CtrlK
BlogDocsLog inGet started
Tessl Logo

log-analysis

Analyze application logs to identify errors, performance issues, and security anomalies. Use when debugging issues, monitoring system health, or investigating incidents. Handles various log formats including Apache, Nginx, application logs, and JSON logs.

80

1.46x
Quality

82%

Does it follow best practices?

Impact

60%

1.46x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a well-crafted skill description that excels across all dimensions. It provides specific capabilities, includes natural trigger terms users would actually use, explicitly states both what the skill does and when to use it, and carves out a distinct niche around log analysis that minimizes conflict with other skills.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: 'identify errors, performance issues, and security anomalies' along with specific use cases like 'debugging issues, monitoring system health, investigating incidents'. Also specifies concrete log formats handled.

3 / 3

Completeness

Clearly answers both what ('Analyze application logs to identify errors, performance issues, and security anomalies') and when ('Use when debugging issues, monitoring system health, or investigating incidents') with explicit trigger guidance.

3 / 3

Trigger Term Quality

Includes natural keywords users would say: 'logs', 'errors', 'debugging', 'performance issues', 'security', 'incidents', 'Apache', 'Nginx', 'JSON logs'. Good coverage of terms across different user intents.

3 / 3

Distinctiveness Conflict Risk

Clear niche focused specifically on log analysis with distinct triggers like 'logs', 'Apache', 'Nginx', 'debugging', 'incidents'. Unlikely to conflict with general code analysis or document processing skills.

3 / 3

Total

12

/

12

Passed

Implementation

64%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a solid, actionable log analysis skill with comprehensive executable commands covering error debugging, performance, and security analysis. The main weaknesses are empty example placeholders, unnecessary external references, and missing validation checkpoints for security-sensitive operations like incident response workflows.

Suggestions

Remove or complete the empty Example sections - placeholder content wastes tokens and provides no value

Remove external reference links (grep manual, awk guide) as Claude already knows these tools

Add validation checkpoints for security analysis workflow, such as 'Verify findings by cross-referencing with other log sources' or escalation criteria

Consider moving the detailed security analysis patterns to a separate SECURITY_ANALYSIS.md file for better progressive disclosure

DimensionReasoningScore

Conciseness

The skill is reasonably efficient but includes some unnecessary elements like placeholder example sections and external reference links that Claude doesn't need. The common log locations section states obvious paths Claude would already know.

2 / 3

Actionability

Provides fully executable bash commands throughout with specific grep, awk, and other command patterns that are copy-paste ready. Each analysis type has concrete, working examples.

3 / 3

Workflow Clarity

Steps are clearly numbered and sequenced, but lacks explicit validation checkpoints. For security analysis or incident response, there's no feedback loop for verifying findings or escalation criteria when anomalies are detected.

2 / 3

Progressive Disclosure

Content is well-structured with clear sections, but the Examples section contains empty placeholders rather than actual content. External references to manuals are unnecessary for Claude. The skill is somewhat monolithic when it could split advanced security analysis into a separate file.

2 / 3

Total

9

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

metadata_version

'metadata.version' is missing

Warning

Total

10

/

11

Passed

Repository
supercent-io/skills-template
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.