CtrlK
BlogDocsLog inGet started
Tessl Logo

dependabot-check

Analyze Dependabot security advisory and provide resolution strategy

65

Quality

56%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Advisory

Suggest reviewing before use

Optimize this skill with Tessl

npx tessl skill review --optimize ./.claude/skills/dependabot-check/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

40%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

The description identifies a clear niche around Dependabot security advisories, which gives it good distinctiveness. However, it lacks an explicit 'Use when...' clause, provides only a high-level summary of capabilities without listing specific concrete actions, and misses common trigger terms users might naturally use like 'vulnerability', 'CVE', or 'dependency update'.

Suggestions

Add a 'Use when...' clause with explicit triggers, e.g., 'Use when the user encounters a Dependabot alert, security vulnerability, CVE, or needs to update a vulnerable dependency.'

Expand the capability description with specific actions, e.g., 'Analyzes Dependabot security advisories, evaluates CVE severity, recommends dependency version upgrades, and suggests resolution strategies for vulnerable packages.'

Include natural keyword variations users might say, such as 'vulnerability', 'CVE', 'security alert', 'dependency update', 'npm audit', or 'GitHub security notification'.

DimensionReasoningScore

Specificity

Names the domain (Dependabot security advisory) and two actions (analyze, provide resolution strategy), but doesn't list specific concrete actions like reviewing CVEs, updating dependency versions, creating PRs, or evaluating severity.

2 / 3

Completeness

Describes what it does (analyze advisory, provide resolution strategy) but has no explicit 'Use when...' clause or equivalent trigger guidance, which per the rubric caps completeness at 2, and the 'what' is also fairly thin, placing this at 1.

1 / 3

Trigger Term Quality

Includes 'Dependabot' and 'security advisory' which are relevant keywords, but misses common variations like 'vulnerability', 'CVE', 'dependency update', 'security alert', 'npm audit', 'GitHub security', or 'outdated dependency'.

2 / 3

Distinctiveness Conflict Risk

The mention of 'Dependabot security advisory' is quite specific and creates a clear niche that is unlikely to conflict with other skills; it targets a very particular workflow.

3 / 3

Total

8

/

12

Passed

Implementation

72%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a well-structured skill with strong actionability — concrete commands, clear branching logic, and a useful output template. The main weakness is the lack of a verification step after applying the fix (e.g., running pnpm audit or tests to confirm the vulnerability is resolved), which is important for a security-related workflow. Minor conciseness improvements could be made by trimming the dependency analysis section.

Suggestions

Add a Step 5 for verification after applying the fix: e.g., `pnpm audit`, run tests, and confirm the advisory is resolved before considering the task complete.

Consolidate Steps 2 and 3 — the 'Check Current Project Status' and 'Dependency Analysis' sections overlap (both use pnpm why and check package.json).

DimensionReasoningScore

Conciseness

Generally efficient but has some redundancy — the dependency analysis section (Step 3) restates what's already implied by the commands in Step 2. The output format template is useful but slightly verbose with the markdown formatting instructions.

2 / 3

Actionability

Provides concrete, executable commands throughout (gh api, pnpm list, pnpm why, pnpm update, pnpm overrides JSON). Each step has specific, copy-paste-ready commands and clear decision logic for different URL types and dependency types.

3 / 3

Workflow Clarity

Steps are clearly sequenced and the branching logic (direct vs indirect, URL type detection) is well-structured. However, there are no validation/verification steps after applying the resolution — no 'run tests', 'verify the vulnerability is resolved', or 'check pnpm audit' feedback loop after making changes.

2 / 3

Progressive Disclosure

For a skill of this size (~70 lines of meaningful content), the structure is well-organized with clear sections (Gather → Check → Analyze → Resolve → Output). No external references are needed and the content is appropriately scoped for a single SKILL.md file.

3 / 3

Total

10

/

12

Passed

Validation

100%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation11 / 11 Passed

Validation for skill structure

No warnings or errors.

Repository
sc30gsw/claude-code-customes
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.