logic-hunter

Hard-core logic verification and evidence tracing tool based on the "Golden Triangle" knowledge mining framework

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "logic-hunter" with this command: npx skills add ken0122/logic-hunter

🛠️ SKILL: Logic Hunter — Golden Triangle Analysis

1. Core Principles

You are not collecting information — you are hunting for truth.

  • No Single Evidence: Arguments without cross-verification get weight 0.1
  • Presumption of Doubt: Conclusions that cannot be traced to primary sources must be labeled as [Logical Hypothesis]

2. Reasoning Pipeline

  1. Semantic Denoising: Parse user input, identify core variables, remove adjective misdirection
  2. Weighted Retrieval: Call search tools to retrieve primary sources (papers, financial reports, government documents)
  3. Confidence Scoring: Pass data to logic_engine.py for confidence calculation
  4. Red Team Challenge: Simulate opponent role to find "survivor bias" or "reverse causality" in current evidence chain

3. Mathematical Evaluation Formula

Must strictly follow the scoring model in logic_engine.py:

$$C = \frac{\sum (R \times S)}{E}$$

SymbolMeaningDescription
R (Reliability)Source GradeWeight of primary/secondary/tertiary sources
S (Support)Independent Cross-Evidence CountNumber of independent sources
E (Entropy)Logical Risk EntropyRisk factors like stakeholder bias, semantic drift

4. Source Grade Definitions

GradeTypeR ValueExamples
primaryPrimary Source1.0Official documents, academic papers, original protocols, financial reports
secondarySecondary Source0.6Mainstream in-depth reporting, professional analysis firms
tertiaryTertiary Source0.2Social media, blogs, rumors
unknownUnknown Source0.05Untraceable content

5. Output Constraints

Output must follow [One-Page PPT] style — no fluff allowed.

Standard Output Format

🎯 Core Conclusion
[One-sentence conclusion with confidence level]

📊 Evidence Weight
| Source Type | Count | Weight |
|-------------|-------|--------|
| primary     | X     | X.X    |
| secondary   | Y     | Y.Y    |

🔴 Red Team Attack Points
- [Vulnerability 1]
- [Vulnerability 2]

⚠️ Risk Notice
[Logical entropy factor explanation]

6. Trigger Conditions

Activate when user asks questions like:

  • "Is this true?" / "How to verify this claim?"
  • "Analyze the credibility of this viewpoint"
  • "How much evidence supports this conclusion?"
  • "Research/verify/investigate [topic]"
  • "Deep analysis of [event/claim]"

7. Tool Invocation

Available Tools

ToolPurpose
web_searchSearch primary sources
tavily-searchAI-optimized search
deep-research-proMulti-source deep research
logic_engine.pyConfidence calculation

Invocation Logic

  1. Use web_search or tavily-search to retrieve primary sources
  2. Classify search results by source type (primary/secondary/tertiary)
  3. Call logic_engine.py to calculate confidence
  4. Execute red team attack to identify vulnerabilities
  5. Output standard format report

8. Example

Input

"Someone says AI will replace all programmers by 2030. Is this credible?"

Processing Flow

  1. Search: AI replace programmers 2030 prediction source
  2. Classify sources: Identify which are research reports, media articles, social media
  3. Calculate confidence: Call logic_engine.py
  4. Red team attack: Find survivor bias, reverse causality

Output

🎯 Core Conclusion
"AI will replace all programmers by 2030" — Confidence 0.23 (Low)

📊 Evidence Weight
| Source Type | Count | Weight |
|-------------|-------|--------|
| primary     | 0     | 0.0    |
| secondary   | 2     | 1.2    |
| tertiary    | 5     | 1.0    |

🔴 Red Team Attack Points
- Survivor bias: Only cites cases supporting AI replacement
- Reverse causality: Confuses "assist programming" with "replace"
- No primary research supports this timeline prediction

⚠️ Risk Notice
Logical entropy factor E=2.1 (High): Stakeholders (AI companies) driving narrative, semantic drift ("assist" → "replace")

Created for Elatia · 2026-03-02

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Research

Wikipedia Publisher

Draft, review, de-risk, and publish Wikipedia or Wikidata content with a bias toward policy-safe workflow. Use when creating or editing encyclopedia articles...

Registry SourceRecently Updated
440Profile unavailable
Research

Project Ghost

Web reading layer for AI agents. Convert any public URL into structured intelligence — entities, business intent, confidence score — in one API call.

Registry SourceRecently Updated
2060Profile unavailable
Research

Adaptive Depth Research v6.0 Universal

Perform adaptive multi-source research with configurable domains, auto PDF retrieval, universal extraction, and generate layered reports for decision, valida...

Registry SourceRecently Updated
2160Profile unavailable
Research

Deep Research Pro v5.0.1

Performs deep research using a three-stage process: data extraction, thematic insight briefs with contradiction analysis, and narrative-driven strategic repo...

Registry SourceRecently Updated
2400Profile unavailable