CtrlK
BlogDocsLog inGet started
Tessl Logo

golang-observability

Golang everyday observability — the always-on signals in production. Covers structured logging with slog, Prometheus metrics, OpenTelemetry distributed tracing, continuous profiling with pprof/Pyroscope, server-side RUM event tracking, alerting, and Grafana dashboards. Apply when instrumenting Go services for production monitoring, setting up metrics or alerting, adding OpenTelemetry tracing, correlating logs with traces, migrating legacy loggers (zap/logrus/zerolog) to slog, adding observability to new features, or implementing GDPR/CCPA-compliant tracking with Customer Data Platforms (CDP). Not for temporary deep-dive performance investigation (→ See golang-benchmark and golang-performance skills).

89

1.10x
Quality

88%

Does it follow best practices?

Impact

91%

1.10x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is an excellent skill description that hits all the marks. It provides highly specific capabilities, comprehensive trigger terms covering the full observability stack, explicit 'Apply when' guidance with multiple scenarios, and clear differentiation from related skills via exclusion clauses. The description is thorough without being padded, and uses proper third-person voice throughout.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: structured logging with slog, Prometheus metrics, OpenTelemetry distributed tracing, continuous profiling with pprof/Pyroscope, server-side RUM event tracking, alerting, and Grafana dashboards. Very detailed and actionable.

3 / 3

Completeness

Clearly answers both 'what' (structured logging, metrics, tracing, profiling, alerting, dashboards) and 'when' with an explicit 'Apply when...' clause listing specific trigger scenarios. Also includes a 'Not for' exclusion clause that further clarifies scope.

3 / 3

Trigger Term Quality

Excellent coverage of natural terms users would say: slog, Prometheus, OpenTelemetry, pprof, Pyroscope, Grafana, metrics, alerting, tracing, logging, zap, logrus, zerolog, GDPR, CCPA, CDP. These are all terms a developer would naturally use when seeking observability help for Go services.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive with a clear niche (Go production observability) and explicit boundary-setting via the 'Not for temporary deep-dive performance investigation' note with cross-references to related skills. This significantly reduces conflict risk with adjacent golang-benchmark and golang-performance skills.

3 / 3

Total

12

/

12

Passed

Implementation

77%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a well-structured observability skill with strong actionability — the code examples are executable, the common mistakes section provides clear good/bad patterns, and the definition-of-done checklist is practical. The main weaknesses are moderate verbosity (explaining concepts Claude already knows, repeating information across sections) and the inability to verify the referenced bundle files. The progressive disclosure structure is sound in design but unverifiable without bundle files.

Suggestions

Remove the opening definition of observability ('Observability is the ability to understand a system's internal state...') — Claude knows this, and it wastes tokens.

Tighten the detailed guides section: reduce the parenthetical descriptions to one-line summaries rather than multi-clause explanations of each reference file's contents.

DimensionReasoningScore

Conciseness

The skill is reasonably efficient but includes some unnecessary explanation (e.g., 'Observability is the ability to understand a system's internal state from its external outputs' — Claude knows this). The best practices summary repeats information found in the detailed guides section. The persona and modes section adds useful framing but could be tighter. Overall mostly efficient with some bloat.

2 / 3

Actionability

The skill provides fully executable Go code examples for signal correlation (otelslog bridge, exemplars), concrete anti-patterns with good/bad comparisons, a specific migration strategy with named bridge packages, and a clear definition-of-done checklist. The common mistakes section is particularly actionable with copy-paste-ready corrections.

3 / 3

Workflow Clarity

The skill defines clear modes of operation (coding, review, audit), provides a sequential migration strategy with 4 explicit steps, and includes a comprehensive definition-of-done checklist that serves as a validation checkpoint. The audit mode explicitly mentions parallel sub-agents per signal. The review mode describes what to check. Multi-step processes are well-sequenced.

3 / 3

Progressive Disclosure

The skill has excellent structure with a clear overview, summary table, and references to 7 detailed guide files (references/logging.md, metrics.md, etc.). However, no bundle files were provided, meaning all those references are unverifiable. The inline content strikes a reasonable balance, but the detailed descriptions of what each reference file contains are somewhat verbose and could be shorter signposts. Cross-references to other skills are well-organized.

2 / 3

Total

10

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

metadata_field

'metadata' should map string keys to string values

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
samber/cc-skills-golang
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.