Reverse Thinking - Information Completeness Assessment. Mandatory pre-planning checkpoint that blocks planning until prerequisites are verified. Use when receiving specs, PRDs, tickets, RFCs, architecture designs, or any multi-step engineering task. Integrates with CoVe-style planning pipelines. Invoke BEFORE creating plans, delegating to agents, or defining acceptance criteria.
85
Quality
79%
Does it follow best practices?
Impact
94%
1.36xAverage score across 3 eval scenarios
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./.claude/skills/rt-ica/SKILL.mdThis skill inserts a mandatory RT-ICA checkpoint into planning workflows. For every goal (top-level and each decomposed sub-goal), the model MUST:
<core_rule>
No planning, delegation, scheduling, or solution design may begin until RT-ICA has been performed on:
If ANY required condition is MISSING, the model MUST stop and request only the missing information.
</core_rule>
<activation_triggers>
Invoke RT-ICA when receiving ANY of:
Integration Points (where RT-ICA checkpoints MUST occur):
</activation_triggers>
| Term | Definition |
|---|---|
| Goal | A desired outcome the user wants |
| Condition | A prerequisite that must be true to achieve the goal |
| Required Information | Concrete data needed to confirm or satisfy a condition |
| AVAILABLE | Explicitly present in the input material |
| DERIVABLE | Inferred with high confidence from provided material (must show basis) |
| MISSING | Not present and not safely inferable |
Apply this procedure to each goal and sub-goal:
<procedure>Produce:
Work backwards from the goal to list ALL conditions required for success.
<condition_categories>
Include conditions in these categories (where applicable):
| Category | Example Conditions |
|---|---|
| Functional requirements | Features, behaviors, user flows |
| Non-functional requirements | Latency, throughput, availability, compliance, security |
| Interfaces/Integration | APIs, schemas, dependencies, external systems |
| Environment/Runtime | Cloud, region, OS, language, build system |
| Data requirements | Sources, quality, migration, retention |
| Access/Permissions | Repos, secrets, credentials, IAM |
| Operational constraints | SLOs, oncall, monitoring, incident response |
| Delivery constraints | Timeline, release process, approvals |
| Verification needs | Tests, canaries, acceptance criteria, observability |
| Risks/Failure modes | Rollback, data loss, security exposure |
</condition_categories>
For each condition, specify:
For each condition, set status:
| Status | Evidence Required |
|---|---|
| AVAILABLE | Cite exact source snippet or section name |
| DERIVABLE | State the inference and basis |
| MISSING | State exactly what information is needed |
IF any condition is MISSING:
DECISION = BLOCKED
ELSE:
DECISION = APPROVED<decision_actions>
IF BLOCKED:
IF APPROVED:
</decision_actions>
</procedure><output_format>
The model MUST produce this summary block for each goal/sub-goal:
RT-ICA SUMMARY
Goal:
- [one sentence]
Success Output:
- [deliverable/observable result]
Conditions (reverse prerequisites):
1. [Condition] | Requires: [info] | Why: [1 line]
2. [Condition] | Requires: [info] | Why: [1 line]
...
Verification:
- [Condition 1]: [AVAILABLE|DERIVABLE|MISSING] | Evidence/Basis: [text]
- [Condition 2]: [AVAILABLE|DERIVABLE|MISSING] | Evidence/Basis: [text]
...
Decision:
- [APPROVED|BLOCKED]
--- IF BLOCKED ---
Missing Inputs Requested:
[Category]:
- [missing item question] (why needed)
- [missing item question] (why needed)
[Category]:
- [missing item question] (why needed)
--- IF APPROVED ---
Assumptions to Confirm (DERIVABLE only):
- [assumption] | Basis: [basis] | Validation step: [how to confirm early]</output_format>
<cove_integration>
Recommended sequence with RT-ICA:
A) RT-ICA on top-level goal
B) Draft plan and decomposition
C) RT-ICA on each major workstream/sub-goal
D) Assign agents with clearly bounded deliverables
E) Verification pass: cross-check plan against conditions and acceptance criteria
F) Refinement pass: resolve gaps, reduce risk, ensure ordering and guardrails</cove_integration>
<planning_deliverables>
After RT-ICA APPROVED decision, produce a plan that includes:
| Section | Contents |
|---|---|
| Workstreams | Logical groupings and ordering |
| Agent Assignment | Which agent handles each workstream |
| Guardrails | Safety, security, correctness, operational constraints |
| Acceptance Criteria | Testable, measurable success conditions |
| Risk Register | Top risks, mitigations, rollback strategy |
| Dependencies | Internal and external dependencies |
| Verification Plan | Tests, monitoring, canary, QA |
| Change Management | Rollout, communications, documentation |
</planning_deliverables>
The model MUST NOT:
The model MUST:
<question_templates>
When requesting missing inputs, use structured questions:
Environment/Infrastructure:
Success Criteria:
Integration:
Technical Constraints:
Approvals:
</question_templates>
User Request: "Build a user authentication service"
RT-ICA Summary:
RT-ICA SUMMARY
Goal:
- Implement user authentication service for the application
Success Output:
- Deployed service that authenticates users and issues session tokens
Conditions (reverse prerequisites):
1. Auth protocol | Requires: OAuth2/OIDC/custom spec | Why: Determines implementation approach
2. User store | Requires: Database type, schema | Why: Persistence layer dependency
3. Session management | Requires: Token format, expiry rules | Why: Security policy compliance
4. Integration points | Requires: API consumers list | Why: Interface contract design
5. Security requirements | Requires: Compliance standards (SOC2, HIPAA) | Why: Audit requirements
6. Deployment target | Requires: Cloud/region/infra | Why: Runtime configuration
Verification:
- Auth protocol: MISSING | Need: Which protocol to implement
- User store: DERIVABLE | Basis: Project uses PostgreSQL per docker-compose.yml
- Session management: MISSING | Need: Token format and expiry policy
- Integration points: MISSING | Need: List of services calling auth
- Security requirements: MISSING | Need: Compliance requirements if any
- Deployment target: AVAILABLE | Evidence: README specifies AWS us-east-1
Decision:
- BLOCKED
Missing Inputs Requested:
Authentication Design:
- Which auth protocol: OAuth2, OIDC, or custom JWT? (determines implementation)
- Session token expiry policy? (security requirement)
Integration:
- Which services will consume this auth service? (API contract design)
Compliance:
- Are there compliance requirements (SOC2, HIPAA, etc.)? (audit scope)<anti_patterns>
Planning without RT-ICA:
User: "Build auth service"
Model: "Here's my plan: 1. Create user table, 2. Add login endpoint..."
Problem: Assumed requirements, will likely need reworkAsking too many questions:
Model asks 20 questions about edge cases before understanding core requirements
Problem: Overwhelms user, delays progress on high-signal itemsProceeding with silent assumptions:
Model: "I'll assume OAuth2 since that's common..."
Problem: Assumption may be wrong, causes rework or security issues</anti_patterns>
/agent-orchestration — scientific delegation framework for orchestrator-to-agent workflows/subagent-contract — DONE/BLOCKED signaling protocol for sub-agents| Source | Attribution | Access Date |
|---|---|---|
| RT-ICA Framework | Liu et al., 2025 - Reverse Thinking Enhances Missing Information Detection in LLMs | 2026-01-20 |
| CoVe (Chain of Verification) | Dhuliawala et al., 2023 - Chain-of-Verification Reduces Hallucination | 2026-01-20 |
Note: This skill adapts the RT-ICA (Reverse Thinking for Information Completeness Assessment) framework for planning workflows.
5667e97
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.