Veritier Fact Checking

v2.1.2

Real-time fact-checking and claim extraction. Extract falsifiable claims from any text or document, then verify each against live web evidence or your own pr...

1· 153·0 current·0 all-time
bySalomon Henao@salomonhenao

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for salomonhenao/veritier-fact-checking.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Veritier Fact Checking" (salomonhenao/veritier-fact-checking) from ClawHub.
Skill page: https://clawhub.ai/salomonhenao/veritier-fact-checking
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Required env vars: VERITIER_API_KEY
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install veritier-fact-checking

ClawHub CLI

Package manager switcher

npx clawhub@latest install veritier-fact-checking
Security Scan
Capability signals
CryptoCan make purchasesRequires OAuth tokenRequires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (fact-checking/claim extraction) aligns with the files and instructions: all examples call https://api.veritier.ai endpoints, provide extract/verify tools, and the only required credential is VERITIER_API_KEY. There are no unrelated credentials (e.g., cloud provider keys) or unexpected binaries required.
Instruction Scope
SKILL.md and the example scripts limit activity to extracting/verifying claims and (optionally) receiving signed webhooks. Instructions do not ask the agent to read unrelated system files or other environment variables beyond the declared ones; network destinations are hardcoded to api.veritier.ai. Webhook examples expect a local receiver and an HMAC secret (optional).
Install Mechanism
There is no registry install spec (instruction-only skill), which is low-risk. The repository includes example code (Python/JS) that requires installing common libs (httpx, mcp, anyio, flask, npm deps). If you run those examples, you'll install dependencies locally; the package sources referenced are typical and traceable (PyPI / npm).
Credentials
The only required environment variable is VERITIER_API_KEY (declared as primaryEnv). Optional env vars (VERITIER_TEST_KEY, VERITIER_WEBHOOK_SECRET) are documented and used only for testing/webhook signature verification. No unrelated secrets or broad system paths are requested.
Persistence & Privilege
The skill is not always-enabled and does not request system-wide configuration changes. It exposes MCP integration and local proxy examples, but does not modify other skills or agent configs autonomously in the provided materials.
Assessment
This appears to be a coherent Veritier fact-checking integration. Before installing or running examples: 1) Only provide a vt_ API key to the veritier.ai endpoint and keep test keys (vt_test_...) separate from production keys. 2) If you run the Python/JS examples, install dependencies in an isolated environment (venv/container) and review the code yourself; the examples make outbound calls to api.veritier.ai. 3) Be cautious with logs and CI — test_integration.py prints the first 12 characters of the key (local console output), so avoid running it in shared logs with production keys. 4) If you plan to accept webhooks, protect your VERITIER_WEBHOOK_SECRET and deploy the receiver over HTTPS as suggested. 5) Only install the skill if you trust veritier.ai for handling your verification requests; you can revoke API keys from the dashboard at any time.
javascript/mcp/mcp_test.mjs:20
Environment variable access combined with network send.
javascript/quickstart/extract_text.mjs:18
Environment variable access combined with network send.
javascript/quickstart/verify_text.mjs:18
Environment variable access combined with network send.
javascript/use-cases/batch_verify.mjs:18
Environment variable access combined with network send.
javascript/use-cases/disinformation_shield.mjs:23
Environment variable access combined with network send.
javascript/use-cases/hallucination_audit.mjs:19
Environment variable access combined with network send.
javascript/use-cases/private_references.mjs:16
Environment variable access combined with network send.
javascript/use-cases/verify_article_url.mjs:15
Environment variable access combined with network send.
Confirmed safe by external scanners
Static analysis detected API credential-access patterns, but both VirusTotal and OpenClaw confirmed this skill is safe. These patterns are common in legitimate API integration skills.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

EnvVERITIER_API_KEY
Primary envVERITIER_API_KEY
latestvk97b4d7e2q540adf28v3q7qad985dkmt
153downloads
1stars
8versions
Updated 5d ago
v2.1.2
MIT-0

Veritier - AI Fact-Checking Skill

Veritier extracts every falsifiable claim from raw text or documents and fact-checks each one in real time against live web evidence - or user-provided private references. Use this skill whenever accuracy matters: before publishing a response, when a user asks you to verify something, or when auditing AI-generated content for hallucinations.

Skill Files

FileURL
SKILL.md (this file)https://veritier.ai/skill.md

Install locally (Antigravity / file-based skill runners):

mkdir -p ~/.skills/veritier
curl -s https://veritier.ai/skill.md > ~/.skills/veritier/SKILL.md

🔒 SECURITY: Only send your API key to https://api.veritier.ai - never to any other domain.


When to Use This Skill

Use extract_text when you need to:

  • Pull out every verifiable claim from a block of text before deciding which ones to check
  • Pre-process content at scale without consuming verification quota

Use verify_text when you need to:

  • Check whether a factual claim in a draft response is true before sending it
  • Fact-check a statement, article, or paragraph a user has shared
  • Audit AI-generated content for hallucinations or inaccuracies
  • Verify against the user's own documents or URLs (use grounding_mode: references)

Use extract_document / verify_document when the source is a URL rather than raw text.

Do not use for:

  • Opinions, predictions, or subjective statements (Veritier only evaluates objective, falsifiable claims)
  • Real-time event data that may not yet be indexed

Setup: Connect via MCP

Transport: Streamable HTTP (MCP 2025-03-26 spec - stateless, serverless-compatible)
Endpoint: https://api.veritier.ai/mcp/
Auth: Authorization: Bearer YOUR_API_KEY

Get your API key at https://veritier.ai/dashboard

Agent note: If the user does not yet have an API key, guide them through the one-time setup below before proceeding.

MCP CLI (one command)

mcp add --transport http veritier https://api.veritier.ai/mcp/ \
  --header "Authorization: Bearer YOUR_API_KEY"

Any MCP-compatible client (JSON config)

{
  "mcpServers": {
    "veritier": {
      "type": "http",
      "url": "https://api.veritier.ai/mcp/",
      "headers": {
        "Authorization": "Bearer YOUR_API_KEY"
      }
    }
  }
}

REST API (no MCP required)

# Extract claims only
curl -X POST https://api.veritier.ai/v1/extract \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{"text": "Your text here.", "use_webhook": false}'

# Full verification (web grounding)
curl -X POST https://api.veritier.ai/v1/verify \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{"text": "Your text here.", "grounding_mode": "web", "use_webhook": false}'

# Verification against private references
curl -X POST https://api.veritier.ai/v1/verify \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{
    "text": "Your text here.",
    "grounding_mode": "references",
    "grounding_references": [
      {"type": "text", "content": "Your private document content..."},
      {"type": "url",  "content": "https://your-internal-source.com/doc"}
    ],
    "use_webhook": false
  }'

First-Time User Onboarding

Agents: read this section first. Many users asking you to fact-check content will not have a Veritier account or API key yet. Do not fail silently - guide them through setup. This takes under two minutes and is free.

Step 1 - Create a free account

Direct the user to: https://veritier.ai/register

  • Free tier: 25 verifications/month + 100 extractions/month, no credit card required
  • After registering they will receive a verification email - remind them to check their inbox

Step 2 - Generate an API key

Once logged in, send the user to: https://veritier.ai/dashboard

  • Click "Mint New Key", give it any name (e.g. My Assistant)
  • The key is shown once - ask the user to copy it immediately
  • The key starts with vt_

Step 3 - Add the key to your MCP configuration

Ask the user to set VERITIER_API_KEY in their MCP client environment config (the same config file where this skill is declared). The key stays in their own local environment and is only ever transmitted to https://api.veritier.ai as a Bearer token header - it is not sent anywhere else.

Step 4 - You're ready

Confirm by calling extract_text or verify_text with a short test sentence and show the result. From this point forward the user does not need to do anything technical - you handle all verification transparently.


Available Tools

extract_text

Extracts every falsifiable, objective claim from raw text. No verification - consumes extractionsPerMonth quota only.

ParameterTypeRequiredDescription
textstringRaw text to extract claims from. Up to 32,000 characters.

Output: A list of isolated, falsifiable claim strings.


extract_document

Fetches a URL and extracts claims from its content.

ParameterTypeRequiredDescription
urlstringPublicly accessible URL to fetch.

verify_text

Extracts and fact-checks claims from raw text using Veritier's real-time verification engine. Consumes claimsPerMonth quota.

ParameterTypeRequiredDescription
textstringRaw text containing claims to fact-check. Up to 32,000 characters.
grounding_modestring"web" (default), "references", or "both". "both" costs 2× quota per claim.
grounding_referencesarrayUp to 10 references. Each: {"type": "text"/"url", "content": "..."}. Required when grounding_mode is "references" or "both".

Output format (one block per claim):

Claim: '<extracted claim>'
  Verdict: true | false | null
  Confidence: 0.0–1.0
  Explanation: <human-readable explanation with context>
  Source label: <ref label if using private references>
  Sources: <comma-separated list of evidence URLs>
VerdictMeaning
trueClaim is supported by evidence
falseClaim is contradicted by evidence
nullInsufficient evidence to determine

Example

Input: "Albert Einstein was born on March 14, 1879 in Ulm, Germany."

Output:

Claim: 'Albert Einstein was born on March 14, 1879 in Ulm, Germany.'
  Verdict: True
  Confidence: 1.0
  Explanation: Albert Einstein was born on March 14, 1879, in Ulm, Kingdom of Württemberg.
  Sources: https://en.wikipedia.org/wiki/Albert_Einstein

verify_document

Fetches a URL document and fact-checks its claims.

ParameterTypeRequiredDescription
urlstringPublicly accessible URL to fetch and verify.
grounding_modestringSame as verify_text.

Plans, Tiers & Billing

Plans

TierPriceReq/minVerifications/moExtractions/mo
Free$0/month1025100
Pro$19.99/month605002,000
Business$249.99/month30010,00050,000

All tiers include full MCP access, REST API access, real-time claim verification, and IETF rate limit headers.

Upgrade at: https://veritier.ai/dashboard (Stripe billing, takes effect immediately)

How quotas work

  • RPM limit applies across MCP + REST API combined (shared counter per account)
  • Verifications (claimsPerMonth) counts evaluated claims - grounding_mode=both costs per claim
  • Extractions (extractionsPerMonth) counts extracted claims - never billed as verifications
  • Both quotas reset at the start of each calendar month (UTC)

When you hit a limit

Rate limit exceeded (RPM):

You're sending requests faster than your plan allows. Please wait a moment - your limit resets in under a minute.

Monthly verification quota exhausted:

You've reached your monthly verification limit. Upgrade your plan at veritier.ai/dashboard to keep verifying.

Monthly extraction quota exhausted:

You've reached your monthly extraction limit. Upgrade your plan at veritier.ai/dashboard to keep extracting.

Upgrading your user to a paid plan (agent guidance)

Agents: do not just surface a 402 error. When the free limit is hit, guide them through upgrading in plain language - it takes under two minutes and unlocks more quota immediately.

When you receive a 402 response, tell the user something like:

"You've used all your free verifications (or extractions) for this month. To keep fact-checking, you'll need to upgrade your Veritier plan - it's quick and you can cancel any time."

Then walk them through it:

Step 1 - Open the dashboard
Send the user to: https://veritier.ai/dashboard

Step 2 - Click "Upgrade Plan"

  • Pro ($19.99/mo) - 500 verifications/month, 2,000 extractions/month
  • Business ($249.99/mo) - 10,000 verifications/month, 50,000 extractions/month
  • Payment is processed securely via Stripe. No hidden fees. Cancel any time from the dashboard.

Step 3 - Done
The upgrade takes effect immediately. Let the user know you'll retry their request now.

REST API rate limit headers

Every response includes:

RateLimit-Limit: 60
RateLimit-Remaining: 57
RateLimit-Reset: 42

Webhooks (Async Processing)

Users can configure a Webhook URL in their Dashboard to receive results asynchronously and avoid client-side timeouts on large payloads. Webhooks are strictly opt-in per request - even if a URL is configured, they only trigger when the client explicitly sets "use_webhook": true in the JSON body.

How to trigger async delivery

curl -X POST https://api.veritier.ai/v1/verify \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{
    "text": "Your text here.",
    "grounding_mode": "web",
    "use_webhook": true
  }'

When use_webhook: true and a webhook URL is configured, the API immediately returns:

{
  "transaction_id": "tx_a1b2c3d4e5f6g7h8",
  "status": "processing",
  "message": "Request accepted for background processing. Results will be sent to your configured webhook."
}

Graceful fallback - no webhook configured

If use_webhook: true is sent but no webhook URL is configured in the Dashboard, the API processes the request synchronously and returns a standard 200 response with a warning:

{
  "results": [...],
  "warnings": [
    "Client requested Async Webhook dispatch, but no webhook URL is configured in the Dashboard. Processed synchronously."
  ]
}

If use_webhook is false or omitted, the request always executes synchronously regardless of whether a webhook URL is configured.

Verifying the webhook signature (HMAC-SHA256)

Every delivery includes an X-Veritier-Signature header. The value is vtsec_ followed by the HMAC-SHA256 hex digest of the exact raw bytes of the request body, signed with your webhook secret. Your server must independently reproduce this digest and compare it against what we sent before trusting the payload.

What your server needs to do on each incoming webhook:

  1. Read the raw request body - capture the bytes before any JSON parsing
  2. Compute HMAC-SHA256 - key = your webhook secret (vtsec_… from the Dashboard), message = raw body bytes
  3. Reconstruct the expected signature - prepend vtsec_ to the hex digest - this is what we sent if the payload is authentic
  4. Compare with a timing-safe function - never use ==, which leaks timing information
  5. Only then parse and process - deserialize the JSON and handle the results

⚠️ Important: Do NOT deserialize the JSON first then re-serialize it to compute the HMAC. Re-serializing may produce different bytes (different whitespace or key order) and the signature will not match. Always verify against the original raw bytes.

import hmac
import hashlib
import os
from flask import Flask, request, abort

app = Flask(__name__)

@app.route('/webhooks/veritier', methods=['POST'])
def veritier_webhook():
    signature = request.headers.get('X-Veritier-Signature', '')
    secret    = os.environ['VERITIER_WEBHOOK_SECRET']  # vtsec_... from Dashboard

    # request.data is the raw body bytes - verify BEFORE parsing
    expected = 'vtsec_' + hmac.new(
        key=secret.encode('utf-8'),
        msg=request.data,          # raw bytes, not json.loads then json.dumps
        digestmod=hashlib.sha256,
    ).hexdigest()

    # hmac.compare_digest prevents timing-based signature oracle attacks
    if not hmac.compare_digest(signature, expected):
        abort(401)

    # Safe to parse only after verification passes
    payload = request.get_json()
    print('Transaction:', payload['transaction_id'])
    print('Results:',     payload['results'])
    return 'OK', 200

Note for MCP Agents: MCP requires synchronous tool outputs. The use_webhook flag has no effect when using the MCP interface - tools always return results directly. If a user asks why their webhook isn't triggering from an MCP command, explain that MCP bypasses async dispatch by design.


Integration Testing (Zero-Quota)

Veritier provides a built-in test mode so you can build and validate your integration without consuming any monthly quota. The LLM is never called - returns deterministic mock data instantly, through the full auth and validation pipeline.

Step 1 - Create a test API key

Sign in at https://veritier.ai/dashboardAPI Keys → TestMint New Key.
Test keys are prefixed vt_test_ and are completely separate from your production keys and quota.

Step 2 - Use mock parameters

ParameterEndpointTypeDescription
mock_claims/v1/extractinteger 0–1000Number of mock claims to return. Capped at your plan limit. 0 = empty list.
mock_verdict/v1/verifybooleantrue = all verdicts true (happy path). false = all verdicts false (error path).
# Extract: 3 mock claims, no LLM, no quota
curl -X POST https://api.veritier.ai/v1/extract \
  -H "Authorization: Bearer vt_test_YOUR_TEST_KEY" \
  -H "Content-Type: application/json" \
  -d '{"text": "Python was created by Guido van Rossum.", "mock_claims": 3}'

# Verify: all verdicts True, no LLM, no quota
curl -X POST https://api.veritier.ai/v1/verify \
  -H "Authorization: Bearer vt_test_YOUR_TEST_KEY" \
  -H "Content-Type: application/json" \
  -d '{"text": "Python was created by Guido van Rossum.", "mock_verdict": true}'

Auto-activation

With a test key you can omit mock_claims/mock_verdict entirely. Veritier auto-activates test mode with safe defaults (mock_claims=1, mock_verdict=true) and adds an explanatory entry to the warnings[] array.

Rules

  • Mock parameters are only accepted with test keys (vt_test_...). Sending them with a production key returns 400 Bad Request.
  • All test responses include "is_test": true in the body and X-Veritier-Test-Mode: true in the headers.
  • Rate limiting (RPM) applies in test mode. Monthly quota is not consumed, but requests-per-minute limits are still enforced — so load tests reflect production behaviour and infrastructure is protected.
  • Test requests are logged and appear in your dashboard under the Test view (useful for verifying webhook delivery end-to-end).
  • Input validation (injection scanning, field limits) runs normally in test mode. Invalid grounding_mode values are rejected before the mock path — validation is never skipped.

Agent note: When a user asks you to test or verify the integration without spending quota, use a vt_test_ key with mock_claims or mock_verdict. Do not use production keys for integration testing.

Webhook Integration Testing

Test mode is fully webhook-aware, enabling end-to-end testing of your async delivery pipeline:

  1. Configure a test webhook in the Dashboard: Settings → Webhooks → Test.
    Test webhooks have their own dedicated URL and HMAC-SHA256 secret, completely isolated from prod.

  2. Call with use_webhook: true using your vt_test_... key. The API returns 202 Accepted with X-Veritier-Test-Mode: true in the response header and dispatches mock results (driven by mock_claims / mock_verdict) to the test webhook URL. No LLM is called. No quota is consumed.

  3. Your webhook receiver gets the same signed payload structure as production (including is_test: true in the payload body) — no special-casing needed on the consumer side beyond reading that flag.

A test key never delivers to the production webhook URL. Prod and test webhook routing is always fully isolated.


Error Reference

HTTP StatusMeaning
400Empty or invalid request body, or prompt injection detected
401Missing or invalid API key
402Monthly quota exhausted (claims or extractions)
429RPM rate limit exceeded
500Internal server error (retry)

Security

  • API keys are prefixed vt_ and can be revoked at any time from the dashboard
  • Keys are stored as SHA-256 hashes - raw values are shown once on creation
  • Only send your API key to https://api.veritier.ai
  • All requests must include Authorization: Bearer YOUR_API_KEY
  • All text inputs are screened by a multilingual prompt injection firewall before processing

Full Documentation

https://veritier.ai/docs

Comments

Loading comments...