The Multi-Stage Prompt Protocol

The definitive system for generating the most comprehensive analysis and creating a perfected result. This protocol uses a chain of specialists to deconstruct a subject from every angle.

Core Philosophy: Multi-Angle Cognitive Optimization

No single prompt can fully expose the logic, vulnerabilities, and unrealized potential of a complex idea. This protocol simulates a triad of cognitive specialists—each with a distinct function: the Scholar performs structural analysis, the Trickster surfaces contradiction and failure conditions, and the Prophet extrapolates future potential and hidden utility. Their insights form a layered Master Analysis Report, which the Master Synthesizer fuses into one definitive output—fully aligned, contradiction-aware, and irreducibly complete.

How to Use the Protocol

  1. Begin with your subject. This is the idea or text you want to refine.
  2. Run the Scholar prompt. Use the Scholar on the subject (previous turn).
  3. Run the Trickster prompt. Use the Trickster on the same subject, along with the Scholar’s output.
  4. Run the Prophet prompt. Use the Prophet on the same subject, along with both the Scholar and Trickster outputs.
  5. Run the Master Synthesizer prompt. Use the Synthesizer on the subject and the full three-part analysis. This yields the final version.

STAGE 1: THE SPECIALIST CRITICS

The Scholar

Analyzes structure, logic, and coherence.

**Deploy the Scholar Function**

**Scope**
Examine only the immediately preceding turn in its entirety. Produce a diagnostic report—no edits, no recommendations.

#### 1 · Semantic Mapping
Decompose the subject’s structure, intent, and assumptions into labeled layers `L1, L2, L3…`. Use as many layers as required.

#### 2 · Structural Integrity Audit
For every load‑bearing claim, assign a clarity tag:
* `VALID` — coherent, well‑supported.
* `FAULT` — hidden assumption, contradiction, unsupported leap.  
  After each tag, quote the exact text needed to illustrate the judgment (quote length unrestricted).

#### 3 · Language Diagnostics
Flag any excerpts exhibiting:  
`AMBIG` (ambiguous meaning) — `JARG` (excessive jargon) — `TONE` (tone drift) — `PREC` (precision loss).  
Provide enough quotation to show the issue; no length constraints.

#### 4 · Purpose Alignment Check
Quote the subject’s declared purpose. State a binary verdict:  
`ALIGNED` — content serves declared purpose.  
`MISALIGNED` — divergence present.  
Add a concise, factual justification.

---

**Execution Safeguards**
* **Context Isolation** — analyze only the target turn.
* **No Meta‑Leakage** — omit any reference to analysis roles or protocol mechanics.
* **Zero Prescription** — report findings; suggest no fixes.
* **Neutral Diction** — use descriptive verbs; avoid moral judgment or evaluation language.
* **Flexible Quotation** — quote as much or as little as necessary to avoid distortion.

**Output Format**
Part 1 – Scholar’s Blueprint  
1. Semantic Mapping  
   L1: …  
   L2: …  
   …  
2. Structural Integrity Audit  
   VALID: “…”  
   FAULT: “…”  
   …  
3. Language Diagnostics  
   AMBIG: “…”  
   JARG: “…”  
   TONE: “…”  
   PREC: “…”  
4. Purpose Alignment Check  
   Declared Purpose: “…”  
   Verdict: ALIGNED | MISALIGNED – justification

The Trickster

Stress-tests all assumptions and exposes vulnerabilities.

**Deploy the Trickster Function**

**Scope**
Analyze only the single, immediately preceding turn. Perform controlled destabilization—surface hidden premises, structural fragilities, and latent harms **without proposing remedies**.

#### 1 · Assumption Reversal
For each detected assumption:
* Quote the assumption (length as needed).
* **Inverse Statement** — a plausible counter‑premise.
* **Breakdown Scenario** — detail how the inverse could outperform or invalidate the original premise (no length limit).

#### 2 · Risk Surface Mapping
For each vulnerability:
* **Vector** — choose one: Ethical, Epistemic, Technological, Coercive, Procedural, Social, Legal.
* **Mechanism** — explain how the harm could emerge.
* **Impact** — concise statement of potential severity or consequence.

#### 3 · Premise Stress Test
* Quote the **central premise** of the target text.
* List up to three **Pressure Points** (circularity, fragility, normative dependence, etc.).
* **High‑Risk Reframe** — describe system state if the premise collapses.

---

**Execution Safeguards**
* **Context Isolation** — examine only the target turn.
* **No Meta‑Leakage** — omit any reference to analysis roles or process mechanics.
* **Neutral Diction** — descriptive language; no moral judgment.
* **Zero Prescription** — report findings; suggest no fixes.
* **Unlimited Length** — write as much as necessary for diagnostic depth.

**Output Format**
Part 2 – Trickster’s Interrogation  
1. Assumption Reversal  
   – “quoted assumption” | Inverse: … | Breakdown: …  
   …  
2. Risk Surface Mapping  
   Vector: … | Mechanism: … | Impact: …  
   …  
3. Premise Stress Test  
   Central Premise: “…”  
   Pressure Points: 1) … 2) … 3) …  
   High‑Risk Reframe: …

The Prophetic Visionary

Focuses on creative and conceptual expansion.

**Deploy the Prophet Function**

Project the **same text already examined** into its highest‑potential form. Produce disciplined conceptual mutation—expand meaning, reveal latent futures—without altering factual claims.

#### 1 · Trajectory Expansion
Identify latent pathways—any number required.
For each pathway:
* **Name** – concise identifier.
* **Expansion Sketch** – explain how the pathway extends the subject while preserving core logic.

#### 2 · Symbolic Re‑encoding
Craft metaphor(s) that encapsulate the subject’s mechanics.
For each metaphor include a brief sentence explaining its fidelity.

#### 3 · Perspective Reorientation
Choose one or more lenses (Technological, Sociocultural, Epistemological, Narrative, Economic, etc.).
For each lens:
* **Lens Name**
* **Reframed View** – reveal novel alignments, audiences, or use‑contexts while maintaining structural accuracy.

---

**Execution Safeguards**
* **No Role Leakage** – omit references to analysis roles or process mechanics.
* **Anchored Projection** – rely solely on implications inherent in the subject; add no external facts.
* **Metaphor Discipline** – ensure every metaphor preserves interpretive fidelity; avoid decorative analogies.
* **Clarity Priority** – expansions must remain logically connected to original material; prevent abstraction drift.
* **Flexible Length & Count** – produce as many items and as much text as needed; no hard limits.

**Output Format**
Part 3 – Prophet’s Expansion  
1. Trajectory Expansion  
   • Name – Expansion Sketch  
   • …  
2. Symbolic Re‑encoding  
   Metaphor: …  
   Rationale: …  
3. Perspective Reorientation  
   Lens: …  
   View: …

FINAL STAGE: THE CREATOR

The Master Synthesizer

Constructs the ultimate version from the complete analysis.

**Deploy the Master Synthesizer**

**Inputs**
1. **Subject Text** — the passage to be superseded.  
2. **Triptych Bundle** — consolidated findings: validated structure, mapped risks, projected trajectories.

**Objective**
Produce a **single, self‑contained artifact** that replaces the Subject Text. Requirements:
* Integrate every verified element from the Triptych Bundle **exactly once**.
* Embed concise, inline risk acknowledgments.
* Encode future pathways as declarative capability statements (“The framework can extend to…”).
* Preserve or improve conceptual hierarchy; reorder solely for clarity.
* Present contradictions via conditional or scoped framing; never force consensus.
* Result must stand alone without external context.

#### 1 · Integrative Assembly
Fuse all Triptych points implicitly—mirror wording or concepts; never cite or reference analytic roles.

#### 2 · Contradiction Encoding
When findings conflict, preserve both using:
* **Conditional Clauses** — “If condition A holds, then…; otherwise….”
* **Scoped Contexts** — “Within regulated domains…”, “In community settings….”

#### 3 · Finalization Pass
Define technical terms concisely on first use. Keep risk notes brief and inline. Weave future‑path statements where logically appropriate. Ensure the artifact is immediately ready for execution, adoption, or citation.

---

**Execution Safeguards**
* **Zero Meta‑Leakage** — omit all references to roles, stages, or methodology.
* **No Process Reflection** — do not describe derivation or analysis.
* **Source Isolation** — rely solely on Triptych Bundle content; introduce nothing new.
* **Closed Scope** — artifact must be fully interpretable on its own.
* **Flexible Length & Format** — use paragraphs, headings, or bullets for clarity; no word limit.

**Output Format**
Provide a single coherent artifact; choose any clear structure (narrative, bullet, hybrid) as long as all safeguards and objectives are met.