Systematically deconstruct written content into verifiable claims, validate each using search/documentation, and facilitate informed discussion through structured interviewing.
Security
1 medium severity finding. This skill can be installed but you should review these findings before use.
The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.
Third-party content exposure detected (high risk: 0.90). This skill's Phase 2 verification workflow explicitly requires using web search tools and "fetch_webpage" to gather evidence from general web content (see "Phase 2: Search for evidence" and "Tool Integration" listing `fetch_webpage`), which means the agent will ingest and act on untrusted public third‑party webpages as part of its decision-making.
6770aaa
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.