Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?
Given the complexity of a malware scanning operation, no annotations, no output schema, and a parameter schema with 0% coverage, the description is severely inadequate. It doesn't explain what the tool returns, how to interpret results, what happens during execution, or how to configure the scan. For a security tool that likely produces important findings, this leaves too many contextual gaps.
Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.