CtrlK
BlogDocsLog inGet started
Tessl Logo

session-management

Implements secure session management with JWT tokens, Redis storage, refresh flows, and proper cookie configuration. Use when building authentication systems, managing user sessions, or implementing secure logout functionality.

86

Quality

82%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a strong skill description that clearly articulates specific capabilities (JWT tokens, Redis storage, refresh flows, cookie configuration) and provides explicit trigger guidance via a 'Use when' clause. The description uses proper third-person voice, includes natural keywords users would employ, and carves out a distinct niche around session management that minimizes conflict risk with other skills.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: JWT tokens, Redis storage, refresh flows, cookie configuration, authentication systems, session management, and secure logout functionality.

3 / 3

Completeness

Clearly answers both 'what' (implements secure session management with JWT tokens, Redis storage, refresh flows, cookie configuration) and 'when' (explicit 'Use when building authentication systems, managing user sessions, or implementing secure logout functionality').

3 / 3

Trigger Term Quality

Includes strong natural keywords users would say: 'JWT tokens', 'session management', 'authentication systems', 'Redis', 'refresh flows', 'cookie configuration', 'secure logout'. These cover common variations of how users would describe session/auth needs.

3 / 3

Distinctiveness Conflict Risk

The combination of JWT, Redis, refresh flows, and cookie configuration creates a clear niche around session management specifically. It's distinct from general auth skills or broader security skills due to the specific technology mentions.

3 / 3

Total

12

/

12

Passed

Implementation

64%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

The skill provides solid, executable code examples covering the key components of session management (JWT tokens, Redis storage, cookies, refresh flow). However, it lacks a clear sequential workflow tying the pieces together, mixes two session paradigms (JWT + express-session) without explanation, and includes security guidance that Claude already knows. Tightening the content and adding an explicit implementation sequence would significantly improve it.

Suggestions

Add a brief workflow section at the top that sequences the implementation steps (e.g., '1. Set up Redis store → 2. Implement token generation → 3. Configure cookies → 4. Wire refresh endpoint → 5. Verify with test request') with validation checkpoints.

Clarify or reconcile the two session approaches: the JWT token-based approach and the express-session cookie approach are presented side-by-side without explaining when to use which or how they relate.

Remove or significantly trim the 'Security Requirements' and 'Never Do' sections—these are standard security knowledge Claude already possesses and consume tokens without adding unique value.

DimensionReasoningScore

Conciseness

The code examples are mostly efficient and relevant, but there's some redundancy between the cookie configuration section (using express-session) and the token-based approach, which conflates two different session strategies without clarifying. The security requirements and 'Never Do' sections are things Claude already knows well.

2 / 3

Actionability

All code examples are concrete, executable JavaScript with real library calls (jwt, redis, express). The token generation, session storage, cookie config, and refresh flow are all copy-paste ready with specific configurations.

3 / 3

Workflow Clarity

The sections cover individual components but don't clearly sequence them into a cohesive implementation workflow. There's no explicit order of operations (e.g., 'first set up Redis, then implement token generation, then wire up refresh endpoint') and no validation checkpoints for verifying the session system works correctly.

2 / 3

Progressive Disclosure

Content is reasonably structured with clear section headers, but everything is inline in one file. The security requirements and 'Never Do' lists could be trimmed or referenced separately, and there are no links to deeper resources for advanced topics like token rotation strategies or multi-device session management.

2 / 3

Total

9

/

12

Passed

Validation

100%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation11 / 11 Passed

Validation for skill structure

No warnings or errors.

Repository
secondsky/claude-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.