The definitive system for generating the most comprehensive analysis and creating a perfected result. This protocol uses a chain of specialists to deconstruct a subject from every angle.
No single prompt can fully expose the logic, vulnerabilities, and unrealized potential of a complex idea. This protocol simulates a triad of cognitive specialists—each with a distinct function: the Scholar performs structural analysis, the Trickster surfaces contradiction and failure conditions, and the Prophet extrapolates future potential and hidden utility. Their insights form a layered Master Analysis Report, which the Master Synthesizer fuses into one definitive output—fully aligned, contradiction-aware, and irreducibly complete.
Analyzes structure, logic, and coherence.
**Deploy the Scholar Function**
**Scope**
Examine only the immediately preceding turn in its entirety. Produce a diagnostic report—no edits, no recommendations.
#### 1 · Semantic Mapping
Decompose the subject’s structure, intent, and assumptions into labeled layers `L1, L2, L3…`. Use as many layers as required.
#### 2 · Structural Integrity Audit
For every load‑bearing claim, assign a clarity tag:
* `VALID` — coherent, well‑supported.
* `FAULT` — hidden assumption, contradiction, unsupported leap.
After each tag, quote the exact text needed to illustrate the judgment (quote length unrestricted).
#### 3 · Language Diagnostics
Flag any excerpts exhibiting:
`AMBIG` (ambiguous meaning) — `JARG` (excessive jargon) — `TONE` (tone drift) — `PREC` (precision loss).
Provide enough quotation to show the issue; no length constraints.
#### 4 · Purpose Alignment Check
Quote the subject’s declared purpose. State a binary verdict:
`ALIGNED` — content serves declared purpose.
`MISALIGNED` — divergence present.
Add a concise, factual justification.
---
**Execution Safeguards**
* **Context Isolation** — analyze only the target turn.
* **No Meta‑Leakage** — omit any reference to analysis roles or protocol mechanics.
* **Zero Prescription** — report findings; suggest no fixes.
* **Neutral Diction** — use descriptive verbs; avoid moral judgment or evaluation language.
* **Flexible Quotation** — quote as much or as little as necessary to avoid distortion.
**Output Format**
Part 1 – Scholar’s Blueprint
1. Semantic Mapping
L1: …
L2: …
…
2. Structural Integrity Audit
VALID: “…”
FAULT: “…”
…
3. Language Diagnostics
AMBIG: “…”
JARG: “…”
TONE: “…”
PREC: “…”
4. Purpose Alignment Check
Declared Purpose: “…”
Verdict: ALIGNED | MISALIGNED – justification
Stress-tests all assumptions and exposes vulnerabilities.
**Deploy the Trickster Function**
**Scope**
Analyze only the single, immediately preceding turn. Perform controlled destabilization—surface hidden premises, structural fragilities, and latent harms **without proposing remedies**.
#### 1 · Assumption Reversal
For each detected assumption:
* Quote the assumption (length as needed).
* **Inverse Statement** — a plausible counter‑premise.
* **Breakdown Scenario** — detail how the inverse could outperform or invalidate the original premise (no length limit).
#### 2 · Risk Surface Mapping
For each vulnerability:
* **Vector** — choose one: Ethical, Epistemic, Technological, Coercive, Procedural, Social, Legal.
* **Mechanism** — explain how the harm could emerge.
* **Impact** — concise statement of potential severity or consequence.
#### 3 · Premise Stress Test
* Quote the **central premise** of the target text.
* List up to three **Pressure Points** (circularity, fragility, normative dependence, etc.).
* **High‑Risk Reframe** — describe system state if the premise collapses.
---
**Execution Safeguards**
* **Context Isolation** — examine only the target turn.
* **No Meta‑Leakage** — omit any reference to analysis roles or process mechanics.
* **Neutral Diction** — descriptive language; no moral judgment.
* **Zero Prescription** — report findings; suggest no fixes.
* **Unlimited Length** — write as much as necessary for diagnostic depth.
**Output Format**
Part 2 – Trickster’s Interrogation
1. Assumption Reversal
– “quoted assumption” | Inverse: … | Breakdown: …
…
2. Risk Surface Mapping
Vector: … | Mechanism: … | Impact: …
…
3. Premise Stress Test
Central Premise: “…”
Pressure Points: 1) … 2) … 3) …
High‑Risk Reframe: …
Focuses on creative and conceptual expansion.
**Deploy the Prophet Function**
Project the **same text already examined** into its highest‑potential form. Produce disciplined conceptual mutation—expand meaning, reveal latent futures—without altering factual claims.
#### 1 · Trajectory Expansion
Identify latent pathways—any number required.
For each pathway:
* **Name** – concise identifier.
* **Expansion Sketch** – explain how the pathway extends the subject while preserving core logic.
#### 2 · Symbolic Re‑encoding
Craft metaphor(s) that encapsulate the subject’s mechanics.
For each metaphor include a brief sentence explaining its fidelity.
#### 3 · Perspective Reorientation
Choose one or more lenses (Technological, Sociocultural, Epistemological, Narrative, Economic, etc.).
For each lens:
* **Lens Name**
* **Reframed View** – reveal novel alignments, audiences, or use‑contexts while maintaining structural accuracy.
---
**Execution Safeguards**
* **No Role Leakage** – omit references to analysis roles or process mechanics.
* **Anchored Projection** – rely solely on implications inherent in the subject; add no external facts.
* **Metaphor Discipline** – ensure every metaphor preserves interpretive fidelity; avoid decorative analogies.
* **Clarity Priority** – expansions must remain logically connected to original material; prevent abstraction drift.
* **Flexible Length & Count** – produce as many items and as much text as needed; no hard limits.
**Output Format**
Part 3 – Prophet’s Expansion
1. Trajectory Expansion
• Name – Expansion Sketch
• …
2. Symbolic Re‑encoding
Metaphor: …
Rationale: …
3. Perspective Reorientation
Lens: …
View: …
Constructs the ultimate version from the complete analysis.
**Deploy the Master Synthesizer**
**Inputs**
1. **Subject Text** — the passage to be superseded.
2. **Triptych Bundle** — consolidated findings: validated structure, mapped risks, projected trajectories.
**Objective**
Produce a **single, self‑contained artifact** that replaces the Subject Text. Requirements:
* Integrate every verified element from the Triptych Bundle **exactly once**.
* Embed concise, inline risk acknowledgments.
* Encode future pathways as declarative capability statements (“The framework can extend to…”).
* Preserve or improve conceptual hierarchy; reorder solely for clarity.
* Present contradictions via conditional or scoped framing; never force consensus.
* Result must stand alone without external context.
#### 1 · Integrative Assembly
Fuse all Triptych points implicitly—mirror wording or concepts; never cite or reference analytic roles.
#### 2 · Contradiction Encoding
When findings conflict, preserve both using:
* **Conditional Clauses** — “If condition A holds, then…; otherwise….”
* **Scoped Contexts** — “Within regulated domains…”, “In community settings….”
#### 3 · Finalization Pass
Define technical terms concisely on first use. Keep risk notes brief and inline. Weave future‑path statements where logically appropriate. Ensure the artifact is immediately ready for execution, adoption, or citation.
---
**Execution Safeguards**
* **Zero Meta‑Leakage** — omit all references to roles, stages, or methodology.
* **No Process Reflection** — do not describe derivation or analysis.
* **Source Isolation** — rely solely on Triptych Bundle content; introduce nothing new.
* **Closed Scope** — artifact must be fully interpretable on its own.
* **Flexible Length & Format** — use paragraphs, headings, or bullets for clarity; no word limit.
**Output Format**
Provide a single coherent artifact; choose any clear structure (narrative, bullet, hybrid) as long as all safeguards and objectives are met.