Social Proof Optimizer

v1.0.0

Optimize social proof strategy using uncertainty and similarity conditions. Use this skill when designing testimonials, reviews, user counts, case studies, s...

0· 81·0 current·0 all-time
byHung Quoc To@quochungto

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for quochungto/bookforge-social-proof-optimizer.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Social Proof Optimizer" (quochungto/bookforge-social-proof-optimizer) from ClawHub.
Skill page: https://clawhub.ai/quochungto/bookforge-social-proof-optimizer
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install bookforge-social-proof-optimizer

ClawHub CLI

Package manager switcher

npx clawhub@latest install bookforge-social-proof-optimizer
Security Scan
Capability signals
CryptoRequires walletCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (social-proof optimization, audit and design) match the SKILL.md instructions. The skill only asks for marketing assets, landing-page copy, testimonial inventories, and audience context — all proportional to its stated purpose.
Instruction Scope
Runtime instructions are an explicit, stepwise marketing audit/design workflow (assess uncertainty, similarity, authenticity rubric, etc.). They instruct the agent to read marketing/campaign documents and ask clarifying questions when context is missing, which is expected for this skill and not overly broad.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is downloaded or written by an installer, so there is low install risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. It does request Read/Write tools (document access) which are appropriate for a copy- and asset-focused skill.
Persistence & Privilege
always is false and there is no indication the skill attempts to modify other skills or system-wide settings. Agent autonomous invocation is enabled by default but not combined with other concerning privileges.
Assessment
This skill appears coherent and low-risk from a technical standpoint: it is instruction-only, requests no secrets, and only needs access to marketing assets (landing pages, testimonials, campaign copy). Before installing, consider: (1) ethical and legal limits — the skill explicitly discusses manufactured social proof and FTC rules; do not use it to create deceptive or undisclosed paid/incentivized testimonials; (2) least-privilege access — grant the agent only the documents it needs rather than broad filesystem or network access; (3) human review — have a human reviewer approve persuasive copy and any claims about typical results before publishing; and (4) autonomy policy — if you do not want the agent to act without human approval, restrict autonomous publishing or model invocation in the environment. If you want higher assurance, inspect logs/output samples or run the SKILL.md steps interactively with a test document first.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

📚 Clawdis
FOMOvk972yrn6sczn5pr2p6a578j99n84vhenbookforgevk972yrn6sczn5pr2p6a578j99n84vhenbystander-effectvk972yrn6sczn5pr2p6a578j99n84vhenconversionvk972yrn6sczn5pr2p6a578j99n84vhencopywritingvk972yrn6sczn5pr2p6a578j99n84vhenherd-behaviorvk972yrn6sczn5pr2p6a578j99n84vhenlanding-pagevk972yrn6sczn5pr2p6a578j99n84vhenlatestvk972yrn6sczn5pr2p6a578j99n84vhenmanufactured-proofvk972yrn6sczn5pr2p6a578j99n84vhenpeer-influencevk972yrn6sczn5pr2p6a578j99n84vhenpersuasionvk972yrn6sczn5pr2p6a578j99n84vhenreviewsvk972yrn6sczn5pr2p6a578j99n84vhensocial-proofvk972yrn6sczn5pr2p6a578j99n84vhensocial-validationvk972yrn6sczn5pr2p6a578j99n84vhentestimonialsvk972yrn6sczn5pr2p6a578j99n84vhentrust-signalsvk972yrn6sczn5pr2p6a578j99n84vhen
81downloads
0stars
1versions
Updated 2w ago
v1.0.0
MIT-0

Social Proof Optimizer

When to Use

You are designing, auditing, or improving how a product, service, or campaign uses evidence of others' behavior to influence decisions. Typical triggers:

  • Writing or auditing landing page copy that includes testimonials, user counts, or reviews
  • Designing a testimonial collection strategy
  • Evaluating whether existing social proof is credible and well-placed
  • Building a social media campaign that leverages peer influence or community behavior
  • Detecting whether social proof signals in a competitor or partner's materials are manufactured
  • Planning a content strategy that uses case studies or customer stories as trust signals
  • Responding to a situation where bystander inaction is a risk (emergency, low-engagement community)

Before starting, identify the mode:

  • Application — you are designing or improving social proof
  • Defense — you are evaluating whether social proof is genuine or being manufactured against you
  • Both — apply and audit in the same pass

Context & Input Gathering

Required Context (must have — ask if missing)

  • The target audience: Who is being influenced — their demographics, experience level, and relationship to the decision → Check prompt for: audience description, customer persona, target market → Ask if missing: "Who is the primary audience for this social proof? (e.g., first-time buyers, enterprise decision-makers, existing customers considering an upgrade)"

  • The decision or action being influenced: What you want the audience to do after seeing the social proof → Check prompt for: conversion goal, CTA, desired behavior → Ask if missing: "What specific action should the social proof motivate? (e.g., sign up, purchase, request a demo, share content)"

  • Current social proof inventory: What testimonials, reviews, user counts, or social signals already exist → Check environment for: existing copy, testimonial docs, review excerpts, landing page files → If unavailable: proceed with design-from-scratch approach

Observable Context (gather from environment)

  • Existing copy structure: Read landing page or campaign docs to identify where social proof currently appears
  • Audience similarity signals: Look for customer demographics in existing testimonials to assess similarity gap
  • Proof type already in use: Categorize what kind of social proof is already deployed (numbers, quotes, logos, media mentions)

Default Assumptions

  • If no audience defined → assume a cold prospect with moderate uncertainty (highest-stakes scenario)
  • If no current proof inventory → assume starting from scratch
  • If mode not specified → run both Application and Defense passes

Process

Step 1: Assess Uncertainty Level

ACTION: Score the audience's uncertainty about the decision on a 1–5 scale. Use the observable signals below to assign the score.

WHY: Social proof operates most powerfully under uncertainty. When people are unsure of the correct action, they look to others for behavioral cues — this is the mechanism that makes social proof effective. When the audience already has high confidence (low uncertainty), social proof adds little. When uncertainty is high, social proof can be the primary driver of behavior. Matching proof intensity to uncertainty level prevents over-engineering low-uncertainty contexts and under-investing in high-uncertainty ones.

ScoreUncertainty signalsSocial proof impact
1Expert audience, familiar decision, established habitLow — they trust their own judgment
2Some familiarity, minor doubtsModerate — proof provides reassurance
3Mixed familiarity, real alternatives existSignificant — proof tips the balance
4Unfamiliar category, high stakes, first-time decisionHigh — proof is a primary cue
5New category, complex product, ambiguous outcomesDominant — proof is the main decision driver

IF uncertainty score ≥ 3 → social proof is a primary lever; invest in all three design dimensions (placement, type, similarity) IF uncertainty score ≤ 2 → social proof is supplementary; focus on proof quality over quantity


Step 2: Evaluate Similarity Match

ACTION: Assess how closely the social proof sources (testimonial givers, review authors, case study subjects) resemble the target audience.

WHY: Social proof operates most powerfully when we observe people similar to ourselves. Similarity triggers the inference "if someone like me found this valuable / made this choice / got this result, it's probably right for me too." Dissimilar proof sources create a gap — the audience notices that the person in the testimonial is not like them and discounts the evidence. The wallet-return experiment illustrates this precisely: 70% of wallets were returned when the previous finder was similar; only 33% when dissimilar. A 2x difference from a single similarity variable.

Evaluate similarity on three dimensions:

DimensionHigh similarityLow similarity
DemographicsSame age, role, industry, company size as target audienceDifferent life stage, job function, or context
ProblemFaced the exact same challenge, pain point, or decisionDifferent problem, adjacent use case
Outcome expectationSeeking the same result or benefitPursuing different goals

Similarity score:

  • 3/3 match → high-similarity proof (most powerful)
  • 2/3 match → moderate-similarity (still useful, note the gap)
  • 1/3 or 0/3 match → low-similarity (significant credibility risk)

IF similarity score is low → flag as a critical gap; recommend collecting new proof from similar sources before launch; or add context that bridges the gap ("We work with early-stage founders — here's what they say")


Step 3: Identify the Social Proof Sub-Type

ACTION: Based on the context, choose the appropriate sub-type of social proof. Match the sub-type to the situation rather than defaulting to testimonials.

WHY: Not all social proof works the same way. The mechanism differs by sub-type, and using the wrong one produces weak or counterproductive results. Manufactured proof (even when widely used) carries significant credibility risk if detected — the defense section explains why.

Three sub-types:

Pure social proof — everyone is uncertain and looking to each other. Effect: behaviors cascade. The bystander effect is the dark version (all waiting for someone else to act); viral adoption is the positive version. Use when: launching into an ambiguous or new category where the proof comes from the sheer number of adopters (user counts, "X,000 companies use this," trending signals).

Competitive social proof — demand creates desire. Scarcity or high demand signals quality because "others want it." Use when: the product has genuine high demand or limited availability. Research finding: cookies described as scarce due to demand were rated highest quality, above simply scarce cookies. The demand signal itself carries proof.

Manufactured social proof — seeding initial behavior to trigger authentic cascades. Use when: launching cold, with no initial user base (salted tip jars, seeded audiences, pre-loaded review platforms). This is ethically complex — see Step 5 (Defense).


Step 4: Design the Social Proof Strategy

ACTION: Specify placement, format, source, and framing for each proof element. Use the optimization checklist.

WHY: Even excellent proof fails if placed wrong (buried below the fold), formatted poorly (wall of text vs. scannable), or missing critical similarity signals (no job title, company size, or name). The goal is maximum signal efficiency: each proof element should score on uncertainty reduction AND similarity activation simultaneously.

Optimization checklist:

Placement — where to put proof:

  • Immediately before or beside the primary call to action (highest-uncertainty moment)
  • Adjacent to the feature that addresses the audience's biggest objection
  • At the top of the page for high-uncertainty audiences (score 4–5) who need proof before they'll read anything else
  • At the bottom for lower-uncertainty audiences (score 1–2) who need facts first, then confirmation

Format — how to present proof:

  • Quote + photo + name + role/company → most credible combination
  • Specific outcome over vague praise ("Cut churn by 23% in 60 days" vs. "Amazing product!")
  • Numbers when available (user counts, percentage improvements, time savings)
  • Video testimonials for high-stakes decisions (enterprise sales, high-ticket products)
  • Case study format (problem → process → result) for B2B or complex decisions

Source selection — who should give the proof:

  • Match demographics to target audience (role, company size, industry, experience level)
  • Prioritize sources with the same problem and desired outcome
  • Feature multiple similar sources rather than one impressive but dissimilar source (a well-known brand testimonial from an enterprise client means nothing to a solo founder audience)

Framing — how to contextualize proof:

  • State the similarity explicitly: "From a B2B founder in year 2, just like you..."
  • Describe the situation before the outcome: "Before [Product], I was spending 8 hours per week on X"
  • Aggregate when individual proof is sparse: "Join 12,000 marketers who..."

Step 5: Check for Manufactured Proof Risks

ACTION: Review all planned social proof elements against the authenticity test. Flag anything that fails.

WHY: Manufactured proof — canned laughter, salted tip jars, seeded review platforms, planted converts, paid "unrehearsed" testimonials — works precisely because it exploits the automatic nature of social proof. But when audiences detect fakery, the effect reverses completely: the exposure destroys trust and signals that the product could not generate real social proof on its own. The operational claque (Italian opera house hired applauders) worked for centuries partly because the fakery was openly acknowledged. Modern audiences are not so forgiving.

Authenticity test — for each proof element, ask:

  1. Is this testimonial from a real customer who used the product without any pre-arrangement or compensation?
  2. Is the quoted outcome accurately representative — not cherry-picked from the 99th percentile?
  3. Is the user count / "X people use this" figure current and verifiable?
  4. Are star ratings from a platform the audience trusts and where fake reviews would be detectable?
  5. Is any "trending" or "most popular" signal reflecting actual usage, not manufactured demand?

IF any answer is "no" → classify as manufactured proof; assess risk level:

  • High risk: direct fabrication (actors as customers, fake reviews) — do not use
  • Medium risk: cherry-picked outlier results shown without context — add "typical results" disclaimer
  • Low risk: selective presentation (showing only positive reviews) — acceptable if representative sample exists; flagged as confirmation bias, not fraud

Step 6: Apply Devictimizing Protocol (Emergency / Low-Engagement Contexts)

ACTION: If the context involves a real emergency, a dormant community, or a situation where "bystander apathy" is harming a goal, apply the devictimizing protocol.

WHY: In ambiguous group situations, pluralistic ignorance takes hold: everyone looks to others for behavioral cues, sees everyone appearing calm, and concludes nothing is wrong — even when something is very wrong. This produces collective inaction in genuine emergencies, and in business contexts, produces low engagement in communities or campaigns where everyone waits for someone else to go first. The single most effective counter is to break the diffusion of responsibility: identify one specific person, assign a specific task, remove their uncertainty about both the need and their role.

The protocol:

In emergencies (physical or urgent digital):

"You — [identifying detail, e.g., 'in the blue jacket', 'with the red icon'] — call 911 / contact support / take this specific action."

In community or campaign contexts (engagement, participation):

Identify the first mover explicitly. Name them. Give them a concrete task. Once the first person acts, the cascade follows — social proof of action then works in your favor.

This applies to: cold email campaigns where no one replies first, community launches where everyone waits, product launches where no one wants to be the first buyer, low-response surveys or polls.


Step 7: Defense — Evaluate Incoming Social Proof

ACTION: Assess whether social proof being used on you or in your competitive environment is genuine or manufactured. Apply the classification framework.

WHY: Social proof is automatic — it triggers before conscious analysis. The defense is not to distrust all social proof (genuine proof is valid and valuable information) but to correctly classify each piece. Once you identify manufactured proof, its claim on your behavior disappears. The automatic pilot should be disengaged only when the data it's receiving is corrupted.

Two situations that corrupt social proof data:

Situation 1 — Deliberate falsification: Canned responses, hired actors, seeded reviews, planted converts. Detection signals:

  • Testimonials with no identifying details (no name, company, role, photo)
  • "User count" with no third-party verification
  • Reviews that appeared suddenly in large batches
  • Reactions that feel performed rather than spontaneous
  • Extreme uniformity of praise (no negative details in any testimonial)

Situation 2 — Innocent error cascade: Pluralistic ignorance, freeway lane-switching, racetrack betting cascades. No one is lying; everyone is following others who are following others, all assuming the crowd knows something they don't. Detection signals:

  • Everyone seems to be doing the same thing with no clear initiator
  • The behavior began with an ambiguous trigger (one person changed lanes, one person left the party, one person sold a stock)
  • Checking the underlying facts directly reveals no actual signal

Response:

  • Deliberate falsification → disengage automatic pilot; evaluate the underlying product independently; consider active counterattack (do not purchase products using phony testimonials; where appropriate, call out the practice)
  • Innocent cascade → check the objective facts directly rather than reading others' behavior; introduce independent information into the group

Outputs

For Application mode, produce a Social Proof Optimization Plan:

## Social Proof Optimization Plan

**Audience:** [Who they are, role, company size, experience level]
**Decision being influenced:** [Specific action]
**Uncertainty score:** [1–5] — [key signals that drove this score]
**Mode:** Application / Defense / Both

### Similarity Assessment
- Current proof similarity: [High / Moderate / Low]
- Gaps identified: [Which dimensions are mismatched]
- Recommended sources: [Who should give proof for maximum similarity]

### Sub-Type Selection
- Sub-type: [Pure / Competitive / Manufactured (flagged)]
- Rationale: [Why this sub-type fits the context]

### Proof Elements
| Element | Format | Source type | Placement | Similarity score |
|---------|--------|-------------|-----------|-----------------|
| [Testimonial 1] | Quote + photo + name + role | [Customer type] | [Location] | [H/M/L] |
| [User count] | Number + context | [Verified platform] | [Location] | [N/A] |

### Authenticity Flags
- [Element]: [Pass / Flag — reason]

### Devictimizing Actions (if applicable)
- [Specific first-mover prompt or engagement protocol]

For Defense mode, produce a Social Proof Audit:

## Social Proof Audit

**Source audited:** [Product / competitor / campaign]
**Proof elements reviewed:** [List]

### Classification
| Proof element | Type | Genuine / Manufactured / Uncertain | Evidence |
|---|---|---|---|
| [Element] | [Testimonial / Count / Rating] | [Classification] | [Why] |

### Automatic Pilot Status
- Recommended: Engage / Disengage / Verify independently
- Rationale: [Key evidence]

Examples

Scenario: Landing page for B2B project management tool targeting solo founders

Trigger: "Our landing page has testimonials from enterprise companies. Conversion is low for our actual market (solo founders, 1–10 person teams). Help us fix the social proof."

Process:

  • Uncertainty score: 4 (first-time SaaS tool purchase, unfamiliar category for non-technical founders)
  • Similarity assessment: 0/3 — enterprise testimonials share no demographic, problem, or outcome similarity with solo founders
  • Sub-type: Pure social proof (user count + quote format)
  • Gap: No current proof from similar audience; enterprise logos are actively working against conversion
  • Design: Replace enterprise logos with 3–5 testimonials from solo founders citing specific outcomes ("Went from missing deadlines weekly to shipping on time for 4 months straight — Sarah, freelance designer"); add aggregate user count segmented by company size ("Used by 4,200 solo founders and small teams")
  • Placement: Primary testimonials above the fold; secondary use-case proof beside the pricing CTA

Output: Social Proof Optimization Plan with replacement testimonial brief, collection outreach template, and placement diagram.


Scenario: SaaS product launch — zero users, cold start

Trigger: "We're launching next month. We have no users yet. What social proof strategy do we use?"

Process:

  • Uncertainty score: 5 (brand new product, unknown team, new category positioning)
  • Similarity assessment: N/A — no existing proof to assess
  • Sub-type: Consider competitive social proof (waitlist demand signal) + pure social proof (beta users)
  • Strategy: Run a small closed beta (20–50 users) from target audience; collect detailed testimonials during beta; use waitlist count as launch-day social signal ("847 people on the waitlist — now open"); feature beta users prominently with full identifying details
  • Devictimizing: For the launch email, name one beta user and their result in the subject line to establish the first public social proof anchor; others follow

Output: Pre-launch proof collection protocol, beta user testimonial interview guide, launch email framework with specific first-mover framing.


Scenario: Auditing a competitor's product page

Trigger: "A competitor's landing page has 47 five-star testimonials, all from the last 30 days, no names or photos, and claims '10,000 customers.' Should I trust this as a signal of product quality?"

Process:

  • Defense mode
  • Deliberate falsification signals: no identifying details (no name, role, company), batch appearance (47 in 30 days), unverifiable user count
  • Classification: manufactured proof (high confidence)
  • Automatic pilot: disengage
  • Response: evaluate competitor product on independent signals (third-party review platforms, LinkedIn mentions, press coverage); the social proof data is corrupted and carries no information about product quality

Output: Social Proof Audit classifying each element; recommendation to evaluate via G2/Capterra/LinkedIn instead.


Key Principles

  • Uncertainty activates social proof; similarity determines whose proof counts. These two conditions must both be present for maximum effect. High uncertainty without similar sources = weak effect. Similar sources in a low-uncertainty context = unnecessary. Design for both simultaneously.

  • Specificity is the proxy for authenticity. Vague praise ("great product!") triggers suspicion because genuine customers mention specifics. A testimonial naming a concrete outcome, timeframe, or before/after detail is both more credible and more persuasive. Specific proof does double duty: it proves authenticity and reduces audience uncertainty about outcomes.

  • The first mover breaks the cascade; after that, social proof runs itself. In cold-start contexts, the devictimizing protocol — naming one person, giving a specific task — is the highest-leverage intervention. Once one person acts visibly, the "everyone else is waiting" dynamic reverses.

  • Manufactured proof is high-risk, not just unethical. Audiences trained on media detect canned responses, overly uniform praise, and missing detail. When detected, the effect reverses: the product is marked as one that could not generate genuine proof. The loss in credibility exceeds any short-term lift from the manufactured signal.

  • The automatic pilot should be disengaged selectively, not permanently. Most social proof is genuine and valuable — refusing all social evidence produces poor decisions and social friction. The skill is learning to identify corrupted data (deliberate falsification or innocent cascade) and checking the underlying facts only when the data source is suspect.


References

License

This skill is licensed under CC-BY-SA-4.0. Source: BookForge — Influence: The Psychology of Persuasion by Robert B. Cialdini.

Related BookForge Skills

This skill is standalone. Browse more BookForge skills: bookforge-skills

Comments

Loading comments...