goap-research-ed25519 — goap-research-ed25519 install goap-research-ed25519, 2026-jan-pu-Intercom-clone-01, community, goap-research-ed25519 install, ide skills, Ed25519 verification for AI agents, Claude Code, Cursor, Windsurf

v1.0.0
GitHub

About this Skill

Ideal for Advanced AI Agents requiring secure and trustworthy research capabilities through Goal-Oriented Action Planning with Ed25519 cryptographic verification. goap-research-ed25519 is an advanced research system integrating Goal-Oriented Action Planning with Ed25519 cryptographic verification for secure and reliable operation

Features

Utilizes Ed25519 cryptographic signatures for source trust and claim verification
Employs cross-reference and signature chain for enhanced anti-hallucination protection
Combines reliability scoring with cryptographic verification for robust security
Supports advanced research systems with Goal-Oriented Action Planning
Provides maximum anti-hallucination protection for AI agents
Integrates cryptographic verification with standard GOAP features

# Core Topics

dzhechko dzhechko
[0]
[0]
Updated: 3/2/2026

Agent Capability Analysis

The goap-research-ed25519 skill by dzhechko is an open-source community AI agent skill for Claude Code and other IDE workflows, helping agents execute tasks with better context, repeatability, and domain-specific guidance. Optimized for goap-research-ed25519 install, Ed25519 verification for AI agents.

Ideal Agent Persona

Ideal for Advanced AI Agents requiring secure and trustworthy research capabilities through Goal-Oriented Action Planning with Ed25519 cryptographic verification.

Core Value

Empowers agents to conduct research with maximum anti-hallucination protection using cryptographic signatures and scoring, ensuring the reliability and trustworthiness of sources through Ed25519 verification and cross-reference claim verification.

Capabilities Granted for goap-research-ed25519

Verifying research claims with Ed25519 cryptographic signatures
Conducting secure and reliable Goal-Oriented Action Planning
Enhancing anti-hallucination protection in AI research and development

! Prerequisites & Limits

  • Requires understanding of Ed25519 cryptographic principles
  • Limited to applications where Goal-Oriented Action Planning is applicable
  • Dependent on the quality of the cross-reference and signature chain for claim verification
Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

goap-research-ed25519

Install goap-research-ed25519, an AI agent skill for AI agent workflows and automation. Works with Claude Code, Cursor, and Windsurf with one-command setup.

SKILL.md
Readonly

GOAP Research Skill with Ed25519 Verification

Advanced research system combining Goal-Oriented Action Planning (GOAP) with Ed25519 cryptographic verification for maximum anti-hallucination protection.

Key Differentiators from Standard GOAP

FeatureStandard GOAPGOAP-Ed25519
Source TrustReliability scoring (1-5)Cryptographic signatures + scoring
Claim VerificationCross-referenceCross-reference + signature chain
Anti-HallucinationTriangulationTriangulation + mandatory citations
Audit TrailResearch path logSigned verification ledger
Trust AnchorsEditorial reputationTrusted issuer whitelist

Ed25519 Verification Architecture

┌─────────────────────────────────────────────────────────────┐
│                    RESEARCH PIPELINE                         │
├─────────────────────────────────────────────────────────────┤
│  ┌──────────┐    ┌──────────┐    ┌──────────┐              │
│  │ Source   │───▶│ Ed25519  │───▶│ Verified │              │
│  │ Content  │    │ Verifier │    │ Facts    │              │
│  └──────────┘    └──────────┘    └──────────┘              │
│        │              │               │                     │
│        ▼              ▼               ▼                     │
│  ┌──────────┐    ┌──────────┐    ┌──────────┐              │
│  │ Citation │    │ Signature│    │ Confidence│              │
│  │ Extractor│    │ Chain    │    │ Calculator│              │
│  └──────────┘    └──────────┘    └──────────┘              │
│        │              │               │                     │
│        └──────────────┴───────────────┘                     │
│                       │                                     │
│                       ▼                                     │
│              ┌────────────────┐                             │
│              │ Verification   │                             │
│              │ Ledger (signed)│                             │
│              └────────────────┘                             │
└─────────────────────────────────────────────────────────────┘

Core GOAP Methodology (Enhanced)

Phase 1: State Assessment with Trust Initialization

Define Current State:

  • Existing knowledge about the topic
  • Available sources and access constraints
  • NEW: Trusted issuer whitelist configuration
  • NEW: Ed25519 keypair availability
  • Time and depth requirements

Define Goal State:

  • Specific questions to answer
  • Required evidence types
  • NEW: Minimum verification threshold (0.85 default, 0.95 strict)
  • NEW: Required signature chain depth
  • Confidence thresholds for conclusions

Gap Analysis:

  • Knowledge gaps to fill
  • NEW: Unsigned claims requiring verification
  • NEW: Citation chain breaks to resolve

Phase 2: Action Inventory (Extended)

Research actions with Ed25519 verification extensions:

ActionPreconditionsEffectsCostVerification
web_search_broadtopic_definedcandidates_found1None
web_search_verifiedtopic_defined, trusted_issuers_setverified_candidates_found2Domain signature
fetch_sourceurl_knowncontent_retrieved2TLS certificate
fetch_signed_sourceurl_known, issuer_pubkeysigned_content_retrieved3Ed25519 signature
extract_factscontent_retrievedfacts_cataloged1None
sign_extracted_factsfacts_cataloged, private_keysigned_facts2Self-signature
verify_claimclaim_identifiedclaim_verified/refuted3Cross-ref
verify_claim_cryptographicclaim_identified, signature_availablecryptographically_verified4Ed25519 verify
cross_referencemultiple_sourcesconsistency_checked2None
cross_reference_signedmultiple_signed_sourcessigned_consistency_checked3Multi-sig verify
build_citation_chainfacts_catalogedcitation_chain_complete2Chain integrity
verify_citation_chaincitation_chain_completechain_verified3Ed25519 chain
generate_signed_reportconclusions_formed, private_keysigned_report_delivered3Report signature

Phase 3: Plan Generation (A* with Verification Cost)

Enhanced cost function:

f(n) = g(n) + h(n) + v(n)
  • g(n): Actual cost (searches performed, time spent)
  • h(n): Heuristic distance to goal (remaining questions)
  • v(n): Verification penalty (unsigned claims × 0.5)

Planning Heuristics:

  1. Prioritize signed sources over unsigned (lower total cost)
  2. Prefer sources from trusted issuers whitelist
  3. Weight cryptographically verified claims higher
  4. Factor citation chain depth in confidence

Phase 4: OODA Loop with Verification Checkpoints

Observe:

  • Monitor search results quality
  • Track signature validity status
  • Monitor citation chain integrity
  • Identify information gaps

Orient:

  • Assess if current path leads to goal
  • Evaluate cryptographic trust level
  • Check for signature chain breaks
  • Recognize when verification fails

Decide:

  • Continue current research branch or pivot
  • Accept or reject unsigned sources
  • Trigger re-verification on suspicious content
  • Choose between depth and breadth

Act:

  • Execute next optimal action
  • Sign verified findings
  • Update verification ledger
  • Trigger replanning if deviation detected

Phase 5: Dynamic Replanning with Trust Recalculation

Trigger replanning when:

  • Key assumption invalidated
  • Signature verification fails
  • Trusted issuer removed from whitelist
  • Citation chain broken
  • Higher-quality signed source discovered

Ed25519 Verification Protocol

Trusted Issuers Whitelist

Default trusted issuers (Level 5 sources):

yaml
1trusted_issuers: 2 news: 3 - reuters.com 4 - ap.org 5 - bbc.com 6 academic: 7 - arxiv.org 8 - nature.com 9 - science.org 10 - pubmed.gov 11 government: 12 - .gov domains 13 - .gov.uk domains 14 - europa.eu 15 financial: 16 - sec.gov 17 - federalreserve.gov 18 - ecb.europa.eu

Signature Verification Flow

1. Source provides content + signature + public_key_id
2. Fetch public key from trusted keyserver or issuer
3. Verify Ed25519 signature: verify(signature, content_hash, public_key)
4. Check issuer against trusted whitelist
5. Record verification result in ledger
6. Assign cryptographic trust score

Citation Chain Verification

Each fact in the chain must have:

json
1{ 2 "claim": "The statement being made", 3 "source_url": "https://...", 4 "source_hash": "sha256:abc123...", 5 "issuer_pubkey": "ed25519:xyz789...", 6 "signature": "ed25519_sig:...", 7 "timestamp": "2025-01-22T10:30:00Z", 8 "parent_citation": "chain_id:previous_fact_id", 9 "confidence": 0.95 10}

Chain verification:

  1. Verify each fact's signature individually
  2. Verify chain integrity (parent hashes match)
  3. Check all issuers are in trusted whitelist
  4. Calculate aggregate chain confidence

Anti-Hallucination Rules

100% Citation Rule

Every factual claim MUST have a verifiable source. No exceptions.

❌ FORBIDDEN: "Studies show that X leads to Y"
✅ REQUIRED:  "A 2024 study published in Nature (DOI: 10.1038/...) found that X leads to Y"

Verification Thresholds

ModeThresholdUse Case
development0.75Exploratory research, brainstorming
moderate0.85Standard research (default)
strict0.95Legal, medical, financial research
paranoid0.99Critical decisions, published reports

Confidence Calculation

confidence = base_reliability × verification_multiplier × recency_factor

where:
  base_reliability = source level (1-5) / 5
  verification_multiplier = 1.0 if unsigned, 1.2 if signed, 1.5 if chain_verified
  recency_factor = 1.0 if <24h, 0.9 if <7d, 0.8 if <30d, 0.6 if older

Research Execution Patterns (Enhanced)

Pattern A: Verified Exploratory Research

Goal: comprehensive_verified_understanding
Actions:
1. configure_trusted_issuers → whitelist_active
2. web_search_verified → verified_candidates_found
3. FOR EACH candidate: fetch_signed_source → signed_content_retrieved
4. extract_facts → facts_cataloged
5. sign_extracted_facts → signed_facts
6. cross_reference_signed → signed_consistency_checked
7. build_citation_chain → citation_chain_complete
8. verify_citation_chain → chain_verified
9. synthesize_findings → conclusions_formed
10. generate_signed_report → signed_report_delivered

Pattern B: High-Stakes Fact Verification

Goal: cryptographically_verified_claim
Mode: strict (0.95 threshold)
Actions:
1. identify_claim → claim_defined
2. configure_trusted_issuers (strict list) → whitelist_active
3. find_primary_source → primary_located
4. fetch_signed_source → signed_content_retrieved
5. verify_claim_cryptographic → cryptographically_verified
6. cross_reference_signed (≥3 sources) → multi_source_verified
7. build_citation_chain → citation_chain_complete
8. verify_citation_chain → chain_verified (confidence ≥0.95)

Pattern C: Competitive Analysis with Audit Trail

Goal: auditable_competitive_landscape
Actions:
1. identify_players → competitors_listed
2. configure_trusted_issuers → whitelist_active
3. FOR EACH competitor:
   - web_search_verified → verified_info_found
   - fetch_signed_source (official sources) → signed_content
   - extract_facts → facts_cataloged
   - sign_extracted_facts → signed_facts
4. cross_reference_signed → consistency_verified
5. build_citation_chain → full_chain
6. generate_signed_report → auditable_report

Output Structure (Enhanced)

Verified Research Report Format

markdown
1## Executive Summary 2[Key findings in 2-3 sentences] 3 4## Verification Status 5- Mode: strict (0.95 threshold) 6- Chain Integrity: ✅ VERIFIED 7- Unsigned Claims: 0 8- Total Citations: 15 9- Trusted Issuers Used: 8 10 11## Research Objective 12[Original question/goal] 13 14## Methodology 15[GOAP plan executed, verification protocol used] 16 17## Verified Findings 18 19### [Subtopic 1] 20[Findings with signed inline citations] 21 22**Verification Details:** 23| Claim | Source | Signature | Confidence | 24|-------|--------|-----------|------------| 25| ... | ... || 0.96 | 26 27### [Subtopic 2] 28[Findings with signed inline citations] 29 30## Confidence Assessment 31- Cryptographically Verified (≥0.95): [claims list] 32- Cross-Reference Verified (0.85-0.95): [claims list] 33- Single Source (0.75-0.85): [claims list] 34- Unverified (<0.75): NONE (strict mode) 35 36## Citation Chain 37[Full chain with signatures - see Appendix A] 38 39## Verification Ledger 40[Signed log of all verification operations] 41 42## Sources 43[Numbered list with URLs, signatures, and trust scores] 44 45## Appendix A: Cryptographic Verification Details 46[Full Ed25519 signature data for audit]

Quality Standards (Enhanced)

Completeness Checks:

  • All original questions addressed
  • 100% of claims have citations
  • All citations are verifiable
  • Citation chain integrity verified
  • Primary sources found where possible
  • Contradictions identified and addressed
  • Confidence levels assigned to conclusions
  • Verification ledger signed and complete

Anti-Hallucination Checks:

  • No claims without sources
  • No "studies show" without specific citation
  • No statistics without methodology source
  • No quotes without attribution + verification
  • No predictions presented as facts

Implementation

Python Usage

python
1from goap_planner import GOAPResearchPlanner 2from ed25519_verifier import Ed25519Verifier 3 4# Initialize with Ed25519 verification 5planner = GOAPResearchPlanner( 6 verification_mode="strict", 7 trusted_issuers=["reuters.com", "ap.org", "nature.com"] 8) 9 10# Generate research plan 11plan = planner.plan( 12 goal_type="verified_exploratory", 13 topic="AI safety regulations 2025" 14) 15 16# Execute with verification 17results = planner.execute(plan, verify_all=True) 18 19# Generate signed report 20report = planner.generate_report( 21 results, 22 sign=True, 23 include_verification_ledger=True 24)

CLI Usage (via goalie integration)

bash
1# Install goalie for Ed25519 support 2npm install -g goalie 3 4# Verified research 5goalie search "Your research question" \ 6 --verify \ 7 --strict-verify \ 8 --trusted-issuers "reuters.com,ap.org,nature.com" \ 9 --mode academic \ 10 --save 11 12# Anti-hallucination check 13goalie reason --mode anti-hallucination \ 14 --claims "Your claim to verify" \ 15 --citations "Source URL"

References

For detailed implementations, see:

Dependencies

  • Python 3.9+
  • @noble/ed25519 (Node.js) or cryptography (Python) for Ed25519
  • Optional: goalie npm package for CLI integration

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is goap-research-ed25519?

Ideal for Advanced AI Agents requiring secure and trustworthy research capabilities through Goal-Oriented Action Planning with Ed25519 cryptographic verification. goap-research-ed25519 is an advanced research system integrating Goal-Oriented Action Planning with Ed25519 cryptographic verification for secure and reliable operation

How do I install goap-research-ed25519?

Run the command: npx killer-skills add dzhechko/2026-jan-pu-Intercom-clone-01. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for goap-research-ed25519?

Key use cases include: Verifying research claims with Ed25519 cryptographic signatures, Conducting secure and reliable Goal-Oriented Action Planning, Enhancing anti-hallucination protection in AI research and development.

Which IDEs are compatible with goap-research-ed25519?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for goap-research-ed25519?

Requires understanding of Ed25519 cryptographic principles. Limited to applications where Goal-Oriented Action Planning is applicable. Dependent on the quality of the cross-reference and signature chain for claim verification.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add dzhechko/2026-jan-pu-Intercom-clone-01. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use goap-research-ed25519 immediately in the current project.

Related Skills

Looking for an alternative to goap-research-ed25519 or another community skill for your workflow? Explore these related open-source skills.

View All

widget-generator

Logo of f
f

f.k.a. Awesome ChatGPT Prompts. Share, discover, and collect prompts from the community. Free and open source — self-host for your organization with complete privacy.

149.6k
0
AI

flags

Logo of vercel
vercel

flags is a Next.js feature management skill that enables developers to efficiently add or modify framework feature flags, streamlining React application development.

138.4k
0
Browser

zustand

Logo of lobehub
lobehub

The ultimate space for work and life — to find, build, and collaborate with agent teammates that grow with you. We are taking agent harness to the next level — enabling multi-agent collaboration, effortless agent team design, and introducing agents as the unit of work interaction.

72.8k
0
AI

data-fetching

Logo of lobehub
lobehub

The ultimate space for work and life — to find, build, and collaborate with agent teammates that grow with you. We are taking agent harness to the next level — enabling multi-agent collaboration, effortless agent team design, and introducing agents as the unit of work interaction.

72.8k
0
AI