tessl i github:martinholovsky/claude-skills-generator --skill applescriptExpert in AppleScript and JavaScript for Automation (JXA) for macOS system scripting. Specializes in secure script execution, application automation, and system integration. HIGH-RISK skill due to shell command execution and system-wide control capabilities.
Review Score
65%
Validation Score
12/16
Implementation Score
77%
Activation Score
33%
Generated
Validation
Total
12/16Score
Passed| Criteria | Score |
|---|---|
description_trigger_hint | Description may be missing an explicit 'when to use' trigger hint (e.g., 'Use when...') |
metadata_version | 'metadata' field is not a dictionary |
license_field | 'license' field is missing |
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata |
Implementation
Suggestions 3
Score
77%Overall Assessment
This is a well-structured, security-focused skill with excellent actionability through complete, executable code examples and clear TDD workflows. The main weaknesses are moderate verbosity in introductory sections and a monolithic structure that could benefit from moving detailed security references to linked files. The security patterns and validation checkpoints are particularly strong.
Suggestions
| Dimension | Score | Reasoning |
|---|---|---|
Conciseness | 2/3 | The skill contains some unnecessary verbosity, including explanatory sections about what AppleScript is and expertise areas that Claude already knows. However, the code examples are generally efficient and the security patterns are well-documented without excessive padding. |
Actionability | 3/3 | Provides fully executable Python and AppleScript code examples that are copy-paste ready. The SecureAppleScriptRunner class, SafeScriptBuilder, and test examples are complete and immediately usable. |
Workflow Clarity | 3/3 | Clear TDD workflow with explicit steps (write failing test → implement minimum → refactor and verify). The pre-implementation checklist provides explicit validation checkpoints across three phases, and security checks are clearly sequenced in the execution flow. |
Progressive Disclosure | 2/3 | References to external files (security-examples.md, threat-model.md, advanced-patterns.md) are present and one-level deep, but the main document is quite long (~400 lines) with content that could be split out. The OWASP mapping table and detailed vulnerability descriptions could live in the referenced threat-model.md. |
Activation
Suggestions 3
Score
33%Overall Assessment
The description establishes domain expertise in macOS scripting technologies but lacks actionable trigger guidance and specific concrete actions. The HIGH-RISK warning is useful context but doesn't help Claude select this skill appropriately. The absence of a 'Use when...' clause significantly weakens its utility for skill selection.
Suggestions
| Dimension | Score | Reasoning |
|---|---|---|
Specificity | 2/3 | Names the domain (AppleScript, JXA, macOS scripting) and mentions some actions (script execution, application automation, system integration), but lacks specific concrete actions like 'launch applications', 'manipulate files', or 'control system preferences'. |
Completeness | 1/3 | Describes what the skill does but completely lacks a 'Use when...' clause or any explicit trigger guidance. The rubric states missing 'Use when' should cap completeness at 2, and this description has no when guidance at all. |
Trigger Term Quality | 2/3 | Includes relevant technical terms like 'AppleScript', 'JXA', 'macOS', and 'automation', but misses common user phrases like 'automate my Mac', 'run a script', 'control apps', or file extensions like '.scpt'. |
Distinctiveness Conflict Risk | 2/3 | The AppleScript/JXA focus provides some distinctiveness for macOS automation, but 'application automation' and 'system integration' are generic enough to potentially overlap with other automation or scripting skills. |
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.