secure-web-search
关于
This skill enables secure web searches with privacy protection, source verification, and information validation. Developers should use it when they need to perform private web research, fact-check data, or validate the credibility of online sources. It provides a workflow for crafting effective queries and cross-referencing information from multiple, reliable sources.
技能文档
Secure Web Search Guide
This skill helps you perform secure web searches while protecting privacy, verifying sources, and validating information accuracy. Essential for research, fact-checking, and gathering reliable information.
Quick Start
When performing secure web searches, follow this workflow:
- Define search intent - What information do you need and why?
- Choose search method - Direct search, privacy-focused engine, or specialized tools
- Craft effective query - Use search operators and specific terms
- Verify sources - Check credibility, authority, and bias
- Validate information - Cross-reference multiple sources
- Protect privacy - Avoid tracking, use secure connections
- Document findings - Track sources and evidence
- Assess reliability - Determine confidence level in results
What is Secure Web Search?
Secure Web Search involves:
- Privacy protection: Preventing tracking and data collection
- Source verification: Ensuring information comes from credible sources
- Information validation: Cross-referencing and fact-checking
- Bias awareness: Recognizing potential source biases
- Safe browsing: Avoiding malicious sites and phishing
- Data integrity: Ensuring information hasn't been altered
Search Privacy Protection
Privacy-Focused Search Engines
DuckDuckGo:
- No tracking or profiling
- No search history storage
- Anonymous search results
- Built-in tracker blocking
Startpage:
- Google results without tracking
- Anonymous view feature
- No IP address logging
- EU-based privacy protection
Brave Search:
- Independent index
- No user profiling
- Anonymous search
- Open-source transparent ranking
Searx/SearXNG:
- Meta-search engine
- Self-hostable
- No tracking
- Aggregates multiple search engines
Search Privacy Best Practices
Avoid revealing patterns:
- Don't use personal information in queries
- Vary search terms to prevent profiling
- Use broad terms before narrow searches
- Consider timing of searches
Protect identity:
- Use VPN for sensitive searches
- Clear cookies regularly
- Use private/incognito mode
- Disable search history
Secure connections:
- Always use HTTPS
- Verify SSL certificates
- Avoid public WiFi for sensitive searches
- Use encrypted DNS (DoH/DoT)
Effective Search Techniques
Basic Search Operators
Exact phrase matching:
"exact phrase here"
Example: "climate change impact" 2024
Exclude terms:
search term -excluded
Example: python tutorial -Django
OR operator:
term1 OR term2
Example: JavaScript OR TypeScript framework
Wildcard:
search * term
Example: best * programming language 2024
Site-specific search:
site:domain.com search term
Example: site:github.com authentication library
File type search:
filetype:ext search term
Example: filetype:pdf security best practices
Date range:
search term after:2024-01-01
search term before:2024-12-31
Example: AI developments after:2024-06-01
Advanced Search Operators
Related sites:
related:domain.com
Example: related:stackoverflow.com
In URL:
inurl:keyword
Example: inurl:documentation API design
In title:
intitle:keyword
Example: intitle:"best practices" security
Cache view:
cache:domain.com
Example: cache:example.com/article
Numeric ranges:
search term 100..500
Example: laptop price $800..$1200
Combining operators:
site:edu filetype:pdf "research paper" climate change after:2023
Source Verification
Credibility Assessment
Check domain authority:
- .edu (educational institutions)
- .gov (government agencies)
- .org (organizations - verify legitimacy)
- .com (commercial - verify credibility)
Verify author credentials:
- Professional qualifications
- Academic affiliations
- Industry experience
- Publication history
- Peer recognition
Review publication date:
- Recent information for current topics
- Historical context for established facts
- Update frequency
- Version or revision history
Assess editorial standards:
- Fact-checking processes
- Editorial oversight
- Correction policies
- Source citations
Red Flags for Unreliable Sources
Content warning signs:
- No author attribution
- Extreme or sensational language
- Unsupported claims
- No citations or references
- Grammar and spelling errors
- Contradicts established facts
Site warning signs:
- No about page or contact info
- Excessive advertising
- Misleading domain names
- No privacy policy
- Poor site security (no HTTPS)
- Popup-heavy design
Bias indicators:
- Political or ideological slant
- Financial conflicts of interest
- Selective fact presentation
- Emotional manipulation
- Echo chamber characteristics
Source Verification Checklist
- Author identified and credentials verified
- Publication date is recent (for current topics)
- Domain is reputable and secure (HTTPS)
- Information is cited with sources
- Cross-referenced with other credible sources
- No obvious bias or agenda
- Editorial standards are evident
- Contact information available
- No red flags for misinformation
- Consistent with expert consensus
Information Validation
Cross-Reference Multiple Sources
Triangulation method:
- Find at least 3 independent sources
- Compare information across sources
- Look for consensus on key facts
- Note discrepancies and investigate
- Prioritize primary sources
Source diversity:
- Academic research papers
- Reputable news organizations
- Government/official statistics
- Industry experts
- Independent fact-checkers
Primary vs secondary sources:
- Primary: Original research, data, documents
- Secondary: Analysis, interpretation, reporting
- Prefer primary when available
- Verify secondary against primary
Fact-Checking Resources
Established fact-checkers:
- FactCheck.org
- Snopes.com
- PolitiFact
- Full Fact
- AFP Fact Check
- Reuters Fact Check
Academic databases:
- Google Scholar
- PubMed (medical)
- JSTOR
- arXiv (preprints)
- IEEE Xplore (technical)
Government sources:
- Official statistics agencies
- Regulatory bodies
- Legislative databases
- Public records
Specialized validators:
- Media Bias/Fact Check (news bias)
- Retraction Watch (scientific retractions)
- AllSides (political bias)
- NewsGuard (news reliability)
Evidence Quality Assessment
Strongest evidence:
- Peer-reviewed research
- Official government data
- Primary source documents
- Expert consensus
- Replicated studies
Moderate evidence:
- Reputable journalism
- Industry reports
- Expert opinions
- Well-documented analysis
- Established organizations
Weakest evidence:
- Anecdotal reports
- Social media claims
- Unverified sources
- Conflicting information
- Opinion pieces without support
Secure Search Workflows
Research Workflow
1. Planning phase:
- Define research question
- Identify key terms and concepts
- List potential source types
- Determine credibility requirements
2. Initial search:
- Use broad terms to understand landscape
- Identify authoritative sources
- Note common themes and terminology
- Bookmark promising sources
3. Deep research:
- Use advanced search operators
- Access primary sources
- Cross-reference findings
- Track citations and references
4. Verification:
- Check author credentials
- Verify publication dates
- Cross-reference facts
- Consult fact-checkers
5. Documentation:
- Save source URLs
- Note access dates
- Record key quotes with citations
- Track evidence quality
Fact-Checking Workflow
1. Identify claim:
- Extract specific factual claim
- Note original source
- Understand context
2. Search for primary source:
- Find original data or research
- Verify attribution
- Check for misquotes or context removal
3. Consult fact-checkers:
- Search established fact-checking sites
- Look for previous verification
- Note fact-checker methodology
4. Expert verification:
- Find domain experts
- Check academic consensus
- Review peer-reviewed research
5. Document findings:
- True/False/Misleading/Unverified
- Evidence summary
- Source quality assessment
- Confidence level
Investigative Research Workflow
1. Start with known facts:
- Establish baseline verified information
- Identify information gaps
- List questions to answer
2. Expand search scope:
- Use related search operators
- Explore connected topics
- Find primary documents
3. Follow citation trails:
- Check source references
- Find original studies
- Trace information lineage
4. Verify independently:
- Don't rely on single source
- Cross-reference multiple times
- Check for contradictions
5. Assess confidence:
- Rate evidence quality
- Note uncertainties
- Document limitations
Privacy and Security
Protecting Search Privacy
Browser configuration:
- Use privacy-focused browsers (Brave, Firefox)
- Enable tracking protection
- Block third-party cookies
- Use extensions (uBlock Origin, Privacy Badger)
- Enable Do Not Track
Network security:
- Use VPN for sensitive searches
- Enable DNS over HTTPS (DoH)
- Avoid public WiFi for sensitive research
- Use Tor for maximum anonymity (when necessary)
Search history management:
- Regularly clear history
- Use private/incognito mode
- Disable search suggestions
- Use separate browser profiles
Account isolation:
- Don't search while logged into services
- Use separate email for sensitive topics
- Avoid Google/Microsoft accounts for private searches
- Use disposable email addresses
Safe Browsing Practices
Verify HTTPS:
- Check for padlock icon
- Verify certificate validity
- Avoid HTTP sites for sensitive information
- Be cautious of certificate warnings
Avoid malicious sites:
- Don't click suspicious links
- Verify URLs before clicking
- Use link checkers (VirusTotal)
- Enable safe browsing features
Phishing protection:
- Verify sender/domain legitimacy
- Hover over links before clicking
- Check for misspellings in URLs
- Don't enter credentials on unknown sites
Download safety:
- Scan files with antivirus
- Only download from trusted sources
- Verify file signatures when available
- Use sandboxed environments for testing
Search Query Best Practices
Effective Query Construction
Be specific:
❌ programming
✅ Python async programming best practices 2024
Use quotes for phrases:
❌ climate change effects
✅ "climate change effects" agricultural productivity
Combine operators:
✅ site:edu filetype:pdf "machine learning" ethics
✅ (Python OR JavaScript) tutorial -beginners after:2024
Target specific sources:
✅ site:github.com authentication library stars:>1000
✅ site:stackoverflow.com [python] database connection pooling
Query Refinement
Start broad, then narrow:
- General topic search
- Add specific terms
- Filter by date/type
- Target authoritative sources
Use search feedback:
- Check "related searches"
- Review autocomplete suggestions
- Note common terminology
- Adjust based on results quality
Iterate and refine:
- Try multiple phrasings
- Use synonyms
- Adjust specificity
- Change search operators
Bias and Perspective Awareness
Recognizing Bias
Political bias:
- Left/right leaning language
- Selective fact presentation
- Partisan framing
- Ideological assumptions
Commercial bias:
- Sponsored content
- Affiliate relationships
- Advertising influence
- Product promotion
Confirmation bias:
- Seeking supporting evidence only
- Ignoring contradictory information
- Cherry-picking sources
- Motivated reasoning
Cultural bias:
- Western-centric perspectives
- Regional assumptions
- Cultural stereotypes
- Language limitations
Seeking Diverse Perspectives
Geographic diversity:
- International news sources
- Regional publications
- Non-Western perspectives
- Local reporting
Ideological diversity:
- Conservative and liberal sources
- Academic vs popular sources
- Industry vs independent analysis
- Government vs watchdog groups
Expertise diversity:
- Academic researchers
- Industry practitioners
- Policy makers
- Affected communities
Methodological diversity:
- Quantitative studies
- Qualitative research
- Case studies
- Meta-analyses
Specialized Search Types
Academic Research Search
Academic databases:
- Google Scholar
- PubMed (medical/health)
- IEEE Xplore (engineering/tech)
- JSTOR (humanities)
- arXiv (preprints)
Search strategies:
author:"lastname" "research topic"
allintitle: key terms here
"exact methodology phrase"
filetype:pdf site:edu
Quality indicators:
- Peer-reviewed journals
- Citation count
- H-index of authors
- Impact factor
- Recent publication
News and Current Events
Reputable news sources:
- Associated Press (AP)
- Reuters
- BBC News
- NPR
- ProPublica (investigative)
News search techniques:
"news topic" after:YYYY-MM-DD
site:reuters.com OR site:ap.org topic
"breaking news" -opinion -editorial
Verification:
- Check multiple news sources
- Find original statements/documents
- Consult fact-checkers
- Note update timestamps
Technical Documentation
Official sources:
- Official documentation sites
- GitHub repositories
- Stack Overflow
- Technical blogs (verified experts)
Search patterns:
site:docs.python.org specific function
site:github.com language:python topic stars:>100
[tag] error message site:stackoverflow.com
"official documentation" framework version
Legal and Regulatory
Official sources:
- Government websites (.gov)
- Legal databases
- Regulatory agencies
- Court records
Search techniques:
site:gov law OR regulation topic
filetype:pdf "legal code" section
"court case" parties site:justia.com
"federal register" regulation
Documentation and Citation
Recording Sources
Essential information:
- Full URL
- Page title
- Author(s)
- Publication date
- Access date
- Publisher/site name
- Relevant quotes with page numbers (for PDFs)
Organization methods:
- Bookmarking tools (Pocket, Raindrop.io)
- Reference managers (Zotero, Mendeley)
- Note-taking apps (Notion, Obsidian)
- Spreadsheets with metadata
Citation Formats
APA style:
Author, A. A. (Year, Month Day). Title of page. Site Name. URL
MLA style:
Author Last Name, First Name. "Title of Page." Website Name, Day Month Year, URL.
Chicago style:
Author First Name Last Name, "Title of Page," Website Name, accessed Month Day, Year, URL.
Simple attribution:
Source: [Title] by [Author] ([Site], [Date]) - [URL]
Quality Assessment Framework
CRAAP Test
Currency:
- When was information published/updated?
- Is it current enough for your topic?
- Are links functional?
Relevance:
- Does it answer your question?
- Is it appropriate for your audience/purpose?
- Is it at the right level (basic/advanced)?
Authority:
- Who is the author/publisher?
- What are their credentials?
- Is contact information provided?
- Is domain appropriate (.edu, .gov, .org)?
Accuracy:
- Is information supported by evidence?
- Can you verify information elsewhere?
- Are sources cited?
- Is language unbiased?
Purpose:
- Why was information published?
- Is there commercial/political agenda?
- Is it fact, opinion, or propaganda?
- Is bias evident?
Confidence Levels
High confidence (90%+):
- Multiple authoritative sources agree
- Primary sources verified
- Peer-reviewed research
- Expert consensus
- Recent and comprehensive
Medium confidence (50-90%):
- Reputable sources with some agreement
- Secondary sources verified
- Some expert support
- Reasonably current
- Minor inconsistencies
Low confidence (<50%):
- Single source or conflicting sources
- Unverified claims
- Questionable authority
- Outdated information
- Significant inconsistencies
Unverified:
- Cannot confirm information
- Conflicting evidence
- No credible sources
- Requires further investigation
Red Flags and Warning Signs
Content Red Flags
Misinformation indicators:
- No author or credentials
- Extreme claims without evidence
- Emotional manipulation
- Conspiracy theories
- "Too good to be true" claims
Low quality indicators:
- Poor grammar/spelling
- Clickbait headlines
- Excessive ads
- Autoplay videos
- No dates or sources
Manipulation indicators:
- Cherry-picked statistics
- Misleading graphs
- Out-of-context quotes
- Logical fallacies
- False equivalencies
Technical Red Flags
Security concerns:
- No HTTPS encryption
- Invalid SSL certificates
- Suspicious download prompts
- Excessive permissions requests
- Malware warnings
Privacy concerns:
- Excessive tracking scripts
- Data collection without notice
- No privacy policy
- Suspicious redirects
- Fingerprinting techniques
Best Practices Checklist
When performing secure web searches:
- Use privacy-focused search engine or incognito mode
- Craft specific query with appropriate operators
- Verify HTTPS on all visited sites
- Check source credibility and author credentials
- Cross-reference with at least 3 independent sources
- Consult fact-checkers for controversial claims
- Note publication dates and update frequency
- Assess potential bias and conflicts of interest
- Document sources with full citation information
- Rate confidence level in findings
- Clear browser history after sensitive searches
- Use VPN for highly sensitive research
Key Principles
- Privacy first - Protect your search privacy and identity
- Verify sources - Check credibility before trusting information
- Cross-reference - Never rely on a single source
- Think critically - Question claims and assess evidence
- Use operators - Leverage advanced search techniques
- Document thoroughly - Track sources and evidence
- Stay current - Check publication dates and updates
- Recognize bias - Understand source perspectives and agendas
- Secure connections - Always use HTTPS and avoid malicious sites
- Assess confidence - Rate reliability of your findings
Workflow Summary
When user asks to perform secure web search:
- Define objective - What information is needed and why?
- Plan search strategy - Choose engines, operators, and sources
- Protect privacy - Use appropriate privacy tools and techniques
- Execute search - Craft effective queries with operators
- Verify sources - Check credibility, authority, and bias
- Cross-reference - Find multiple independent confirmations
- Fact-check - Consult fact-checkers and primary sources
- Assess quality - Apply CRAAP test and evidence evaluation
- Document findings - Record sources with full citations
- Rate confidence - Determine reliability level of information
Remember: Secure web search combines privacy protection, source verification, and critical thinking. Always question information, verify independently, and protect your privacy throughout the research process.
快速安装
/plugin add https://github.com/ronnycoding/.claude/tree/main/secure-web-search在 Claude Code 中复制并粘贴此命令以安装该技能
GitHub 仓库
相关推荐技能
langchain
元LangChain是一个用于构建LLM应用程序的框架,支持智能体、链和RAG应用开发。它提供多模型提供商支持、500+工具集成、记忆管理和向量检索等核心功能。开发者可用它快速构建聊天机器人、问答系统和自主代理,适用于从原型验证到生产部署的全流程。
project-structure
元这个Skill为开发者提供全面的项目目录结构设计指南和最佳实践。它涵盖了多种项目类型包括monorepo、前后端框架、库和扩展的标准组织结构。帮助团队创建可扩展、易维护的代码架构,特别适用于新项目设计、遗留项目迁移和团队规范制定。
issue-documentation
元该Skill为开发者提供标准化的issue文档模板和指南,适用于创建bug报告、GitHub/Linear/Jira问题等场景。它能系统化地记录问题状况、复现步骤、根本原因、解决方案和影响范围,确保团队沟通清晰高效。通过实施主流问题跟踪系统的最佳实践,帮助开发者生成结构完整的故障排除文档和事件报告。
llamaindex
元LlamaIndex是一个专门构建RAG应用的开发框架,提供300多种数据连接器用于文档摄取、索引和查询。它具备向量索引、查询引擎和智能代理等核心功能,支持构建文档问答、知识检索和聊天机器人等数据密集型应用。开发者可用它快速搭建连接私有数据与LLM的RAG管道。
