CtrlK
BlogDocsLog inGet started
Tessl Logo

analyzing-sbom-for-supply-chain-vulnerabilities

Parses Software Bill of Materials (SBOM) in CycloneDX and SPDX JSON formats to identify supply chain vulnerabilities by correlating components against the NVD CVE database via the NVD 2.0 API. Builds dependency graphs, calculates risk scores, identifies transitive vulnerability paths, and generates compliance reports. Activates for requests involving SBOM analysis, software composition analysis, supply chain security assessment, dependency vulnerability scanning, CycloneDX/SPDX parsing, or CVE correlation.

56

Quality

63%

Does it follow best practices?

Impact

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./skills/analyzing-sbom-for-supply-chain-vulnerabilities/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is an excellent skill description that clearly articulates specific capabilities, includes comprehensive trigger terms, and explicitly states both what the skill does and when it should activate. The description is well-structured, uses third person voice throughout, and occupies a highly distinctive niche that minimizes conflict risk with other skills.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: parses SBOM in CycloneDX/SPDX JSON formats, correlates against NVD CVE database via NVD 2.0 API, builds dependency graphs, calculates risk scores, identifies transitive vulnerability paths, and generates compliance reports.

3 / 3

Completeness

Clearly answers both 'what' (parses SBOMs, builds dependency graphs, calculates risk scores, generates compliance reports) and 'when' with an explicit 'Activates for requests involving...' clause listing specific trigger scenarios.

3 / 3

Trigger Term Quality

Includes strong natural keywords users would say: 'SBOM analysis', 'software composition analysis', 'supply chain security', 'dependency vulnerability scanning', 'CycloneDX', 'SPDX', 'CVE correlation'. These cover the main terms a user in this domain would naturally use.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive with a clear niche: SBOM parsing in specific formats (CycloneDX/SPDX), NVD CVE correlation, and supply chain vulnerability analysis. Very unlikely to conflict with other skills due to the specialized domain and specific format/API references.

3 / 3

Total

12

/

12

Passed

Implementation

27%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This skill covers a complex domain comprehensively but suffers from significant verbosity — it explains many concepts Claude already knows (SBOM definitions, what NVD is, what transitive dependencies are) and includes reference-style content inline that inflates token usage. The workflow is reasonably structured but lacks validation checkpoints and error recovery loops, and several steps provide incomplete or non-executable code. The monolithic structure with no progressive disclosure makes it inefficient for context window usage.

Suggestions

Remove the 'Key Concepts' glossary table and 'Tools & Systems' descriptions entirely — Claude already knows these concepts and can look them up if needed.

Make the risk score calculation and report generation steps executable Python code rather than text/template format.

Add explicit validation checkpoints: verify SBOM parse succeeded (component count > 0), handle NVD API rate limits and failures with retry logic, and define what to do when grype results differ from NVD analysis.

Split the JSON structure examples, scenario walkthrough, and any reference material into separate bundle files, keeping SKILL.md as a concise workflow overview with pointers.

DimensionReasoningScore

Conciseness

The skill is extremely verbose at ~250+ lines. It explains concepts Claude already knows (what SBOM, SPDX, CycloneDX, PURL, CPE, NVD, and transitive dependencies are), includes a full glossary table, lists tool descriptions Claude doesn't need, and provides lengthy JSON structure examples that are reference documentation rather than actionable guidance. The 'Key Concepts' and 'Tools & Systems' sections are pure padding.

1 / 3

Actionability

The skill provides some executable code (Python functions for NVD API queries, networkx graph building, bash commands for syft/grype) but key pieces are incomplete — the SBOM parsing code doesn't show a complete unified parser, the risk score calculation is pseudocode/text rather than executable code, and the report generation step is just an example output template with no code to produce it. The NVD query functions are usable but lack pagination, rate limiting, and error handling.

2 / 3

Workflow Clarity

The 7-step workflow is clearly sequenced and logically ordered, but lacks explicit validation checkpoints. There's no verification after SBOM parsing (e.g., checking component count, validating format), no error handling for NVD API failures or rate limiting, and no feedback loop for when cross-validation with grype reveals discrepancies. The cross-validation step (Step 6) mentions grype but doesn't explain what to do when results differ from the NVD-based analysis.

2 / 3

Progressive Disclosure

The entire skill is a monolithic wall of text with no references to external files. Content that should be separated (JSON schema examples, glossary, tool descriptions, the detailed scenario) is all inline. There are no bundle files, yet the content is long enough to warrant splitting into reference materials. The glossary table and tools list alone could be separate reference files.

1 / 3

Total

6

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

10

/

11

Passed

Repository
mukul975/Anthropic-Cybersecurity-Skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.