Use this skill when hardening an existing Codex skill or plugin for release. It produces focused audits, eval coverage, safety gates, and packaging/install handoff evidence.
65
80%
Does it follow best practices?
Impact
—
No eval scenarios have been run
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./Plugins/skill-factory/fixtures/budget-archive/2026-04-21/deferred-store/skills/code_quality_review/skill-builder/SKILL.mdHarden existing Codex skills and plugin packages with evidence, small edits, and pass/fail/blocked outcomes.
Evidence beats taste. Keep SKILL.md small, preserve nuance in references, and tie completion claims to commands or artifacts.
Apply the context-disposition policy: move important still-valid context to references, and intentionally discard stale, duplicated, unsafe, superseded, or low-signal text.
Every skill must remain agent-native: SKILL.md must expose execution boundaries, expected artifacts, repair/failure behavior, and validation or acceptance criteria so another agent can run the workflow without hidden context. Read when: applying this contract to generated artifacts, CLIs, subagents, credentials, or multi-phase repair: agent-native skill contract.
Apply the OpenAI-style plugin design contract when hardening triggers, capability shape, side effects, user steering, or output contracts. Read when: auditing whether the skill is too broad, hides a write action, leaks unnecessary context, or needs a clearer structured output shape: OpenAI-style plugin design contract.
Use for existing skill or plugin quality work: audit fixes, routing, budget reduction, eval coverage, safety hardening, readiness, packaging, or install handoff after lifecycle judgment is settled.
Do not use for first-draft scaffolding (skill-creator), runtime install/listing work (skill-installer), plugin conversion (plugin-builder), or portfolio/session failure analysis (skill-refactor).
Creator designs the first usable shape. Builder hardens an existing skill with edits, evidence, and residual risk. Installer proves runtime visibility for an already valid skill. Refactor decides keep, merge, split, retire, or redirect from usage evidence.
This lane outputs a builder report: concrete edits, validation evidence, residual risks, and the next smallest hardening step.
If a missing input changes the safe edit path, ask one direct question. If risk is low, state the safest assumption and continue.
SKILL.md as the map: triggers, inputs, output contract, safety, and validation. Move deep policy and mechanics into references/ or scripts/.Read when: signposts whenever important detail moves.hooks.json snippets or depends on lifecycle automation, hand off to plugin-builder so the behavior can be packaged as plugin-bundled hooks.pass, fail, or blocked.For non-trivial work, return:
schema_version: 1modeskill_pathbuilder_result: patched, audit_only, blocked, or handoff_readycontext_routes for moved detaildiff_summary: behavior, routing, budget, or safety changesfindings: severity-ranked issues with file and line evidence when applicablevalidations: exact command outcomessecurityhandoff: destination lane only when another skill should take overnext_step: one smallest action that follows from the evidenceUse repo wrappers from the repo root:
./bin/ask skills audit <target-skill-path> --level strict --json./bin/ask evals run <target-skill-path> --mode smoke --json when evals existInfrastructure/bin/plugin-eval analyze <target-plugin-or-skill-path> --format markdown./bin/ask skills external-review <target-skill-path> --json for the strict audit + local Plugin Eval + installed native Tessl review ladderDefault order for skill hardening is: strict audit, smoke eval listing/run, Plugin Eval, then Tessl review through ask skills external-review. ask evals run includes native Tessl by default, stages the controlled input files in a temporary directory, and runs tessl eval run --json <staged-temp-source>, never the live source tree. Tessl eval saves runs to a Tessl project, and this repo treats that temp-staged project-save lane as automatic; --allow-tessl-project-save is accepted for compatibility but is not required. Do not use npx tessl, registry publish, registry upload, or package upload paths as a shortcut.
Fail fast: stop at the first failed gate, fix it, and rerun. Before completion, run the focused gate plus the smallest broader gate covering the edit. Use bash Infrastructure/scripts/lifecycle-and-sync/sync_skills_sandbox_safe.sh when sync is needed but user runtime paths are not writable.
Read when: you need the compact governance contract, required gates, or version policy: references/governance-contract.md.
Read when: you need the validation command matrix, strict audit expectations, or security checks: references/quality-tools.md.
Read when: you need iteration, benchmark, readiness, or artifact semantics: references/iteration-and-testing.md.
Read when: you need full install-distribute mechanics, provenance, quarantine, or rollback detail: references/advanced-workflow.md.
Read when: discovery inputs are underspecified: references/discovery-interview.md.
Preserve important context in references; do not delete it for budget alone.
| Skill | When to use |
|---|---|
| [[skill-creator]] | First-draft skill scaffolding or major authoring from new requirements |
| [[skill-refactor]] | Evidence-backed keep, improve, merge, or retire decisions from session data |
| [[skill-installer]] | Listing, installing, or checking runtime visibility for already-valid skills |
| [[codex-agent-creator]] | Reuse or create agent roles for skill-linked delegation |
| [[plugin-builder]] | Package plugin-owned lifecycle automation as bundled hooks instead of manual global hook config |
Topic map: [[agent-ops]]
4c78f98
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.