Vibecosystem factcheck-guard

Use this skill when making any factual claim about the codebase — existence, absence, or behavior. Converts the claim-verification rule into a systematic action protocol that prevents false assertions from grep-only results.

install
source · Clone the upstream repo
git clone https://github.com/vibeeval/vibecosystem
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/vibeeval/vibecosystem "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/factcheck-guard" ~/.claude/skills/vibeeval-vibecosystem-factcheck-guard && rm -rf "$T"
manifest: skills/factcheck-guard/SKILL.md
source content

FactCheck Guard — Runtime Claim Verification

Prevents false claims about the codebase. Grep results are hypotheses, not proof. Every assertion about "what the code does" must be verified by reading the actual code.

Why This Exists

An 80% false claim rate was observed when agents trusted grep results without reading files. The pattern repeats: grep finds a string, agent asserts behavior, behavior is wrong. This skill converts the claim-verification guidelines into an actionable protocol.

Confidence Markers (MANDATORY)

Every factual claim about the codebase MUST carry one of these markers:

MarkerMeaningRequirements
[VERIFIED]Read the file, traced the logicMust cite file:line
[INFERRED]Based on grep or file nameMust verify before asserting to others
[UNCERTAIN]Not yet checkedMust investigate before making the claim

Never promote an [INFERRED] claim to a statement of fact. Never let [UNCERTAIN] appear in a response to the user — investigate first.


Verification Protocol

Level 1: Existence Claims

When asserting "X exists in the codebase":

Step 1 — Search (produces [INFERRED])

Grep/Glob for the pattern.
Result: "X appears at path/to/file.ts:42" [INFERRED]

Step 2 — Read the file (required to reach [VERIFIED])

Read path/to/file.ts, locate line 42.
Confirm the match is actual code, not a comment or string literal.

Step 3 — Check context

Is the code in a live code path, or inside a dead branch / disabled block?
Is it imported and actually used?
Does the function name match what you expected, or is it a different concept?

Step 4 — State the claim with citation

"Error handling exists at src/api/handler.ts:67 — try/catch wraps the database call" [VERIFIED]

Level 2: Absence Claims

When asserting "X does NOT exist" — absence claims are the most dangerous. A single missed search term invalidates the entire claim.

Step 1 — Primary search

Grep for the primary term. No results found.
Status: [INFERRED ABSENT] — not yet VERIFIED

Step 2 — Alternative terms (minimum 3)

Different naming conventions, abbreviations, synonyms.

Example: Searching for "rate limiting"
Try: "rateLimit", "rate_limit", "throttle", "throttling", "requestLimit", "limiter"
If any match: investigate that file before concluding

Step 3 — Check likely locations manually

Where would X logically live if it existed?
Read those files directly — grep may miss dynamically constructed patterns.

Example: Checking for auth middleware
Read: src/middleware/, app/middleware.ts, server.ts, app.ts
Even if grep found nothing, scan these files for auth-related logic.

Step 4 — Only then claim VERIFIED ABSENT

"Rate limiting does not exist. Searched: rateLimit, rate_limit, throttle, throttling,
requestLimit, limiter. Checked: src/middleware/index.ts, server.ts, app.ts. None found." [VERIFIED ABSENT]

Level 3: Behavior Claims

When asserting "the system does X" — the most subtle failure mode. Finding a function name does not tell you what the function actually does.

Step 1 — Locate the function

Grep/Glob finds the function name.
Status: [INFERRED] — you know it exists, not what it does

Step 2 — Read the full function body

Read the file. Read the entire function, not just the signature.
Look for: branches, early returns, side effects, what it actually returns.

Step 3 — Trace the logic path

Follow the execution path relevant to your claim.
If the function calls other functions, read those too (one level deep minimum).
Check: what happens in the error path? What are the edge cases?

Step 4 — State behavior with evidence

"processPayment() validates card number via Luhn check (payment.ts:34),
then calls Stripe API (payment.ts:41), and on failure rolls back the DB
transaction (payment.ts:58) — it does NOT charge the card on validation failure." [VERIFIED]

Common False Claim Patterns

PatternWhy It FailsCorrect Approach
grep found "try.*catch"Could be in comment, string, or test mockRead the file, confirm it wraps real code
grep found nothingWrong term, wrong directory, different namingTry 3+ alternative terms
File named auth.ts existsDoesn't mean auth is implementedRead the file
Type definition has a fieldDoesn't mean the field is set or usedGrep for field assignment and usage
Function is called somewhereDoesn't mean it does what the name impliesRead the function body
Found in tests directoryTest mocks are not real implementationsConfirm the actual source file
grep -L returned filesThose files lack the pattern — but pattern might exist under a different nameTry alternative terms before concluding
Found in commented-out blockNot active codeCheck if block is enabled

Two-Pass Audit Protocol

For system audits, security reviews, and architecture reviews:

Pass 1: Generate Hypotheses

Go through each area systematically. Produce hypothesis statements only:

"Input validation might be missing from the /api/upload route" [INFERRED]
"The auth token might not be refreshed on expiry" [INFERRED]
"Database queries might not use parameterized statements" [INFERRED]

Do not state these as facts. Do not include them in the user-facing summary.

Pass 2: Verify Each Hypothesis

For every [INFERRED] hypothesis:

Hypothesis: "Input validation missing from /api/upload" [INFERRED]

Action: Read src/app/api/upload/route.ts
Found: Zod schema validation at line 18, applied before file processing.
Result: "Input validation exists at api/upload/route.ts:18" [VERIFIED]
Hypothesis was wrong.
Hypothesis: "Database queries might not be parameterized" [INFERRED]

Action: Search for raw SQL patterns (string interpolation in queries)
Grep: `db.query(\`.*\${`, `db.execute(\`.*\${`
Read: src/lib/db.ts, src/repositories/*.ts
Found: All queries use prepared statements. One raw query at analytics.ts:89.
Result: "Raw SQL injection risk at src/analytics.ts:89" [VERIFIED]

Only after Pass 2 are claims safe to report.


Quick Checklist

Before making any codebase claim, confirm:

  • Have I read the actual file, not just grep results?
  • Is the code in a live path (not commented out, not test-only)?
  • For absence claims: did I try 3+ alternative search terms?
  • For absence claims: did I manually check the likely locations?
  • For behavior claims: did I read the full function, not just the name?
  • Does my claim include a file:line citation?
  • Is my marker accurate: [VERIFIED] / [INFERRED] / [UNCERTAIN]?

Integration Points

claim-verification.md — the rule file provides guidelines; this skill provides the action protocol.

Agents that must use this skill:

  • code-reviewer: before asserting "the code lacks X"
  • security-reviewer: before asserting "vulnerability exists/doesn't exist"
  • architect: before asserting "pattern is/isn't used"
  • sleuth: before asserting "root cause is X"
  • coroner: before asserting "same bug exists elsewhere"

Hook integration (optional): After every Grep tool result, the

epistemic-reminder
hook injects a warning. That warning is this skill's Level 1 trigger — search results are [INFERRED], not [VERIFIED].


Examples: Wrong vs Right

Existence claim — WRONG

Grep found "authMiddleware" in 3 files.
Claim: "Auth middleware is applied to all routes."

Existence claim — RIGHT

Grep found "authMiddleware" in 3 files.
Read server.ts: middleware applied only to /api/* routes, not /public/*.
Read admin/router.ts: authMiddleware missing from /admin/health endpoint.
Claim: "Auth middleware applied to /api/* (server.ts:23) but missing from
/admin/health (admin/router.ts:8)." [VERIFIED]

Absence claim — WRONG

Grep "rate limit" returned no results.
Claim: "No rate limiting implemented."

Absence claim — RIGHT

Grep "rate limit" → no results.
Grep "rateLimit", "throttle", "limiter", "requestLimit" → no results.
Read: src/middleware/index.ts, server.ts, next.config.js.
Confirmed none contain request throttling logic.
Claim: "No rate limiting found after searching 6 term variants and
reading 3 likely files." [VERIFIED ABSENT]