Use when you need focused cleanup audits, safe removals, scoped quality-risk reductions, and evidence-backed cleanup plans before touching code.
40
40%
Does it follow best practices?
Impact
—
No eval scenarios have been run
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./Infrastructure/references/deferred-skill-context/agent-ops-unslopify/SKILL.mdQuality
Discovery
17%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This description relies heavily on abstract, buzzword-laden language without specifying concrete actions or natural user trigger terms. While it includes a 'Use when' clause, the triggers themselves are vague and jargon-heavy rather than reflecting how users naturally request help. The description would conflict with many other code-quality-related skills due to its lack of specificity.
Suggestions
Replace abstract phrases with concrete actions, e.g., 'Identifies and removes dead code, unused imports, and deprecated functions' instead of 'safe removals' and 'focused cleanup audits'.
Add natural trigger terms users would actually say, such as 'dead code', 'unused variables', 'tech debt', 'refactor', 'code cleanup', or 'remove unused code'.
Narrow the scope to a distinct niche — specify what kind of cleanup (e.g., dead code removal vs. style cleanup vs. dependency pruning) to reduce conflict with other code quality skills.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | The description uses vague, abstract language like 'focused cleanup audits', 'safe removals', 'scoped quality-risk reductions', and 'evidence-backed cleanup plans'. These are buzzword-heavy phrases that don't describe concrete, specific actions (e.g., what kind of code cleanup? removing dead code? refactoring functions?). | 1 / 3 |
Completeness | The description has a 'Use when' clause which addresses the 'when' question, but the 'what' is vague and poorly defined. The 'when' triggers are themselves abstract ('focused cleanup audits', 'safe removals') rather than concrete scenarios, making the guidance weak despite the explicit structure. | 2 / 3 |
Trigger Term Quality | The terms used ('cleanup audits', 'quality-risk reductions', 'evidence-backed cleanup plans') are not natural phrases a user would say. A user would more likely say 'clean up code', 'remove dead code', 'refactor', 'tech debt', or 'code smell'. The description lacks these natural trigger terms. | 1 / 3 |
Distinctiveness Conflict Risk | The description is very generic — 'cleanup', 'removals', and 'quality' could overlap with any code refactoring, linting, testing, or code review skill. There is no clear niche or domain-specific trigger that would distinguish this from other code quality skills. | 1 / 3 |
Total | 5 / 12 Passed |
Implementation
62%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This is a well-structured maintenance workflow skill with strong workflow clarity and explicit safety gates. Its main weaknesses are moderate redundancy across sections (fail-fast logic, validation requirements stated multiple times) and a gap between the detailed process description and truly executable, copy-paste-ready guidance for the discovery lanes. The progressive disclosure structure is reasonable but the referenced bundle files are absent, making it hard to fully validate.
Suggestions
Consolidate the duplicated fail-fast and validation gating instructions into a single authoritative section, then reference it from other phases to reduce redundancy.
Add concrete, executable detection patterns or commands for at least 2-3 discovery lanes (e.g., specific `rg` patterns for dead exports, unused imports, or stale dependencies) to improve actionability.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill is reasonably efficient but includes some redundancy—fail-fast behavior is stated in multiple places (Failure mode section, Baseline validation section), and the Invocation/Visibility Proof section repeats the gating logic. Some sections like Gotchas and Anti-Patterns overlap. However, it mostly avoids explaining concepts Claude already knows. | 2 / 3 |
Actionability | The skill provides concrete command examples (e.g., `./bin/ask skills resolve unslopify --json`, `rg`, `fd`) and a clear decision matrix, but the core cleanup workflow relies on general guidance rather than executable code. Discovery lanes describe what to look for but not how to detect it with specific commands or patterns. The examples section shows invocation prompts but not expected outputs. | 2 / 3 |
Workflow Clarity | The six-phase workflow is clearly sequenced with explicit validation checkpoints at multiple stages. Phase 5 includes batch-level verification with downgrade-on-uncertainty logic. The fail-fast gates in the Baseline Validation and Invocation sections provide clear feedback loops—stop, report blocker, fix, then retry. Destructive operations (code deletion) are gated behind import/reference evidence requirements. | 3 / 3 |
Progressive Disclosure | The skill references `references/contract.yaml`, `references/evals.yaml`, and `references/task-profile.json` with clear purpose descriptions, and links to related skills via `[[simplify]]` and `[[verification-before-completion]]`. However, no bundle files were provided, so these references cannot be verified. The main file itself is quite long (~180 lines) and some content (e.g., the detailed Invocation proof commands or Anti-Patterns) could potentially be split out to keep the overview leaner. | 2 / 3 |
Total | 9 / 12 Passed |
Validation
90%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 10 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
metadata_version | 'metadata.version' is missing | Warning |
Total | 10 / 11 Passed | |
d00c351
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.