Reciprocity Strategy Designer

v1.0.0

Design reciprocity-based persuasion strategies and detect when reciprocity is being used against you. Use this skill when planning give and take strategies,...

0· 77·0 current·0 all-time
byHung Quoc To@quochungto

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for quochungto/bookforge-reciprocity-strategy-designer.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Reciprocity Strategy Designer" (quochungto/bookforge-reciprocity-strategy-designer) from ClawHub.
Skill page: https://clawhub.ai/quochungto/bookforge-reciprocity-strategy-designer
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install bookforge-reciprocity-strategy-designer

ClawHub CLI

Package manager switcher

npx clawhub@latest install bookforge-reciprocity-strategy-designer
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (designing reciprocity strategies and defenses) matches the SKILL.md and reference materials. No unrelated credentials, binaries, or install steps are requested.
Instruction Scope
SKILL.md confines runtime behavior to reading the provided scenario/documents and producing strategy or defense recommendations; it does not instruct the agent to read arbitrary system files, access environment variables, or send data to external endpoints.
Install Mechanism
No install spec or code files are present (instruction-only). Nothing is downloaded or written to disk by the skill itself.
Credentials
The skill requests no environment variables, credentials, or config paths. The required tools (Read, Write) align with its stated need to consume input documents and produce outputs.
Persistence & Privilege
always is false and the skill is user-invocable. It does allow normal autonomous invocation by the agent (platform default) but that is not combined with other privilege or credential requests.
Assessment
This skill is coherent with its stated purpose and does not request sensitive credentials or perform installs. However, it explicitly teaches persuasion techniques (and how to resist them) — those same tactics can be used manipulatively. Before installing or enabling autonomous invocation, consider: (1) your ethical and legal constraints around persuasive messaging in your domain; (2) whether you want the agent to act autonomously on the strategies it generates or only propose them for human review; and (3) adding usage guardrails (human-in-the-loop approvals, content review steps) if you plan to deploy outputs publicly or in outreach campaigns.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

📚 Clawdis
bookforgevk97978kjjk6t6x86tjp5k89fhs84vrnqdoor-in-the-facevk97978kjjk6t6x86tjp5k89fhs84vrnqinfluencevk97978kjjk6t6x86tjp5k89fhs84vrnqlatestvk97978kjjk6t6x86tjp5k89fhs84vrnqlead-magnetvk97978kjjk6t6x86tjp5k89fhs84vrnqmarketingvk97978kjjk6t6x86tjp5k89fhs84vrnqnegotiationvk97978kjjk6t6x86tjp5k89fhs84vrnqpersuasionvk97978kjjk6t6x86tjp5k89fhs84vrnqreciprocityvk97978kjjk6t6x86tjp5k89fhs84vrnqsalesvk97978kjjk6t6x86tjp5k89fhs84vrnq
77downloads
0stars
1versions
Updated 2w ago
v1.0.0
MIT-0

Reciprocity Strategy Designer

When to Use

You are planning how to influence someone's decision, build compliance, or defend against unwanted influence. Typical triggers:

  • Designing a content marketing, lead magnet, or free trial offer
  • Writing a cold email or outreach sequence that leads with value
  • Planning a negotiation opening position
  • Building a sales sequence that uses concessions
  • Receiving an unsolicited gift or favor before a pitch — and wondering how to respond
  • Detecting a pattern where gifts precede requests in a pitch you are receiving

Before starting, identify:

  • What outcome do you want? (A specific commitment, a sale, an agreement, a behavior change)
  • Who is the target? (Individual, group, existing relationship or cold contact)
  • What mode applies? Application (you are designing a strategy) or Defense (you are detecting and resisting)

Context

Required Context

  • The persuasion goal: what specific action or agreement do you want
  • The target profile: who they are and what they value
  • The relationship stage: cold contact, warm prospect, established relationship, or adversarial negotiation

Observable Context

Read the provided document or scenario for:

  • Existing campaign structure, offer assets, or sales sequence drafts
  • Any prior favors or gifts already in play
  • The gap between what you currently get and what you want (baseline compliance)

Default Assumptions

  • If no target profile given → assume a cold or low-trust contact (most demanding scenario)
  • If no mode specified → run both Application and Defense assessments
  • If no existing assets → design from scratch

Process

Step 1: Identify the Goal and Baseline

ACTION: State what specific action or agreement you want, and estimate baseline compliance (would the target agree without any reciprocity strategy?).

WHY: Reciprocity strategies are most valuable when baseline compliance is low. If the target would likely agree anyway, reciprocity may be unnecessary. If baseline is near zero, only gift reciprocation with genuine value will move the needle. If baseline is moderate, concession reciprocation may triple compliance (17% → 50% in controlled studies). Knowing your baseline determines which sub-type to use and how large a "gift" or "opening request" is needed.


Step 2: Choose the Reciprocity Sub-Type

ACTION: Decide whether to use gift reciprocation, concession reciprocation, or both.

WHY: These are mechanically different. Gift reciprocation works by creating obligation through a prior benefit — the target feels they owe something before any request is made. Concession reciprocation works by framing your actual request as a retreat from a larger one — the target experiences your real ask as a relief and a concession they should match. Mixing both (a gift followed by a retreat request) compounds the effect but requires careful calibration.

Sub-typeUse whenMechanismRisk
Gift reciprocationCold outreach, marketing, relationship-building, low-trust contextsPrior benefit creates obligationSeen as cheap manipulation if transparent
Concession reciprocationNegotiation, direct sales, any context with a known askRetreat triggers reciprocal concessionBackfires if opening request seems illegitimate

Step 3A: Design Gift Reciprocation

Skip to Step 3B if using concession reciprocation only.

ACTION: Design the initial value offering. Specify: what you will give, when, in what form, and how it relates to the eventual ask.

WHY: The gift must provide genuine value to create genuine obligation. Transparent manipulation — a token gift with no real benefit — is recognized and rejected, especially by experienced targets. The gift should be calibrated to the ask: a large request requires a meaningful gift; a small ask can be unlocked by a modest unsolicited favor.

Design checklist:

  1. What do you give?

    • Marketing: educational content, free audit, free tool, free sample, insider information
    • Sales: free trial, free consultation, free product sample, referrals, early access
    • Negotiation: useful information, a favor in advance, a concession on a secondary issue
  2. Uninvited > invited. Do not ask permission to give the gift — deliver it. Unsolicited gifts create stronger obligation than gifts that were requested. (Disabled American Veterans: unsolicited address labels doubled response rate vs. letter alone.)

  3. Personalize. Generic gifts create weak obligation. Personalized gifts — addressing a specific need of this specific person — create stronger obligation. The closer the gift matches what the target actually values, the stronger the felt debt.

  4. Calibrate size to the ask. A small gift can generate a disproportionately large return (a $0.10 Coke generated $0.50 in ticket sales — 500% return). You do not need a large gift for a moderate ask. However, the gift must be genuinely useful, not merely symbolic.

  5. Control the follow-up timing. Make the request after the gift is received and acknowledged, not simultaneously. The obligation needs time to register.


Step 3B: Design Concession Reciprocation (Door-in-the-Face)

Skip to Step 4 if using gift reciprocation only.

ACTION: Design the large initial request, the retreat sequence, and the actual target request.

WHY: The rejection-then-retreat technique works because when you retreat from a large request to a smaller one, the target perceives your retreat as a concession. The reciprocity rule triggers an obligation to make a return concession — compliance with your real request. Additionally, the contrast principle makes the real request appear smaller than if you had asked for it directly. Both forces push toward compliance simultaneously.

Design sequence:

  1. Define your actual request (the outcome you want). This is your anchor.

  2. Design the large initial request. It must be:

    • Clearly larger than your actual request (the target must refuse it)
    • Not so extreme as to appear illegitimate or in bad faith — this triggers backfire (Bar-Ilan research confirms: first demand must be seen as plausible, not outlandish)
    • In the same category as your real request (a retreat from asking for 2 years of volunteering to asking for one day is coherent; a retreat from "buy my $10,000 consulting package" to "buy my $5 ebook" is not)
  3. Make the large request first. Pause. Accept the refusal without argument.

  4. Retreat visibly. Frame the retreat as a genuine concession: "I understand. What if we started with just [smaller request] instead?" The target must perceive the retreat as voluntary on your part.

  5. Note the compliance target: Compliance rates with the real request roughly triple when preceded by rejection-then-retreat (17% → 50% in zoo study). Follow-through rate also nearly doubles (50% → 85%).

Critical constraint: If your opening request is so extreme that the target does not believe you were genuinely making it, the tactic backfires. The truly gifted negotiator finds an opening position that is "exaggerated enough to allow for a series of reciprocal concessions that will yield a desirable final offer from the opponent, yet not so outlandish as to be seen as illegitimate."


Step 4: Check Amplifier Conditions

ACTION: Review the following conditions that amplify or reduce reciprocity force. Adjust your design accordingly.

WHY: The same reciprocity strategy will produce different compliance rates depending on context. These amplifiers are documented mechanisms, not guesses.

ConditionEffectAction
Gift is uninvitedStronger obligation (target cannot opt out of receiving)Do not ask permission; deliver the gift
Gift is personalizedStronger obligation (perceived higher value, more thoughtful)Customize to target's specific situation
Gift is preceded by clear refusal of the returnWeakens obligationRemove any explicit "I expect nothing in return" framing
Opening request is plausibleConcession reciprocity worksCalibrate the large ask to the upper range of credibility
Target has high awareness of influence tacticsWeakens effect (conscious recognition dampens automaticity)Increase genuine value; reduce transparency of the sequence
Existing relationshipEither amplifies (more trust in the gift) or reduces (felt obligation already high)Assess prior favor balance before adding more
Third-party witnessAmplifies follow-throughMake the agreement in front of others when possible

Step 5: Evaluate Ethical Boundaries

ACTION: Assess whether your strategy provides genuine value or only simulates it to extract compliance.

WHY: Reciprocity strategies that deliver real value are ethically sound and build lasting relationships. Strategies that use fake or trivial gifts purely to manufacture obligation are manipulation — they exploit a social rule that exists to promote genuine exchange. Beyond ethics, exploitation is also strategically weak: once detected, it destroys trust, the target resists all future requests, and negative word-of-mouth spreads. The rule's social power is borrowed from a legitimate system; abusing it erodes both the relationship and your reputation.

Ethical checklist:

  • Does the gift provide genuine, standalone value to the target (independent of whether they comply with your request)?
  • Would you offer this gift if you had no subsequent request to make?
  • Does your large opening request in rejection-then-retreat represent a real position you would accept?
  • Are you concealing material information that would affect the target's decision?

If any answer is "no," redesign to increase genuine value — or reconsider whether this is the right persuasion approach.


Step 6 (Defense): Detect and Resist Reciprocity Exploitation

ACTION: Identify whether reciprocity is being used against you. Apply the reframe.

WHY: The reciprocity rule is powerful precisely because it operates automatically — it activates before conscious analysis. The defense is not to refuse all gifts (that produces social friction and misses genuine generosity) but to correctly classify what you receive. Once you recognize a "gift" as a compliance device rather than a genuine favor, the rule no longer applies — it says favors should be met with favors, not tricks.

Detection signals — gift reciprocation being used against you:

  • An unsolicited gift arrives immediately before or during a sales interaction
  • The gift is pressed on you when you attempt to refuse it ("No, it's our gift to you, sir")
  • The gift is trivial relative to the subsequent ask
  • The gift-giver has a clear commercial interest in your compliance
  • The pattern repeats: gift → request, gift → request

Detection signals — concession reciprocation being used against you:

  • An extreme initial offer precedes a "concession" to what they actually wanted
  • You feel relieved when they retreat, and grateful
  • The final request is larger than you would have agreed to if asked directly
  • You feel responsible for having gotten them to concede

The reframe: Once you identify a gift or concession as a compliance tactic, mentally redefine it: "This is a sales device, not a favor." The reciprocity rule now has no claim on you. You may accept the gift (the fire extinguisher, the free inspection, the flower) and decline the request — without guilt or felt obligation.

If you identify a concession as manufactured rather than genuine, define the retreat as a compliance tactic, not a real concession. No obligation to reciprocate arises from a tactic.

Optional counter-move: Once you have accepted their gifts under the new definition (as exploitation attempts, not gifts), you are free to accept what they offer and decline their ask entirely. The reciprocity rule itself supports this: exploitation attempts should be exploited in return.


Outputs

For application mode, produce a Reciprocity Strategy Plan:

## Reciprocity Strategy Plan

**Goal:** [Specific outcome sought]
**Target:** [Who and what they value]
**Sub-type:** Gift reciprocation / Concession reciprocation / Both

### Gift Design (if applicable)
- Gift: [What you offer]
- Delivery method: [Invited or uninvited, personalization approach]
- Timing: [When relative to request]
- Estimated obligation created: [Low/Medium/High, why]

### Concession Sequence (if applicable)
- Large opening request: [What you ask first]
- Legitimacy check: [Why target will view this as genuine, not outrageous]
- Retreat: [What you retreat to — your actual ask]
- Framing language: ["I understand. What if we started with just..."]

### Amplifier Assessment
- [Condition]: [Present/Absent] → [Adjustment made]

### Ethical Assessment
- [Genuine value check result]
- [Any redesign needed]

### Expected Compliance Uplift
- Baseline: [%]
- With strategy: [% range based on comparable evidence]

For defense mode, produce a Reciprocity Defense Assessment:

## Reciprocity Defense Assessment

**Scenario:** [What you received and from whom]
**Sub-type detected:** Gift reciprocation / Concession reciprocation / Both

### Detection Evidence
- [Signal 1]
- [Signal 2]

### Classification
- Genuine favor: Yes / No
- Compliance device: Yes / No / Uncertain

### Recommended Response
- [Accept or decline the gift/concession]
- [Reframe in effect: Yes/No]
- [Obligation to comply: Yes/No]
- [Optional counter-move if exploitation confirmed]

Examples

Example 1: Marketing Lead Magnet Strategy

Scenario: A B2B software company wants to convert cold website visitors into demo requests. Current conversion: 3%.

Trigger: "We need more demo bookings. Should we add a lead magnet?"

Process:

  • Goal: demo booking (a 30-minute commitment, moderate ask for a cold visitor)
  • Baseline: 3% — very low, cold contact scenario
  • Sub-type: gift reciprocation (cold context, no prior relationship to leverage for concession reciprocation)
  • Gift design: a free industry benchmark report (genuine standalone value — visitors would read it even if no demo existed), personalized by company size via a brief survey, delivered without asking permission ("Download free — no email required" → captures email after value is consumed)
  • Amplifier: uninvited delivery method (no opt-in gate), personalized by segment
  • Follow-up: email sequence references the specific data the visitor consumed → request for demo framed as "see how your numbers compare to the benchmark live"
  • Ethical check: the report provides genuine value independently; company would publish it even without the lead generation goal

Output: Lead magnet strategy doc with gift design, delivery sequence, and expected lift to 8–12% conversion.


Example 2: Negotiation Opening — Salary or Contract

Scenario: A freelancer is negotiating a project rate. Their target is $8,000. The client's typical budget is $5,000–$6,000.

Trigger: "How should I open my rate negotiation?"

Process:

  • Goal: $8,000 agreement
  • Baseline: ~20% chance of $8,000 if asked directly (client may balk)
  • Sub-type: concession reciprocation
  • Large opening request: $12,000 (premium package including two rounds of revisions, a strategy session, and a 30-day post-launch support period — genuine, not fictitious)
  • Legitimacy check: $12,000 is above market for a standalone project but plausible for the full-scope version; client may well refuse but will not find the number absurd
  • Retreat: after client expresses hesitation, offer to strip the post-launch support to reach $8,000 — "I understand. If we remove the 30-day support retainer, I can bring this to $8,000."
  • By-products: client feels they negotiated successfully (responsibility), feels satisfied with the outcome (satisfaction) → more likely to follow through and refer

Expected effect: Retreat from $12,000 to $8,000 makes $8,000 appear like the client's win. Compliance with real target significantly more likely than direct ask.


Example 3: Sales Email Sequence — Value-First Outreach

Scenario: A sales team sends cold outreach emails. Current reply rate: 4%.

Trigger: "Help us write a cold email sequence that actually gets responses."

Process:

  • Goal: discovery call booking
  • Sub-type: gift reciprocation (cold email, no prior relationship)
  • Email 1: deliver a specific, personalized insight about the prospect's company (a genuine observation about their positioning, a public data point they may have missed) — no ask, just value
  • Email 2 (3 days later): build on the insight, offer a second useful observation — still no ask
  • Email 3 (5 days later): make the request ("I've shared a couple of observations about [Company]. Would 20 minutes to walk through what I'm seeing be useful?")
  • Personalization: each email references something specific to the prospect's company/role — not a template
  • Amplifier: genuinely useful insights (not flattery) delivered before any ask — the sequence feels like receiving, not being pitched

Defense note embedded in sequence design: Avoid the trap of fake "value" emails that are obviously just preamble to a pitch. Prospects recognize the pattern and classify it as a manipulation tactic, neutralizing the reciprocity effect entirely. The insight in Email 1 must be something the prospect would genuinely appreciate independent of any subsequent ask.


Key Principles

  • Uninvited creates stronger obligation than invited. Do not ask permission to give; deliver genuine value. The target's inability to opt out of receiving is a feature of the rule, not an ethical violation — provided the gift is genuinely valuable.

  • The retreat must look real. Concession reciprocation only works when the target believes the opening request was genuine. If it looks like a theatrical setup, the rule is not engaged and the tactic backfires.

  • Both mechanisms fire simultaneously in rejection-then-retreat. The reciprocity rule (retreat = concession, triggers obligation to concede) and the contrast principle (smaller request appears smaller after larger one) compound each other. This is the most structurally powerful compliance technique documented.

  • Responsibility and satisfaction are the by-products. Targets of successful rejection-then-retreat feel they influenced the outcome AND feel more satisfied than targets of direct requests — even though they paid more or agreed to more. These by-products increase follow-through and repeat engagement.

  • The defense is classification, not refusal. Blanket refusal of all gifts produces social friction and misses genuine generosity. The correct defense is accurate identification: genuine favor → accept and reciprocate normally; compliance device → redefine as a sales tactic → no obligation applies.

  • Genuine value is both ethical and strategic. Transparent manipulation is recognized by experienced targets and destroys trust permanently. Genuine value creates real obligation, builds reputation, and generates the satisfaction and responsibility by-products that produce follow-through.

References

License

This skill is licensed under CC-BY-SA-4.0. Source: BookForge — Influence: The Psychology of Persuasion by Robert B. Cialdini.

Related BookForge Skills

This skill is standalone. Browse more BookForge skills: bookforge-skills

Comments

Loading comments...