NWave nw-authoritative-sources

Domain-specific authoritative source databases, search strategies by topic category, and source freshness rules

install
source · Clone the upstream repo
git clone https://github.com/nWave-ai/nWave
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/nWave-ai/nWave "$T" && mkdir -p ~/.claude/skills && cp -r "$T/nWave/skills/nw-authoritative-sources" ~/.claude/skills/nwave-ai-nwave-nw-authoritative-sources && rm -rf "$T"
manifest: nWave/skills/nw-authoritative-sources/SKILL.md
source content

Authoritative Sources

Domain Authority Database

Supplements general reputation tiers in

source-verification
with domain-specific authorities.

Software Architecture

SourceAuthorityNotes
martinfowler.comPrimaryPatterns, refactoring, enterprise architecture
c2.com/wikiHistoricalOriginal wiki; pattern language origins
microservices.ioDomain-specificChris Richardson's microservices patterns
architecturenotes.coCuratedADRs and trade-off analysis
infoq.comIndustry reportingConference talks, practitioner reports
thoughtworks.com/radarTrend trackingTechnology Radar adoption lifecycle

Cloud Platforms

SourceAuthorityNotes
docs.aws.amazon.comOfficialAWS, well-architected framework
cloud.google.com/docsOfficialGCP services and practices
learn.microsoft.comOfficialAzure, .NET, Microsoft ecosystem
kubernetes.io/docsOfficialContainer orchestration
docs.docker.comOfficialContainer runtime

Security

SourceAuthorityNotes
owasp.orgStandards bodyWeb app security, top-10
nist.govGovernmentNIST CSF, SP 800 series
cve.mitre.orgVuln databaseCVE identifiers
nvd.nist.govVuln databaseNVD with scoring
csrc.nist.govCrypto standardsFIPS, module validation
cisa.govGovernment advisorySecurity advisories

Standards Bodies

SourceAuthorityNotes
ietf.org / datatracker.ietf.orgProtocol standardsRFCs: networking, HTTP, TLS, DNS
w3.orgWeb standardsHTML, CSS, WCAG, web APIs
iso.orgInternationalQuality, security, process frameworks
ecma-international.orgLanguage standardsECMAScript spec
unicode.orgCharacter standardsUnicode encoding

Programming Languages and Frameworks

SourceAuthorityNotes
docs.python.orgOfficialPython, stdlib, PEPs
go.dev/docOfficialGo language, stdlib
typescriptlang.orgOfficialTypeScript handbook
rust-lang.org/learnOfficialRust book, reference
developer.mozilla.org (MDN)Canonical web refJS, HTML, CSS, Web APIs
docs.oracle.com/javaseOfficialJava spec, API docs

Data and Databases

SourceAuthorityNotes
postgresql.org/docsOfficialPostgreSQL
dev.mysql.com/docOfficialMySQL
redis.io/docsOfficialRedis
mongodb.com/docsOfficialMongoDB
cassandra.apache.org/docOfficialCassandra

DevOps and SRE

SourceAuthorityNotes
sre.googleIndustryGoogle SRE books
12factor.netMethodologyTwelve-factor app
dora.devResearchDORA metrics
openpolicyagent.orgPolicy-as-codeOPA docs

Domain-Specific Search Strategies

Architecture Topics

  1. Canonical authors:
    {topic} site:martinfowler.com
    or
    site:microservices.io
  2. Conference talks:
    {topic} QCon OR StrangeLoop OR GOTO conference
  3. Books/papers:
    {topic} book OR paper architecture
  4. Adoption status:
    {topic} site:thoughtworks.com/radar
  5. Local docs: Grep in
    docs/research/
    and
    nWave/skills/

Security Topics

  1. Vuln databases:
    {topic} site:cve.mitre.org
    or
    site:nvd.nist.gov
  2. Advisories:
    {topic} site:cisa.gov
    or
    site:owasp.org
  3. NIST frameworks:
    {topic} site:nist.gov
  4. Vendor advisories if product-specific
  5. Prioritize last 6 months

Framework and Library Topics

  1. Official docs (see database above)
  2. Release notes/changelogs for version-specific info
  3. Migration guides:
    {framework} migration guide {version}
  4. GitHub issues/discussions for known problems
  5. Stack Overflow:
    {topic} site:stackoverflow.com

Methodology and Process Topics

  1. Original author/publication
  2. Case studies:
    {methodology} case study OR experience report
  3. Critiques:
    {methodology} criticism OR alternative OR comparison
  4. Academic:
    {topic} site:arxiv.org
    or Google Scholar
  5. Practitioner adaptations vs original definitions

Source Freshness Rules

CategoryMax AgeRationale
Security vulnerabilities6 monthsRapid threat evolution
Framework versions1 yearAPI/practice changes
Cloud service docs1 yearFrequent deprecation/launch
API references1 yearBreaking changes common
Architecture patternsEvergreenCore patterns stable
Methodology referencesEvergreenFoundational works stable
Language specsEvergreen per versionPer-version permanent
Research papers3 yearsCheck for follow-up work
Industry trend reports1 yearCite current edition only

Handling Outdated Sources

  1. Check if newer version exists
  2. Stable concept: cite with "[Published {year}; concept remains current]"
  3. Time-sensitive: find current source or document age limitation in Knowledge Gaps
  4. Never cite outdated security advisories as current threat intelligence