CtrlK
BlogDocsLog inGet started
Tessl Logo

sharp-edges

Identifies error-prone APIs, dangerous configurations, and footgun designs that enable security mistakes. Use when reviewing API designs, configuration schemas, cryptographic library ergonomics, or evaluating whether code follows 'secure by default' and 'pit of success' principles. Triggers: footgun, misuse-resistant, secure defaults, API usability, dangerous configuration.

94

Quality

92%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a well-crafted skill description that clearly defines its niche in security-focused API and configuration review. It provides specific actions, explicit trigger guidance with a 'Use when' clause, and a dedicated 'Triggers' list with natural keywords. The description is concise yet comprehensive, covering both what the skill does and when it should be selected.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: 'Identifies error-prone APIs, dangerous configurations, and footgun designs that enable security mistakes.' It also specifies concrete review targets like API designs, configuration schemas, and cryptographic library ergonomics.

3 / 3

Completeness

Clearly answers both 'what' (identifies error-prone APIs, dangerous configurations, footgun designs) and 'when' (reviewing API designs, configuration schemas, cryptographic library ergonomics, evaluating secure-by-default principles) with an explicit 'Use when' clause and a 'Triggers' list.

3 / 3

Trigger Term Quality

Includes a rich set of natural trigger terms that users would actually say: 'footgun', 'misuse-resistant', 'secure defaults', 'API usability', 'dangerous configuration', plus contextual terms like 'pit of success' and 'cryptographic library ergonomics'. Good coverage of the domain vocabulary.

3 / 3

Distinctiveness Conflict Risk

Occupies a clear niche focused on security usability and misuse-resistant design, which is distinct from general code review, general security scanning, or API design skills. The specific focus on 'footgun designs', 'pit of success', and 'secure by default' principles makes it unlikely to conflict with other skills.

3 / 3

Total

12

/

12

Passed

Implementation

85%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This is a strong, well-structured skill that provides highly actionable guidance for identifying security footguns in API and configuration design. The code examples are concrete and illustrative, the workflow is clearly sequenced with validation steps, and references are excellently organized. The main area for improvement is trimming some verbosity in explanatory sections that could be more concise without losing clarity.

DimensionReasoningScore

Conciseness

The skill is fairly comprehensive and most content earns its place, but there's some verbosity in explanations (e.g., the 'Rationalizations to Reject' table is somewhat preachy, and some detection pattern lists repeat similar ideas). The core principle section and some category descriptions could be tighter. However, the code examples and tables are efficient.

2 / 3

Actionability

The skill provides concrete, executable code examples across multiple languages (PHP, Python, Go, YAML) demonstrating specific footguns. Each sharp edge category includes detection patterns, specific questions to ask, and real code showing both dangerous and safe usage. The analysis workflow gives specific, actionable steps.

3 / 3

Workflow Clarity

The four-phase workflow (Surface Identification, Edge Case Probing, Threat Modeling, Validate Findings) is clearly sequenced with explicit validation in Phase 4 including a feedback loop ('If a finding seems questionable, return to Phase 2'). The quality checklist at the end serves as a final validation checkpoint. Severity classification provides clear criteria for categorizing findings.

3 / 3

Progressive Disclosure

Excellent progressive disclosure with a clear overview in the main file and well-signaled one-level-deep references organized by category (crypto-apis.md, config-patterns.md, auth-patterns.md, case-studies.md) and by language (11 language-specific guides). References are clearly labeled and organized in tables for easy navigation.

3 / 3

Total

11

/

12

Passed

Validation

100%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation11 / 11 Passed

Validation for skill structure

No warnings or errors.

Repository
trailofbits/skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.