truth-fristEvidence-first verification for status, config, file contents, actions, connectivity, mounts, and model selection. Use before answering any such claim.
Install via ClawdBot CLI:
clawdbot install royhk920/truth-fristGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Generated Mar 22, 2026
A system administrator needs to verify claims about server status, service availability, and configuration settings before making changes or reporting to stakeholders. This skill ensures evidence-based verification of running services, connectivity, and config values.
An auditor must verify specific claims about file contents, access logs, and system configurations to ensure regulatory compliance. This skill provides structured evidence gathering with clear classification of verified vs. unverified claims.
A DevOps engineer needs to confirm that deployment actions completed successfully, configuration files contain correct values, and services are properly mounted before declaring a release stable.
A support technician receives user claims about system issues and must verify file contents, connectivity status, and recent actions before diagnosing problems or escalating tickets.
A data scientist needs to verify claims about model selection, data file contents, and processing logs before publishing research findings or making analytical decisions.
Integrate this skill into cloud management platforms as a premium verification module. Charge based on verification volume or offer it as part of enterprise support packages for infrastructure monitoring.
IT consulting firms can use this skill to provide evidence-based audit reports and system verification services. Offer structured verification as a standalone service or as part of compliance packages.
License this skill to large organizations for internal use in their DevOps pipelines and IT operations. Offer per-seat licensing or site-wide enterprise agreements with support contracts.
💬 Integration Tip
Integrate this skill early in workflow pipelines to catch unverified claims before they propagate. Use it as a verification gate before critical operations or reporting.
Scored Apr 19, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.