🎁 Get the FREE AI Skills Starter Guide β€” Subscribe β†’
BytesAgainBytesAgain
πŸ¦€ ClawHub

Influence Defense Analyzer

by @quochungto

Detect and counter manipulation attempts using Cialdini's 6 influence principles. Use when you feel pressured to comply with a request, sense a sales tactic...

Versionv1.0.0
⚑ When to Use
TriggerAction
This skill covers all 6 compliance principles from the defensive side. It is the counterpart to `influence-principle-selector`, which helps you apply influence; this skill helps you resist it.
**Do not use this skill if:** You want to apply influence tactics yourself. Use `influence-principle-selector` or the dedicated principle skills for that.
---
πŸ’‘ Examples

Example 1: Sales Pitch with Multiple Active Principles

Scenario: A software vendor sends a free consultation report analyzing your company's "inefficiencies" (unsolicited), followed by a pitch deck. The pitch includes logos of 40 named customers, a quote from a Gartner analyst, and an "end-of-quarter pricing" that expires Friday.

Trigger: "Should I take this deal? The analyst quote seems credible and a lot of companies I recognize are using them."

Process:

  • Step 1: Deadline (Friday) creates time pressure β€” vulnerability condition flagged.
  • Step 2: Reciprocity (free consultation = initial gift), Social Proof (40 customer logos + testimonials), Authority (Gartner analyst), Scarcity (end-of-quarter pricing expiry). Four principles active simultaneously.
  • Step 3: Reciprocity β€” was the consultation genuinely valuable, or designed to create obligation? Check: did they tailor it to your specific situation or was it templated? If templated, redefine as a sales device, not a gift. Social proof β€” are the 40 logos verifiable reference customers or logos placed without permission? Can you call two of them? Authority β€” is the Gartner analyst quote from a paid research relationship or an independent analysis? Scarcity β€” is end-of-quarter pricing real (sales team quota pressure) or a manufactured false deadline?
  • Step 4: Apply per-principle protocols for each.
  • Step 5: If consultation is genuine AND logos are verifiable AND analyst quote is independent AND pricing expiry is real β†’ fair practitioner; engage on merits. If any trigger is manufactured β†’ classify as exploitative; request extended timeline and verify independently before committing.
  • Output:

    Active principles: Reciprocity (free report), Social Proof (logos), Authority (analyst), Scarcity (deadline)
    Vulnerability: Friday deadline = time pressure β€” elevated risk of automatic compliance
    Reciprocity: Pending classification β€” verify if report is templated or tailored
    Social Proof: Pending β€” call 2 reference customers before Friday
    Authority: Pending β€” verify Gartner relationship is independent, not paid
    Scarcity: Pending β€” ask directly whether pricing can be extended; test the deadline's reality
    Response: Pause-and-verify. Request 2-week extension. Any refusal to extend signals manufactured scarcity.
    


    Example 2: Commitment Trap in a Negotiation

    Scenario: You are in a procurement negotiation. Three months ago you signed a letter of intent. The vendor is now presenting terms 30% above the original estimate, citing "scope changes." You feel obligated to continue because of the time invested and the letter you signed.

    Trigger: "We've put so much into this already. And we did sign the letter of intent. I feel like we have to see this through."

    Process:

  • Step 1: Sunk cost framing and prior commitment β€” stomach signal check warranted.
  • Step 2: Commitment/consistency is the primary active principle. The letter of intent + 3 months of time = effortful prior commitment being used as consistency anchor.
  • Step 3: Is the commitment legitimate? The letter of intent was real β€” but the terms presented now differ substantially from those anticipated when it was signed.
  • Step 4: Apply commitment defense. Diagnostic question: "Knowing what I know now about the final pricing, would I have signed the letter of intent on these terms?" Register the first honest answer. If no, this is foolish consistency β€” the commitment to the original terms does not extend to accepting 30% scope creep without renegotiation.
  • Step 5: Fair practitioner if scope genuinely changed and documentation supports it. Exploitative if scope was understated deliberately to lock in the commitment first.
  • Output:

    Active principle: Commitment/Consistency
    Stomach signal: Yes β€” discomfort about the gap between original and current terms
    Diagnostic question answer: No β€” would not have signed at current terms
    Classification: Pending β€” request scope change documentation
    Defense: The commitment was to the original terms, not to any terms the vendor chooses to present after the letter is signed. Renegotiate or withdraw.
    


    Example 3: Consumer Scarcity + Social Proof Stack

    Scenario: You are shopping for a hotel for a family trip. The booking site shows "Only 2 rooms left at this price!" and "17 people are looking at this right now."

    Trigger: "I need to book now before it's gone."

    Process:

  • Step 1: Rushing to book = time pressure induced by the display β€” vulnerability condition present.
  • Step 2: Scarcity (2 rooms, price expiry implied) + Social Proof (17 people looking) β€” two principles stacked.
  • Step 3: Both are frequently manufactured on booking platforms. "17 people looking" figures are often fabricated or algorithmically inflated. "2 rooms left" may reflect inventory management, not genuine scarcity.
  • Step 4: Scarcity defense β€” Stage 1: recognize arousal (urgency to book) as warning signal, pause. Stage 2: utility question β€” do I want this hotel to stay in it, or to "win" it? Answer: utility. Scarce hotel rooms provide the same night's sleep as abundant ones. Social proof defense β€” verify: open the hotel's own site and check availability; search elsewhere. If availability is identical, the scarcity was manufactured.
  • Step 5: Exploitative if room availability shows the same rooms on direct booking. Counter: book directly or check an alternative platform. Do not reward manufactured urgency with a booking.
  • Output:

    Active principles: Scarcity ("2 rooms left"), Social Proof ("17 looking")
    Vulnerability: Urgency to book β€” elevated risk
    Classification: Likely exploitative β€” verify via direct hotel site
    Defense: Check direct. If available there, the platform manufactured urgency. Book direct or on a platform without the pressure display.
    


    View on ClawHub
    TERMINAL
    clawhub install bookforge-influence-defense-analyzer

    πŸ§ͺ Use this skill with your agent

    Most visitors already have an agent. Pick your environment, install or copy the workflow, then run the smoke-test prompt above.

    πŸ” Can't find the right skill?

    Search 60,000+ AI agent skills β€” free, no login needed.

    Search Skills β†’