CtrlK
BlogDocsLog inGet started
Tessl Logo

analyzing-security-logs-with-splunk

Leverages Splunk Enterprise Security and SPL (Search Processing Language) to investigate security incidents through log correlation, timeline reconstruction, and anomaly detection. Covers Windows event logs, firewall logs, proxy logs, and authentication data analysis. Activates for requests involving Splunk investigation, SPL queries, SIEM log analysis, security event correlation, or log-based incident investigation.

90

Quality

88%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a strong skill description that clearly articulates specific capabilities (log correlation, timeline reconstruction, anomaly detection), covers relevant data types, and provides explicit trigger conditions. It uses proper third-person voice throughout and includes natural keywords that security professionals would use. The description is well-structured with a clear what/when separation.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: 'investigate security incidents through log correlation, timeline reconstruction, and anomaly detection' and specifies data types: 'Windows event logs, firewall logs, proxy logs, and authentication data analysis.'

3 / 3

Completeness

Clearly answers both 'what' (investigate security incidents through log correlation, timeline reconstruction, anomaly detection across multiple log types) and 'when' ('Activates for requests involving Splunk investigation, SPL queries, SIEM log analysis, security event correlation, or log-based incident investigation').

3 / 3

Trigger Term Quality

Excellent coverage of natural terms users would say: 'Splunk', 'SPL', 'SIEM', 'log analysis', 'security event correlation', 'incident investigation', 'Windows event logs', 'firewall logs', 'proxy logs', 'authentication data'. These are terms a security analyst would naturally use.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive with a clear niche: Splunk Enterprise Security and SPL-based investigation. The combination of specific tool (Splunk), language (SPL), and domain (security incident investigation) makes it very unlikely to conflict with other skills.

3 / 3

Total

12

/

12

Passed

Implementation

77%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a strong, highly actionable skill with excellent SPL query examples covering the full incident investigation lifecycle. Its main weakness is verbosity—the glossary, tools section, and some explanatory text add tokens without proportional value for Claude. The monolithic structure would benefit from splitting reference material into separate files.

Suggestions

Move the Key Concepts table and Tools & Systems section to a separate REFERENCE.md file, linked from the main skill, to reduce token overhead

Remove or drastically shorten explanations of concepts Claude already knows (e.g., what SPL is, what Sysmon is, what a sourcetype is)

DimensionReasoningScore

Conciseness

The skill is fairly comprehensive but includes some unnecessary elements: the Key Concepts table defines terms Claude already knows (SPL, sourcetype, timechart), and the Tools & Systems section explains what Sysmon and Splunk ES are at a basic level. The scenario section adds value but the pitfalls could be tighter. The overall length is justified by the complexity of the domain, but ~30% could be trimmed.

2 / 3

Actionability

Every step includes fully executable SPL queries that are copy-paste ready with realistic field names, index names, and event codes. The queries cover specific attack patterns (pass-the-hash, DNS tunneling, C2 beaconing) with concrete detection logic including thresholds and field extractions. The output format template is also directly usable.

3 / 3

Workflow Clarity

The 6-step workflow follows a logical investigation sequence from scoping through detection rule creation. Each step builds on the previous one, and the timeline reconstruction in Step 5 serves as a natural validation/synthesis checkpoint. The scenario section includes a clear numbered approach with explicit pitfalls to avoid, providing error-awareness feedback loops.

3 / 3

Progressive Disclosure

The content is well-structured with clear headers and logical sections, but it's a monolithic document with no references to external files for advanced topics. The Key Concepts table, Tools & Systems section, and Common Scenarios could be split into separate reference files. For a skill of this length (~180+ lines of substantive content), some progressive disclosure to external files would improve navigability.

2 / 3

Total

10

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

10

/

11

Passed

Repository
mukul975/Anthropic-Cybersecurity-Skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.