code examples showing actual azd/terraform commands. The MCP tools table is helpful but the actual deployment execution is entirely deferred to recipe files.

2 / 3

Workflow Clarity

The workflow is clearly sequenced with explicit prerequisite gates (steps 0-1), a pre-deploy checklist (step 2), execution (steps 3-4), post-deploy (step 5), error handling (step 6), and verification (step 7). Validation checkpoints and feedback loops are well-defined, including the auto-prepare gate and validation proof checks.

3 / 3

Progressive Disclosure

Content is well-structured with clear one-level-deep references. The Reference Index table with 'When to Load' guidance is excellent for on-demand loading. SDK references, recipes, and troubleshooting are all clearly signaled with direct links. The instruction to 'Load these on demand — do NOT read all at once' is appropriate.

3 / 3

Total

9

/

12

Passed

Validation

100%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation11 / 11 Passed

Validation for skill structure

No warnings or errors.

Repository
jonathan-vella/azure-agentic-infraops
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.