Use this skill to prevent destructive operations when working on production systems or running agents autonomously.
49
49%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
Quality
Discovery
40%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
The description communicates a general purpose (safety/prevention on production systems) but lacks specificity about what concrete actions the skill performs and what specific scenarios should trigger it. It uses second-person framing ('Use this skill to') rather than third-person voice, and the vague language makes it hard to distinguish from other safety or operations-related skills.
Suggestions
List specific concrete actions the skill performs, e.g., 'Blocks destructive commands like DROP TABLE, rm -rf, and force-push to main; enforces dry-run mode for database migrations and file deletions.'
Add an explicit 'Use when...' clause with natural trigger terms, e.g., 'Use when running commands on production databases, deploying to prod, executing shell commands autonomously, or when destructive operations like delete, drop, or overwrite are involved.'
Rewrite in third person voice (e.g., 'Prevents destructive operations...' instead of 'Use this skill to prevent...').
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | The description mentions 'prevent destructive operations' which is vague — it doesn't list specific concrete actions like blocking DELETE commands, preventing DROP TABLE, or safeguarding against rm -rf. 'Production systems' and 'running agents autonomously' are broad contexts, not specific capabilities. | 1 / 3 |
Completeness | It partially answers 'what' (prevent destructive operations) and 'when' (production systems, autonomous agents), but the 'what' is vague and the 'when' clause uses 'Use this skill to...' which blends purpose with trigger rather than providing explicit 'Use when...' trigger guidance. The when is implied through context rather than clearly stated. | 2 / 3 |
Trigger Term Quality | Terms like 'production systems', 'destructive operations', and 'agents autonomously' are somewhat relevant but miss natural user phrases like 'safety checks', 'dry run', 'dangerous commands', 'safeguards', 'guardrails', or specific operation types users might mention. | 2 / 3 |
Distinctiveness Conflict Risk | The concept of 'preventing destructive operations on production systems' is a somewhat distinct niche, but the vagueness could cause overlap with general safety skills, deployment skills, or DevOps-related skills. It's not specific enough to clearly carve out a unique trigger space. | 2 / 3 |
Total | 7 / 12 Passed |
Implementation
35%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This skill reads more like a feature specification or README than an actionable skill for Claude. It clearly describes the concept of three safety modes and lists useful destructive patterns to watch for, but critically lacks any executable implementation—no PreToolUse hook code, no configuration examples, and no concrete steps Claude can follow to actually implement the protection. The skill would benefit greatly from actual hook implementation code and concrete examples of blocked/allowed scenarios.
Suggestions
Add executable PreToolUse hook implementation code showing how to intercept and check Bash/Write/Edit tool calls against the watched patterns.
Provide concrete input/output examples showing what a blocked command looks like (the warning message, the safer alternative suggested) so Claude knows exactly how to respond.
Add a validation/testing section: how to verify the safety guard is working correctly (e.g., test with a safe destructive command pattern).
Replace the hypothetical `/safety-guard` CLI commands with actual implementation details or configuration that Claude can use directly.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | Mostly efficient but includes some unnecessary explanation (e.g., 'When to Use' section lists things that are somewhat obvious given the skill's purpose, and the 'How It Works' framing adds mild verbosity). The watched patterns list is useful but could be tighter. | 2 / 3 |
Actionability | No executable code or concrete implementation is provided. The skill describes what the safety guard does conceptually but doesn't give actual hook implementations, configuration files, or copy-paste ready code. The commands shown (like `/safety-guard freeze`) appear to be hypothetical CLI commands without any backing implementation. | 1 / 3 |
Workflow Clarity | The three modes are clearly described and the progression from Careful → Freeze → Guard is logical. However, there are no validation checkpoints, no error recovery steps, and no guidance on what happens when a block occurs or how to handle false positives. For a skill involving destructive operation prevention, the lack of feedback loops is notable. | 2 / 3 |
Progressive Disclosure | Content is reasonably structured with clear sections for each mode, but everything is inline in one file. The Integration section references 'ECC 2.0' and logging without linking to any supporting documentation. The watched patterns list could be externalized for maintainability. | 2 / 3 |
Total | 7 / 12 Passed |
Validation
90%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 10 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
Total | 10 / 11 Passed | |
Reviewed
Table of Contents