CtrlK
BlogDocsLog inGet started
Tessl Logo

building-incident-response-dashboard

Builds real-time incident response dashboards in Splunk, Elastic, or Grafana to provide SOC analysts and leadership with situational awareness during active incidents, tracking affected systems, containment status, IOC spread, and response timeline. Use when IR teams need unified visibility during incident coordination and post-incident reporting.

70

Quality

63%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./skills/building-incident-response-dashboard/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is an excellent skill description that clearly articulates specific capabilities (building IR dashboards in named platforms), concrete tracked metrics (affected systems, containment status, IOC spread, response timeline), target audience (SOC analysts and leadership), and explicit trigger conditions. It uses proper third-person voice and includes domain-specific terminology that practitioners would naturally use.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions and outputs: 'builds real-time incident response dashboards', tracking 'affected systems, containment status, IOC spread, and response timeline' across specific platforms (Splunk, Elastic, Grafana).

3 / 3

Completeness

Clearly answers both what (builds real-time IR dashboards in specific platforms tracking specific metrics) and when ('Use when IR teams need unified visibility during incident coordination and post-incident reporting').

3 / 3

Trigger Term Quality

Includes strong natural keywords users would say: 'incident response dashboards', 'Splunk', 'Elastic', 'Grafana', 'SOC', 'containment status', 'IOC', 'incident coordination', 'post-incident reporting'. These cover the domain well with terms practitioners actually use.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive niche combining incident response, specific SIEM/observability platforms, and SOC-specific use cases. Unlikely to conflict with general dashboard or general security skills due to the specific IR context and named platforms.

3 / 3

Total

12

/

12

Passed

Implementation

27%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

The skill provides substantial Splunk SPL examples for incident response dashboards but suffers from extreme verbosity, including glossary definitions, tool descriptions, and scenario lists that Claude doesn't need. It promises multi-platform coverage (Splunk, Elastic, Grafana) but only delivers Splunk content, and lacks validation steps and proper progressive disclosure to manage its considerable length.

Suggestions

Drastically reduce content to a concise overview with core workflow, moving detailed SPL queries for each panel type into separate reference files (e.g., PANELS.md, SOC_METRICS.md, EXECUTIVE_DASHBOARD.md)

Remove the Key Concepts glossary, Tools & Systems descriptions, and Common Scenarios sections — these explain things Claude already knows and add no actionable guidance

Add validation checkpoints: verify lookup files exist before querying, test dashboard rendering after each panel addition, and include error handling for empty result sets

Either provide concrete examples for Elastic/Grafana as promised in the description, or narrow the scope to Splunk only to avoid misleading coverage claims

DimensionReasoningScore

Conciseness

The skill is extremely verbose at ~200+ lines with extensive inline SPL queries, a glossary of terms Claude already knows (MTTD, MTTR), tool descriptions that are unnecessary, and a 'Common Scenarios' section that adds no actionable value. The 'When to Use' and 'Prerequisites' sections also pad significantly.

1 / 3

Actionability

The SPL queries are mostly concrete and executable, but many rely on fictional lookup files (ir_affected_systems.csv, ir_timeline.csv, ir_ioc_list.csv) without explaining how to create them. The Dashboard Studio XML is a skeleton rather than a complete working dashboard. The skill claims to cover Elastic and Grafana but only provides Splunk examples.

2 / 3

Workflow Clarity

Steps are sequenced logically from design through automation, but there are no validation checkpoints — no step verifies the dashboard actually renders, no error handling for missing lookups, and no feedback loop for when queries return no results or the dashboard fails to load. For a multi-step process involving data dependencies, this is a significant gap.

2 / 3

Progressive Disclosure

Everything is crammed into a single monolithic file with no references to external files. The SOC Operations Dashboard (Step 5), Executive Briefing (Step 6), Key Concepts table, Tools & Systems list, and Common Scenarios could all be split into separate reference files. The inline content is overwhelming for a SKILL.md overview.

1 / 3

Total

6

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

10

/

11

Passed

Repository
mukul975/Anthropic-Cybersecurity-Skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.