Five-skill presentation system: ingest talks into a rhetoric vault, run interactive clarification, generate a speaker profile, create presentations that match your documented patterns, and produce the deck illustrations + thumbnail visual layer. Includes a 102-entry Presentation Patterns taxonomy (91 observable, 11 unobservable go-live items) for scoring, brainstorming, and go-live preparation.
93
94%
Does it follow best practices?
Impact
93%
1.43xAverage score across 21 eval scenarios
Advisory
Suggest reviewing before use
A speaker is building a 60-minute keynote about "Zero Trust Architecture" that uses AI-generated illustrations in a retro military technical manual style. The talk has a section that introduces five security principles one at a time — each principle is a pillar in an architectural diagram. The speaker wants the audience to see the pillars appear one by one as they're discussed, not all at once.
Similarly, there's a "Security Maturity Checklist" that appears four times across the talk, each time with more items checked off as the audience has learned new concepts.
The speaker has already drafted the base outline with style anchors and image prompts. They now need the two affected slides to be elaborated so the audience sees each element appear one at a time, plus a plan for producing those intermediate images and getting them into the deck.
Produce the following files:
updated-outline-excerpt.yaml — the updated outline entries for the two slides.
build-generation-plan.md — a step-by-step plan for producing the intermediate images and getting them into the PowerPoint deck. Cover image generation, file organization, and how the intermediate sequence interacts with the slide budget and deck layout.
The following file is provided as input.
=============== FILE: inputs/outline-excerpt.yaml =============== talk: title: "Zero Trust Architecture — From Perimeter to Principles" slug: "rsa-2026-zero-trust-architecture" speakers: ["Speaker"] duration_min: 60 audience: "Security engineers" mode: "provocateur" venue: "RSA Conference 2026" slide_budget: 90 pacing_wpm: [135, 145] architecture: "narrative-arc"
style_anchor: model: "gemini-3-pro-image-preview" full: | Retro U.S. Military WWII technical manual style. Pen-and-ink line art on aged parchment background with foxing. Blue-ink leader lines, decorative military document border ornaments, classification stamps, and technical manual header formatting. All people/robots/animals wear WWII uniforms with garrison caps and rank insignia. Render all callout labels in large bold font. FIG. numbering on each illustration. imgtxt: | Same WWII technical manual style, portrait orientation. Illustration in upper 60%, technical annotations below. conventions: | Sequential FIG. numbering. Classification stamp rotates: RESTRICTED, CONFIDENTIAL, TOP SECRET. Recurring character: a sergeant with a clipboard evaluating each principle.
chapters:
slides:
n: 30 chapter: ch-principles title: "The Five Pillars of Zero Trust" format: FULL visual: "Five classical pillars supporting a ZERO TRUST architrave." text_overlay: "The Five Pillars" image_prompt: | [STYLE ANCHOR]. FIG. 15. Five classical stone pillars in architectural elevation view. Each pillar labeled: "VERIFY EXPLICITLY", "LEAST PRIVILEGE", "ASSUME BREACH", "MICRO-SEGMENTATION", "CONTINUOUS VALIDATION." Architrave reads "ZERO TRUST ARCHITECTURE." The sergeant stands beside with clipboard, checking off each pillar. Classification: TOP SECRET. big_idea: true applied_patterns:
n: 38 chapter: ch-principles title: "Security Maturity Checklist (First Appearance)" format: FULL visual: "Military personnel evaluation form with first two items checked." text_overlay: "Where are you on the maturity curve?" image_prompt: | [STYLE ANCHOR]. FIG. 20. PERSONNEL EVALUATION FORM: SECURITY MATURITY ASSESSMENT. Checklist with 6 items: "IDENTITY VERIFICATION" [checked], "ACCESS CONTROLS" [checked], "NETWORK SEGMENTATION" [unchecked], "CONTINUOUS MONITORING" [unchecked], "INCIDENT RESPONSE" [unchecked], "ZERO TRUST COMPLIANCE" [unchecked]. Stamp: EVALUATION IN PROGRESS.
n: 45 chapter: ch-principles title: "Security Maturity Checklist (Second Appearance)" format: FULL visual: "Same form, now with four items checked." text_overlay: "Making progress" image_prompt: | [STYLE ANCHOR]. FIG. 25. Same PERSONNEL EVALUATION FORM. Now "IDENTITY VERIFICATION" [checked], "ACCESS CONTROLS" [checked], "NETWORK SEGMENTATION" [checked], "CONTINUOUS MONITORING" [checked], "INCIDENT RESPONSE" [unchecked], "ZERO TRUST COMPLIANCE" [unchecked]. Stamp: MAKING PROGRESS.
n: 52 chapter: ch-principles title: "Security Maturity Checklist (Third Appearance)" format: FULL visual: "Same form, now with five items checked." text_overlay: "Nearly there" image_prompt: | [STYLE ANCHOR]. FIG. 30. Same form. Five of six checked. Only "ZERO TRUST COMPLIANCE" unchecked. Stamp: NEARLY THERE.
n: 58 chapter: ch-principles title: "Security Maturity Checklist (Final — All Checked)" format: FULL visual: "Complete form, all items checked, approval stamp." text_overlay: "Approved" image_prompt: | [STYLE ANCHOR]. FIG. 35. Same form, all six items checked. Large "APPROVED" stamp. Radiating approval lines. The sergeant salutes. =============== END OF FILE ===============
evals
scenario-1
scenario-2
scenario-3
scenario-4
scenario-5
scenario-6
scenario-7
scenario-8
scenario-9
scenario-10
scenario-11
scenario-12
scenario-13
scenario-14
scenario-15
scenario-16
scenario-17
scenario-18
scenario-19
scenario-20
scenario-21
rules
skills
illustrations
presentation-creator
references
patterns
build
deliver
prepare
scripts
vault-clarification
vault-ingress
vault-profile