Software Bill of Materials (SBOM) security analysis for vulnerability assessment and third-party risk management. Validates SBOMs from vendors or generates SBOMs for internal projects. Use this skill when: - User asks to analyze an SBOM file - User mentions "third-party risk" or "vendor security" - User needs to validate a supplier's SBOM - User wants to check SBOM for vulnerabilities - User asks about CycloneDX or SPDX formats
85
81%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
Quality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a strong skill description that clearly defines its domain (SBOM security analysis), lists concrete capabilities (validation, generation, vulnerability assessment), and provides explicit trigger guidance with five well-chosen scenarios. The inclusion of format-specific terms (CycloneDX, SPDX) and natural user language ('third-party risk', 'vendor security') makes it highly effective for skill selection.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple concrete actions: 'vulnerability assessment', 'third-party risk management', 'validates SBOMs from vendors', 'generates SBOMs for internal projects'. These are specific, actionable capabilities. | 3 / 3 |
Completeness | Clearly answers both 'what' (SBOM security analysis, vulnerability assessment, validation, generation) and 'when' with an explicit 'Use this skill when:' clause listing five specific trigger scenarios. | 3 / 3 |
Trigger Term Quality | Excellent coverage of natural trigger terms users would say: 'SBOM', 'third-party risk', 'vendor security', 'supplier's SBOM', 'vulnerabilities', 'CycloneDX', 'SPDX'. These cover both common language and format-specific terms. | 3 / 3 |
Distinctiveness Conflict Risk | Highly distinctive niche focused on SBOM analysis specifically. The mention of CycloneDX, SPDX, vendor SBOMs, and third-party risk management creates a clear, unique domain unlikely to conflict with general security or dependency scanning skills. | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
62%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This is a solid, well-structured skill with a clear four-phase workflow and good validation checkpoints. Its main weaknesses are verbosity (lengthy report templates and vendor email template inline) and the lack of truly executable code for the validation phase — it describes what to check rather than providing code to do it. The content would benefit from splitting detailed templates into referenced files and tightening the core instructions.
Suggestions
Move the detailed report templates (validation report, risk analysis report, remediation tables, vendor email) into a separate TEMPLATES.md file and reference it from the main skill to improve conciseness and progressive disclosure.
Add executable code snippets for Phase 1 validation — e.g., a Python snippet that loads the JSON, checks for required fields, and counts components missing purls — rather than just describing what to look for.
Trim the format identification section (Step 1.1) since Claude already knows how to identify JSON structure; a one-line note like 'Check for bomFormat (CycloneDX) or spdxVersion (SPDX) at the top level' would suffice.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill is reasonably well-structured but includes some verbose elements — the vendor communication template is lengthy, the report templates are quite detailed with example data that could be more concise, and some explanations (like format indicators) are things Claude would already know. However, most content earns its place as actionable templates. | 2 / 3 |
Actionability | The skill provides clear tool calls (mcp_snyk_snyk_sbom_scan) and CLI commands for SBOM generation, but the core analysis workflow relies heavily on report templates rather than executable code. The validation steps (Phase 1) describe what to check but don't provide executable code to perform the checks — they're more like checklists with JSON structure examples. The tool calls themselves are concrete but presented as pseudocode-style invocations rather than fully contextualized usage. | 2 / 3 |
Workflow Clarity | The four-phase workflow (Validation → Security Scan → Risk Analysis → Remediation) is clearly sequenced with explicit validation in Phase 1 before scanning in Phase 2. Step 1.3 provides a clear feedback loop — if validation fails, report issues and request updated SBOM before proceeding. The error handling section adds additional recovery paths for common failure modes. | 3 / 3 |
Progressive Disclosure | The content is well-organized with clear sections and a logical flow, but it's a long monolithic document (~200+ lines of substantive content) with no references to external files. The report templates, vendor communication template, and error handling could be split into separate reference files to keep the main skill leaner. For a skill of this complexity, some progressive disclosure to external files would be beneficial. | 2 / 3 |
Total | 9 / 12 Passed |
Validation
100%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 11 / 11 Passed
Validation for skill structure
No warnings or errors.
9293725
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.