Leverages Splunk Enterprise Security and SPL (Search Processing Language) to investigate security incidents through log correlation, timeline reconstruction, and anomaly detection. Covers Windows event logs, firewall logs, proxy logs, and authentication data analysis. Activates for requests involving Splunk investigation, SPL queries, SIEM log analysis, security event correlation, or log-based incident investigation.
90
88%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
Quality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a strong skill description that clearly articulates specific capabilities (log correlation, timeline reconstruction, anomaly detection), covers relevant data types, and provides explicit trigger conditions. It uses proper third-person voice throughout and includes natural keywords that security professionals would use. The description is well-structured with a clear what/when separation.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions: 'investigate security incidents through log correlation, timeline reconstruction, and anomaly detection' and specifies data types: 'Windows event logs, firewall logs, proxy logs, and authentication data analysis.' | 3 / 3 |
Completeness | Clearly answers both 'what' (investigate security incidents through log correlation, timeline reconstruction, anomaly detection across multiple log types) and 'when' ('Activates for requests involving Splunk investigation, SPL queries, SIEM log analysis, security event correlation, or log-based incident investigation'). | 3 / 3 |
Trigger Term Quality | Excellent coverage of natural terms users would say: 'Splunk', 'SPL', 'SIEM', 'log analysis', 'security event correlation', 'incident investigation', 'Windows event logs', 'firewall logs', 'proxy logs', 'authentication data'. These are terms a security analyst would naturally use. | 3 / 3 |
Distinctiveness Conflict Risk | Highly distinctive with a clear niche: Splunk Enterprise Security and SPL-based investigation. The combination of specific tool (Splunk), language (SPL), and domain (security incident investigation) makes it very unlikely to conflict with other skills. | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
77%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This is a strong, highly actionable skill with excellent SPL query examples covering the full incident investigation lifecycle. Its main weakness is verbosity—the glossary, tools section, and some explanatory text add tokens without proportional value for Claude. The monolithic structure would benefit from splitting reference material into separate files.
Suggestions
Move the Key Concepts table and Tools & Systems section to a separate REFERENCE.md file, linked from the main skill, to reduce token overhead
Remove or drastically shorten explanations of concepts Claude already knows (e.g., what SPL is, what Sysmon is, what a sourcetype is)
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill is fairly comprehensive but includes some unnecessary elements: the Key Concepts table defines terms Claude already knows (SPL, sourcetype, timechart), and the Tools & Systems section explains what Sysmon and Splunk ES are at a basic level. The scenario section adds value but the pitfalls could be tighter. The overall length is justified by the complexity of the domain, but ~30% could be trimmed. | 2 / 3 |
Actionability | Every step includes fully executable SPL queries that are copy-paste ready with realistic field names, index names, and event codes. The queries cover specific attack patterns (pass-the-hash, DNS tunneling, C2 beaconing) with concrete detection logic including thresholds and field extractions. The output format template is also directly usable. | 3 / 3 |
Workflow Clarity | The 6-step workflow follows a logical investigation sequence from scoping through detection rule creation. Each step builds on the previous one, and the timeline reconstruction in Step 5 serves as a natural validation/synthesis checkpoint. The scenario section includes a clear numbered approach with explicit pitfalls to avoid, providing error-awareness feedback loops. | 3 / 3 |
Progressive Disclosure | The content is well-structured with clear headers and logical sections, but it's a monolithic document with no references to external files for advanced topics. The Key Concepts table, Tools & Systems section, and Common Scenarios could be split into separate reference files. For a skill of this length (~180+ lines of substantive content), some progressive disclosure to external files would improve navigability. | 2 / 3 |
Total | 10 / 12 Passed |
Validation
90%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 10 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
Total | 10 / 11 Passed | |
888bbe4
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.