CtrlK
BlogDocsLog inGet started
Tessl Logo

analyzing-prefetch-files-for-execution-history

Parse Windows Prefetch files to determine program execution history including run counts, timestamps, and referenced files for forensic investigation.

69

Quality

62%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./skills/analyzing-prefetch-files-for-execution-history/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

82%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a strong, specific description that clearly identifies a niche forensic analysis capability with excellent domain-specific trigger terms. Its main weakness is the absence of an explicit 'Use when...' clause, which would help Claude know exactly when to select this skill. The specificity and distinctiveness are excellent for a forensic tooling skill.

Suggestions

Add an explicit 'Use when...' clause, e.g., 'Use when the user asks about Windows Prefetch analysis, program execution artifacts, .pf files, or forensic timeline reconstruction.'

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: 'Parse Windows Prefetch files', 'determine program execution history', 'run counts', 'timestamps', 'referenced files', and 'forensic investigation'. These are all concrete, specific capabilities.

3 / 3

Completeness

Clearly answers 'what does this do' (parse Prefetch files to determine execution history with specific data points), but lacks an explicit 'Use when...' clause or equivalent trigger guidance, which caps this dimension at 2 per the rubric.

2 / 3

Trigger Term Quality

Includes strong natural keywords a forensic analyst would use: 'Windows Prefetch files', 'program execution history', 'run counts', 'timestamps', 'referenced files', 'forensic investigation'. These are the exact terms someone working in digital forensics would naturally mention.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive niche: Windows Prefetch file parsing for forensic investigation is a very specific domain unlikely to conflict with other skills. The combination of 'Prefetch files', 'forensic', and specific artifact types creates a clear, unique trigger profile.

3 / 3

Total

11

/

12

Passed

Implementation

42%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

The skill provides highly actionable, executable guidance for prefetch analysis with concrete commands and working Python code, which is its primary strength. However, it is excessively verbose — explaining basic forensic concepts Claude already knows, including large reference tables inline, and describing common scenarios in prose rather than linking to separate files. The workflow lacks validation checkpoints critical for forensic integrity, and the monolithic structure would benefit significantly from progressive disclosure.

Suggestions

Remove the Key Concepts table and Tools & Systems table entirely, or move them to a separate REFERENCE.md file — Claude already knows what Prefetch files, SCCA signatures, and run counts are.

Move the Common Scenarios section to a separate SCENARIOS.md file and link to it, keeping SKILL.md focused on the executable workflow.

Add explicit validation checkpoints: verify file count after extraction, validate SHA256 hashes, check parsing success/failure counts, and confirm output file generation before proceeding to the next step.

Trim inline comments that explain obvious things (e.g., '# Count and list prefetch files' before 'ls | wc -l') and remove the prose descriptions in Prerequisites that Claude already understands.

DimensionReasoningScore

Conciseness

The skill is extremely verbose at ~250+ lines. It explains concepts Claude already knows (what Prefetch is, what SCCA signatures are, what run counts mean), includes a full Key Concepts table of basic definitions, lists 8 tools with descriptions, describes 4 common scenarios in prose, and provides lengthy inline comments. The Python parser reimplements well-known logic with excessive commentary. Much of this could be cut by 50%+ without losing actionability.

1 / 3

Actionability

The skill provides fully executable bash commands and Python code throughout. Commands are copy-paste ready with specific tool invocations (PECmd flags, grep patterns for suspicious executables, Python struct-based parsing). The code examples are concrete and complete with real file paths and working logic.

3 / 3

Workflow Clarity

The 5-step workflow is clearly sequenced and logically ordered (extract → parse → parse alternative → identify suspicious → build timeline). However, there are no explicit validation checkpoints or feedback loops — no step verifies that prefetch files were correctly extracted, that parsing succeeded without errors, or that the integrity hashes match. For forensic operations where evidence integrity is critical, this is a notable gap.

2 / 3

Progressive Disclosure

The entire skill is a monolithic wall of content with no references to external files. The Key Concepts table, Tools & Systems table, Common Scenarios section, and Output Format section all add significant bulk that could be split into separate reference files. Everything is inline with no navigation structure beyond the step headings.

1 / 3

Total

7

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

10

/

11

Passed

Repository
mukul975/Anthropic-Cybersecurity-Skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.