pedagogical-code-grader
Mentoring & Education: Evaluators & Reviewers
This directory contains skills for the "Feedback" phase of the teaching lifecycle.
- Pedagogical Code Grader: Grades based on "Did they learn the concept?" rather than just "Did it pass tests?".
- Industry Standard Reviewer: Gives feedback in the persona of a Senior Engineer.
- Concept Mastery Validator: Ensures the teaching plan and the projects are perfectly aligned.
Use Cases
- Automated Grading: Scale your teaching by automating the initial conceptual review of student code.
- Professional Readiness: Prepare students for their first job by exposing them to realistic PR feedback loops.
- Quality Assurance: Audit your own curriculum to ensure you aren't asking students to do things you haven't taught.
More from jorgealves/agent_skills
python-security-scanner
Detect common Python vulnerabilities such as SQL injection, unsafe deserialization, and hardcoded secrets. Use as part of a secure SDLC for Python projects.
187gdpr-ccpa-privacy-auditor
Audits web applications to ensure declared privacy policies match actual technical data collection practices. Use to identify discrepancies in cookie usage, tracking scripts, and user data handling.
150prompt-injection-scanner
Audits agent skill instructions and system prompts for vulnerabilities to prompt hijacking and indirect injection. Use when designing new agent skills or before deploying agents to public environments where users provide untrusted input.
147pii-sanitizer
Detects and redacts Personally Identifiable Information (PII) like emails, phone numbers, and credit cards. Use when cleaning logs, datasets, or communications to comply with GDPR/CCPA privacy standards.
128documentation-generator
Analyzes source code to automatically generate technical documentation and architecture diagrams. Use to maintain up-to-date API references and onboarding materials for engineering teams.
127hipaa-compliance-guard
Audits HealthTech applications for HIPAA technical safeguards like encryption and audit logging. Use when reviewing healthcare infrastructure or ensuring PHI is handled according to legal security standards.
127