Identifies error-prone APIs, dangerous configurations, and footgun designs that enable security mistakes. Use when reviewing API designs, configuration schemas, cryptographic library ergonomics, or evaluating whether code follows 'secure by default' and 'pit of success' principles. Triggers: footgun, misuse-resistant, secure defaults, API usability, dangerous configuration.
94
92%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
Quality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a well-crafted skill description that clearly defines its niche in security-focused API and configuration review. It provides specific actions, explicit trigger guidance with a 'Use when' clause, and a dedicated 'Triggers' list with natural keywords. The description is concise yet comprehensive, covering both what the skill does and when it should be selected.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions: 'Identifies error-prone APIs, dangerous configurations, and footgun designs that enable security mistakes.' It also specifies concrete review targets like API designs, configuration schemas, and cryptographic library ergonomics. | 3 / 3 |
Completeness | Clearly answers both 'what' (identifies error-prone APIs, dangerous configurations, footgun designs) and 'when' (reviewing API designs, configuration schemas, cryptographic library ergonomics, evaluating secure-by-default principles) with an explicit 'Use when' clause and a 'Triggers' list. | 3 / 3 |
Trigger Term Quality | Includes a rich set of natural trigger terms that users would actually say: 'footgun', 'misuse-resistant', 'secure defaults', 'API usability', 'dangerous configuration', plus contextual terms like 'pit of success' and 'cryptographic library ergonomics'. Good coverage of the domain vocabulary. | 3 / 3 |
Distinctiveness Conflict Risk | Occupies a clear niche focused on security usability and misuse-resistant design, which is distinct from general code review, general security scanning, or API design skills. The specific focus on 'footgun designs', 'pit of success', and 'secure by default' principles makes it unlikely to conflict with other skills. | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
85%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This is a strong, well-structured skill that provides highly actionable guidance for identifying security footguns in API and configuration design. The code examples are concrete and illustrative, the workflow is clearly sequenced with validation steps, and references are excellently organized. The main area for improvement is trimming some verbosity in explanatory sections that could be more concise without losing clarity.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill is fairly comprehensive and most content earns its place, but there's some verbosity in explanations (e.g., the 'Rationalizations to Reject' table is somewhat preachy, and some detection pattern lists repeat similar ideas). The core principle section and some category descriptions could be tighter. However, the code examples and tables are efficient. | 2 / 3 |
Actionability | The skill provides concrete, executable code examples across multiple languages (PHP, Python, Go, YAML) demonstrating specific footguns. Each sharp edge category includes detection patterns, specific questions to ask, and real code showing both dangerous and safe usage. The analysis workflow gives specific, actionable steps. | 3 / 3 |
Workflow Clarity | The four-phase workflow (Surface Identification, Edge Case Probing, Threat Modeling, Validate Findings) is clearly sequenced with explicit validation in Phase 4 including a feedback loop ('If a finding seems questionable, return to Phase 2'). The quality checklist at the end serves as a final validation checkpoint. Severity classification provides clear criteria for categorizing findings. | 3 / 3 |
Progressive Disclosure | Excellent progressive disclosure with a clear overview in the main file and well-signaled one-level-deep references organized by category (crypto-apis.md, config-patterns.md, auth-patterns.md, case-studies.md) and by language (11 language-specific guides). References are clearly labeled and organized in tables for easy navigation. | 3 / 3 |
Total | 11 / 12 Passed |
Validation
100%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 11 / 11 Passed
Validation for skill structure
No warnings or errors.
540111a
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.