CtrlK
BlogDocsLog inGet started
Tessl Logo

gitlab-ci-patterns

Build GitLab CI/CD pipelines with multi-stage workflows, caching, and distributed runners for scalable automation. Use when implementing GitLab CI/CD, optimizing pipeline performance, or setting up automated testing and deployment.

Install with Tessl CLI

npx tessl i github:wshobson/agents --skill gitlab-ci-patterns
What are skills?

Overall
score

86%

Does it follow best practices?

Evaluation97%

1.45x

Agent success when using this skill

Validation for skill structure

SKILL.md
Review
Evals

Evaluation results

100%

40%

Node.js Application CI/CD Pipeline

Node.js CI with Docker build and coverage

Criteria
Without context
With context

Pinned image tags

100%

100%

DOCKER_DRIVER variable

0%

100%

DOCKER_TLS_CERTDIR variable

0%

100%

npm ci usage

100%

100%

CI_COMMIT_REF_SLUG cache key

0%

100%

Artifacts expire_in set

100%

100%

Coverage regex

60%

100%

Cobertura coverage report

100%

100%

docker:24-dind service

100%

100%

Dual image tags

100%

100%

Cache pull-push policy

0%

100%

Pipeline stages defined

100%

100%

Without context: $0.1588 · 42s · 10 turns · 10 in / 1,684 out tokens

With context: $0.4064 · 1m 22s · 21 turns · 68 in / 4,147 out tokens

92%

2%

Multi-Environment Kubernetes Deployment Pipeline

Multi-environment Kubernetes deployment pipeline

Criteria
Without context
With context

YAML anchor for template

100%

100%

bitnami/kubectl image

100%

100%

kubectl rollout status

100%

100%

Production manual gate

100%

100%

Staging environment block

100%

50%

Production environment block

100%

50%

Staging branch restriction

100%

100%

Production branch restriction

0%

100%

kubectl credential setup

100%

100%

Pinned non-kubectl image tags

100%

100%

Without context: $0.1298 · 28s · 7 turns · 8 in / 1,501 out tokens

With context: $0.2946 · 55s · 16 turns · 14 in / 2,737 out tokens

100%

49%

Infrastructure Pipeline with Terraform and Container Security Scanning

Terraform pipeline with security scanning

Criteria
Without context
With context

SAST template included

0%

100%

Dependency-Scanning template

0%

100%

Container-Scanning template

100%

100%

trivy --exit-code 1

0%

100%

trivy HIGH,CRITICAL severity

0%

100%

aquasec/trivy image

0%

100%

allow_failure on scan job

0%

100%

Terraform stage order

100%

100%

TF_VERSION variable

100%

100%

hashicorp/terraform image

100%

100%

tfplan artifact saved

100%

100%

apply dependencies on plan

100%

100%

terraform fmt -check

0%

100%

TF_ROOT + before_script cd

100%

100%

Without context: $0.1721 · 36s · 8 turns · 9 in / 2,099 out tokens

With context: $0.3964 · 1m 20s · 17 turns · 17 in / 4,756 out tokens

Evaluated
Agent
Claude Code

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.