Install
openclaw skills install bookforge-authority-signal-designerDesign and audit authority signals in content, credentials, bios, and landing pages. Use this skill when building expert positioning, thought leadership cont...
openclaw skills install bookforge-authority-signal-designerUse this skill when you are:
Preconditions: you have at least one of:
Agent: Before starting, confirm whether you are in APPLICATION mode (designing authority signals for content) or DEFENSE mode (evaluating an authority claim someone is making). You can also do both in sequence if relevant.
User prompt → Extract: whose authority? what content? what audience? which mode?
↓
Environment → Scan for: bio drafts, landing page copy, credential lists, existing content
↓
Gap analysis → Do I know: (1) whose authority is being designed, (2) what the content is for,
(3) who the audience is, (4) application vs defense mode?
↓
Missing critical info? ──YES──→ ASK (one question at a time)
│
NO
↓
PROCEED
Whose authority, and in what domain: → Check prompt for: name, title, role, field, credentials, years of experience → Check environment for: existing bios, LinkedIn content, website copy → If still missing, ask: "Who is this for, and what is their domain expertise? For example: 'a cybersecurity consultant with 12 years in enterprise security' or 'a marketing agency specializing in B2B SaaS.'"
Audience and context: → Check prompt for: target reader, content format (landing page, bio, article), decision being made → If still missing, ask: "Who is the audience for this content, and what action should they take after encountering this person's authority? For example: 'enterprise buyers deciding whether to hire this consultant.'"
Existing content: Read any draft bio, about page, or credential list present in the files. → Look for: how credentials are currently presented, what titles are used, what symbols of authority appear → If unavailable: work from user description
Competitor or peer positioning: If other experts in the same field are named or linked, observe their authority signals for comparison.
Use TodoWrite to track steps before beginning.
TodoWrite([
{ id: "1", content: "Analyze scenario: mode, audience, goal, existing signals", status: "pending" },
{ id: "2", content: "Audit existing authority signals across all three symbol types", status: "pending" },
{ id: "3", content: "Design authority strategy: titles, visual/contextual signals, trappings", status: "pending" },
{ id: "4", content: "Apply strategic self-deprecation where appropriate", status: "pending" },
{ id: "5", content: "Ethical check: are signals genuine or manufactured?", status: "pending" },
{ id: "6", content: "Defense mode: apply two-question protocol if evaluating a claim", status: "pending" }
])
ACTION: Determine mode (APPLICATION / DEFENSE / BOTH), identify the audience's knowledge state and trust threshold, and clarify the specific goal.
WHY: Authority signals work through automatic, nearly unconscious compliance — what Cialdini calls the "click, whirr" response. The audience rarely deliberates about whether to trust an authority; they react. Designing effective signals means understanding what will trigger that automatic response in THIS audience. A title that commands authority for physicians ("MD") carries no weight in venture capital. A luxury office that signals success to retail clients may signal excess to lean startup operators. The signal must match the audience's conditioned deference patterns.
Key questions to resolve:
Mark Step 1 complete in TodoWrite.
ACTION: Review all existing content through the lens of the three symbol types. Identify what is present, what is absent, and what is being communicated unintentionally.
WHY: Authority is communicated whether you plan it or not. An unpolished website, a vague title ("consultant"), or a sparse bio all communicate something — usually uncertainty or low status. The audit surfaces both gaps and noise. Noise is as harmful as gaps: listing irrelevant credentials (a food science degree for a marketing consultant) dilutes focus and signals a failure to curate.
Symbol Type 1 — Titles: What titles, designations, certifications, or role labels appear?
Symbol Type 2 — Visual and Contextual Authority Signals (the clothes/uniform equivalent in digital content):
Symbol Type 3 — Trappings: Status markers that signal success and achievement.
Output: A structured gap and noise analysis table.
Mark Step 2 complete in TodoWrite.
ACTION: Based on the audit, prescribe specific additions, removals, and repositioning across all three symbol types. Produce revised copy or specific recommendations for each channel.
WHY: The three symbol types work together as a system, not independently. A strong title with weak trappings reads as self-proclaimed. Strong trappings with a weak title reads as successful but undefined. The goal is convergence: all three types pointing to the same conclusion about expertise and trustworthiness. The Milgram research and its replications show that 65% of people will comply with a clearly-marked authority even in high-stakes situations — the symbols do real persuasive work, but only when they form a coherent signal.
Titles strategy:
Visual and contextual signals strategy:
Trappings strategy:
AGENT: EXECUTES — produce revised bio copy or a marked-up version of the existing content with specific changes called out.
Mark Step 3 complete in TodoWrite.
ACTION: Identify one or two places where acknowledging a genuine limitation, counterargument, or constraint will increase overall credibility more than omitting it.
WHY: Compliance professionals use strategic self-deprecation to establish truthfulness on minor points so that their major claims receive less scrutiny. The mechanism is trust calibration: an expert who acknowledges limitations signals that their positive claims are honest, not sales-motivated. Cialdini documents this with Listerine ("the taste you hate three times a day"), Avis ("We're #2, but we try harder"), and L'Oreal ("a bit more expensive and worth it"). The waiter who says "the special isn't as good tonight as it usually is" and recommends a less expensive dish gets trusted when they later recommend expensive wine and desserts. The key rule: the limitation must be genuine, secondary, and easily overcome by the benefits being claimed.
Where to apply:
What to avoid: Self-deprecation on core competence claims, primary value propositions, or anything the audience might actually be deciding about. The minor concession must be clearly minor.
AGENT: EXECUTES — identify the best candidate location in the content and draft the self-deprecation language.
Mark Step 4 complete in TodoWrite.
ACTION: Verify that all authority signals being designed represent genuine credentials, real experience, or actual achievements. Flag any that are manufactured, exaggerated, or misleading.
WHY: Authority symbols are the most easily faked of all influence mechanisms — Cialdini explicitly notes that con artists specifically exploit titles, uniforms, and trappings precisely because they're so powerful and so easy to counterfeit. The 95% nurse compliance rate in the Hofling hospital study happened in response to a phone caller claiming to be a doctor — nothing verified. Designing manufactured authority signals is not only unethical but creates compounding risk: audiences who discover the gap between signal and substance lose trust entirely and permanently. The goal is amplifying genuine authority, not fabricating it.
Checklist:
IF any signal fails this check → remove it or reframe it accurately IF the genuine credentials are thin → recommend building real authority assets (publish content, seek speaking opportunities, pursue relevant certifications) rather than manufacturing symbols
Mark Step 5 complete in TodoWrite.
ACTION: If in DEFENSE mode, apply the two-question framework to evaluate the authority claim being assessed. If in APPLICATION mode, run this as a brief self-check on the content just designed.
WHY: People grossly underestimate how much authority affects them. In Milgram's experiments, predictions about how many subjects would comply with the full shock sequence fell in the 1-2% range — the actual rate was 65%. In the luxury car study, students predicted they would honk at the prestige car faster than the economy car — the opposite was true. This systematic underestimation is the core vulnerability. The two questions force conscious deliberation into what would otherwise be automatic deference, making it far harder for symbols to substitute for substance.
Question 1: "Is this authority truly an expert?"
Question 2: "How truthful can we expect this authority to be here?"
Output: A clear verdict — "Follow this authority on this claim" / "Verify before acting" / "Authority signal is present but substance is unconfirmed" — with the specific reasoning.
HANDOFF TO HUMAN — the defense protocol produces an assessment; the human makes the final judgment call.
Mark Step 6 complete in TodoWrite.
Symbols work as powerfully as substance — but only on audiences who haven't checked — the nurse compliance study (95%) and Milgram experiments (65%) demonstrate that authority symbols bypass deliberate evaluation. This is both the mechanism to use ethically and the vulnerability to guard against.
Convergence across all three symbol types beats any single strong signal — a title without trappings reads as self-proclaimed. Trappings without a clear title reads as successful but undefined. Design all three to point at the same conclusion.
Specificity is authority — vague titles and generic credential lists communicate low status. Specific, granular credentials signal that the expert has done enough real work to have earned precision. "Principal consultant" signals more than "consultant"; "10,400 newsletter subscribers in fintech operations" signals more than "large audience."
Audiences underestimate authority's effect on themselves — Cialdini documents this consistently: people in Milgram-style studies, luxury car studies, and uniform experiments all predicted they would be less affected than they actually were. When designing or evaluating authority signals, assume the effect is larger than it appears from the inside.
Strategic self-deprecation earns permission to claim — acknowledging one genuine limitation buys credibility for all the positive claims that follow. The limitation must be real, minor, and easily outweighed. Theatrical modesty over a real strength is dishonest and backfires when detected.
Authority in the wrong domain is worthless — or worse — the first defense question explicitly targets domain match because this is the most common authority misfire. Real experts in adjacent fields carry a halo that misleads audiences. Design and evaluate authority signals with domain specificity as a primary filter.
Scenario: Cybersecurity consultant bio with thin authority signals Trigger: "I'm a freelance cybersecurity consultant. My bio just says 'I help companies stay secure.' Can you make it better?" Process:
Scenario: Marketing agency building a new website about page Trigger: "We're redoing our website. We're a 6-person B2B content marketing agency. What authority signals should go on our About page?" Process:
Scenario: Evaluating a consultant's recommendation Trigger: "A consultant is recommending we switch our entire data stack to a specific vendor. He has impressive credentials. Should I trust this recommendation?" Process:
This skill is licensed under CC-BY-SA-4.0. Source: BookForge — Influence Psychology Of Persuasion by Unknown.
This skill is standalone. Browse more BookForge skills: bookforge-skills