2
    persuasion-architecture

    persuasion-architecture

    by Frank Brsrk

    Detect and ethically author persuasion in copy. Replication-filtered mechanism catalog with per-row ethics gate. Quarantines 13 zombie findings the popular canon still teaches.

    Updated May 2026
    Security scanned
    One-time purchase
    Codex CLI

    $7

    One-time purchase

    ⚡ Also available via Agensi MCP — your AI agent can load this skill on demand via MCP. Learn more →

    Included in download

    • Detect and neutralize manipulative dark patterns in competitor copy.
    • Verify marketing claims against modern replication-crisis standards.
    • Ready for Codex CLI
    • Includes example output and usage patterns
    • Instant install

    See it in action

    Audit Result:
    - Mechanism 8 (Scarcity): FAIL. Countdown timer resets on reload. Recommendation: Remove or link to real inventory cap.
    - Operator L2 (Agency Deletion): FAIL. "Disruption was experienced" uses passive voice to hide accountability. Correction: "Our server failed."
    - Density: PASS (3/8).

    Screenshots

    About This Skill

    A symmetric detect-and-author skill for persuasion in copy. Same mechanism vocabulary runs both directions: every move you can author leaves a structural fingerprint a trained reader can name; every fingerprint a reader can name corresponds to a move an author chose to make. The catalog is the same; only the direction of use differs. What's in the file: - 12 convergent persuasion mechanisms (framing, anchoring, illusory truth, processing fluency, social proof, authority, liking, scarcity, reactance, reason-why, narrative transportation, identity priming) and 5 linguistic operators (presupposition, agency deletion, generic-you normativity, modality and asymmetric hedging, Linguistic Intergroup Bias). Each row carries: mechanism + FORBIDDEN trigger + author rule + detection signal + citation anchor. - Hard ethics gate that fires per technique, not just at the top: truth-of-claim, instance-level disclosure-survives test, symmetry-of-choice, no-vulnerability-targeting (consequence-based for shipped-to-public copy), density cap (max 4 mechanisms above the fold / 8 across the page), input-sufficiency rule (refuses to fabricate placeholder data when the brief omits it). - Quick-reference lookup table at the top for sub-five-minute triage. - QUICK MODE workflow (4 steps) for deadline rewrites, distinct from full AUDIT MODE for compliance review. - Six-heuristic detection kit (lateral source check, frame swap, presupposition negation test, accuracy reflex, technique-label scan, anchorage strip). - Short-form surfaces section: how the gate fires on subject lines, ad headlines, push notifications. - Two worked examples: one dense-violations teardown, one realistically-ambiguous B2B SaaS pricing block where most mechanisms PASS with substantiation log entries. - Anti-patterns / discarded canon section explicitly refusing 13 zombie findings: Vicary popcorn, NLP, power posing, ego depletion, "losses loom 2x", color-emotion universals (red=urgency etc), Mehrabian 55-38-7 misapplication, strong Whorfianism, backfire effect, Hofstede copy localization, classic induced-compliance dissonance, social priming, "disclosure cures everything." Each entry names the killing citation. - Jurisdictional scope and anti-laundering warnings: regulatory citations are flags not legal advice; this skill's gate is self-administered and is not a substitute for third-party audit. - Production guardrails (6 hard rules) and OUTPUT DISCIPLINE step 0 with 7-question gate covering all mechanisms inline. - 50+ primary-source references including 2026 meta-analyses (Henderson illusory truth) with DOIs. Built for: copywriters, marketing operators, founders writing their own copy, agency content leads, dark-pattern auditors, political-comms reviewers, AI-content provenance reviewers, and LLM-powered copy tools that need a defensible mechanism set rather than vibes. Why this isn't another Cialdini summary: replication-filtered (post-2010 multilab and preregistered scrutiny applied to every claim, with citations); per-row ethics gate that prevents the catalog being used as a manipulation manual; symmetric detect-and-author structure with an author-to-detector handoff; explicit refusal of 13 named zombie findings the popular canon still teaches.

    Use Cases

    • Detect and neutralize manipulative dark patterns in competitor copy.
    • Verify marketing claims against modern replication-crisis standards.
    • Author high-conversion sales copy that survives FTC and EU regulatory audits.
    • Strip pseudo-science and 'zombie' findings from brand messaging.

    Reviews

    No reviews yet - be the first to share your experience.

    Only users who have downloaded or purchased this skill can leave a review.

    Security Scanned

    Passed automated security review

    Permissions

    No special permissions declared or detected

    Pure SKILL.md content; no runtime dependencies, no framework version requirement. Works with any compatible agent (Claude Code, Codex CLI, Cursor, Copilot, Gemini CLI). Best with reasoning-capable models. because the per-row ethics gate requires genuine instance-level evaluation rather than category-level approximation. Cite-checking and lateral-source-check heuristics work better when the agent has live web access, but the skill is fully usable offline as a copy-audit reference.

    Creator

    Building Ejentum, a cognitive harness API for AI agents. Small structured pieces of context retrieved at inference time, so the agent reasons through a task instead of pattern-matching to a generic answer. Adversarial systems thinking is the other thing I'm into: chaos engineering, pre-mortems, blast-radius design. Those skills sit alongside the Ejentum harness wrappers on this profile. Solo builder, open source most of what I make.

    Frequently Asked Questions

    Similar Skills

    $7

    One-time