CtrlK
BlogDocsLog inGet started
Tessl Logo

analyzing-network-packets-with-scapy

Craft, send, sniff, and dissect network packets using Scapy for protocol analysis, network reconnaissance, and traffic anomaly detection in authorized security testing

61

Quality

52%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./skills/analyzing-network-packets-with-scapy/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

82%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a strong description with excellent specificity and distinctiveness, naming concrete actions, a specific tool (Scapy), and clear use cases in network security. Its main weakness is the absence of an explicit 'Use when...' clause, which means Claude must infer when to select this skill rather than being explicitly guided. Adding trigger guidance would elevate this from good to excellent.

Suggestions

Add an explicit 'Use when...' clause, e.g., 'Use when the user asks about Scapy, packet crafting, packet sniffing, network protocol analysis, or traffic inspection for security testing.'

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: 'craft, send, sniff, and dissect network packets' along with specific use cases like 'protocol analysis, network reconnaissance, and traffic anomaly detection.' Names the specific tool (Scapy) and domain (authorized security testing).

3 / 3

Completeness

Clearly answers 'what does this do' (craft, send, sniff, dissect packets using Scapy for various security purposes), but lacks an explicit 'Use when...' clause or equivalent trigger guidance. The when is only implied through the listed use cases.

2 / 3

Trigger Term Quality

Includes strong natural keywords users would say: 'Scapy', 'network packets', 'protocol analysis', 'network reconnaissance', 'traffic anomaly detection', 'security testing', 'sniff', 'dissect'. These cover a good range of terms a security professional would naturally use.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive with a clear niche: Scapy-based packet manipulation for security testing. The combination of the specific tool (Scapy), specific actions (craft/send/sniff/dissect packets), and specific domain (authorized security testing) makes it very unlikely to conflict with other skills.

3 / 3

Total

11

/

12

Passed

Implementation

22%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This skill reads as a high-level outline or table of contents rather than an actionable skill document. It completely lacks executable code examples, which is critical for a packet manipulation skill where exact Scapy syntax matters. The workflow steps are vague descriptions without validation checkpoints, and the 'When to Use' section adds generic filler without teaching Claude anything it doesn't already know.

Suggestions

Add concrete, executable Python code examples for each major step (e.g., rdpcap() usage, TCP flag extraction, SYN flood detection logic, DNS entropy calculation)

Include validation checkpoints in the workflow, such as verifying pcap file loaded correctly, checking packet count, and validating authorization before sending packets

Remove the generic 'When to Use' section and replace with specific trigger conditions or input patterns that would invoke this skill

Add at least one complete end-to-end example showing input (pcap file) → analysis code → expected JSON output structure

DimensionReasoningScore

Conciseness

The content is relatively brief but includes some unnecessary filler like the 'When to Use' section with generic SOC analyst bullet points that don't add actionable value. The overview also restates what the description already covers.

2 / 3

Actionability

There is no executable code, no concrete commands, no examples of Scapy usage. The steps are entirely abstract descriptions ('Read and parse pcap files with rdpcap()') without showing actual Python code, filter syntax, or specific field access patterns. This describes rather than instructs.

1 / 3

Workflow Clarity

The steps are listed sequentially but lack any validation checkpoints, error handling, or feedback loops. For operations involving raw sockets and network scanning, there are no safety checks, no verification of authorization, and no guidance on what to do if steps fail.

1 / 3

Progressive Disclosure

The content is organized into clear sections (Overview, When to Use, Prerequisites, Steps, Expected Output), which provides some structure. However, there are no references to deeper materials, no linked examples, and the content is neither deep enough to need splitting nor shallow enough to serve as a useful overview pointing elsewhere.

2 / 3

Total

6

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

10

/

11

Passed

Repository
mukul975/Anthropic-Cybersecurity-Skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.