attestation-root-diversity-analyzer
Helps measure the concentration of trust roots in a skill's attestation graph — identifying monoculture risk where a single compromised root invalidates an entire chain that appears to have multiple validators.
Best use case
attestation-root-diversity-analyzer is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Helps measure the concentration of trust roots in a skill's attestation graph — identifying monoculture risk where a single compromised root invalidates an entire chain that appears to have multiple validators.
Teams using attestation-root-diversity-analyzer should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/attestation-root-diversity-analyzer/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How attestation-root-diversity-analyzer Compares
| Feature / Agent | attestation-root-diversity-analyzer | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Helps measure the concentration of trust roots in a skill's attestation graph — identifying monoculture risk where a single compromised root invalidates an entire chain that appears to have multiple validators.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
AI Agents for Marketing
Discover AI agents for marketing workflows, from SEO and content production to campaign research, outreach, and analytics.
AI Agents for Startups
Explore AI agent skills for startup validation, product research, growth experiments, documentation, and fast execution with small teams.
SKILL.md Source
# The Attestation Chain Has Seven Links. They All Trace Back to One Root. > Helps identify when a skill's trust chain is structurally fragile — not because individual links are weak, but because all paths converge on a single root that one compromise can invalidate. ## Problem A skill with five attestation badges looks more trustworthy than a skill with one. But if four of those five badges trace back through the same root attestor, the effective trust diversity is closer to two than to five. The appearance of multiple independent validators is real; the independence is not. This is a topology problem, not a cryptography problem. A trust graph where all paths converge on a single root is not a distributed trust system — it's a hub-and-spoke system wearing the visual appearance of a mesh. A hub-and-spoke system has all the failure properties of centralized trust: compromise the hub, and every spoke-rooted badge becomes invalid simultaneously. The risk is not hypothetical. Self-attesting roots — where the publisher is also the root attestor, or where multiple attestation badges trace back to a single organization — are common in ecosystems where attestation is new and infrastructure is thin. A skill from a well-known publisher that has also reviewed its own dependencies through affiliated validators presents structural fragility even if every individual attestation is cryptographically correct. Measuring this requires looking at the full trust graph, not just the badges at the leaves. ## What This Analyzes This analyzer examines attestation root diversity across five dimensions: 1. **Root concentration index** — What fraction of the attestation graph's trust paths converge on each distinct root? A Herfindahl-style concentration measure identifies whether trust is effectively distributed or structurally centralized 2. **Self-attestation detection** — Does the skill's publisher appear anywhere in its own trust chain? Self-attestation is not inherently invalid, but it must be disclosed and weighted appropriately 3. **Organizational diversity** — Are the distinct roots associated with independent organizations, or do multiple roots trace back to the same controlling entity through different organizational names? 4. **Effective validator count** — After accounting for convergence, how many truly independent validators contribute to the skill's trust score? A skill with 12 badges from 3 organizations has an effective count of 3, not 12 5. **Structural fragility score** — If the highest-concentration root were compromised, what percentage of the skill's attestation graph would be invalidated? ## How to Use **Input**: Provide one of: - A skill identifier with its attestation metadata - A trust graph (validator chain, root identifiers) to analyze - Two skills to compare relative root concentration **Output**: A root diversity report containing: - Root concentration index (0 = fully distributed, 1 = single root) - Attestation graph visualization (text-based) - Self-attestation flags - Organizational diversity assessment - Effective validator count - Structural fragility score - Diversity verdict: DISTRIBUTED / CONCENTRATED / MONOCULTURE / SELF-ATTESTING ## Example **Input**: Analyze attestation root diversity for `workflow-automator` skill ``` 🌐 ATTESTATION ROOT DIVERSITY ANALYSIS Skill: workflow-automator Attestation badges: 7 Audit timestamp: 2025-04-20T14:00:00Z Trust graph structure: Badge A → Validator-1 → Root-Alpha (publisher-org) Badge B → Validator-2 → Root-Alpha (publisher-org) Badge C → Validator-3 → Root-Alpha (publisher-org) Badge D → Validator-4 → Root-Beta (third-party) Badge E → Validator-5 → Root-Beta (third-party) Badge F → Validator-6 → Root-Alpha (publisher-org) ← affiliate Badge G → Validator-7 → Root-Gamma (community) Root concentration analysis: Root-Alpha (publisher-org): 4/7 paths (57%) → publisher + 3 affiliated validators Root-Beta (third-party): 2/7 paths (29%) Root-Gamma (community): 1/7 paths (14%) Herfindahl index: 0.57² + 0.29² + 0.14² = 0.42 (0 = perfect distribution, 1 = single root) Classification: CONCENTRATED (threshold: >0.33 = concentrated) Self-attestation: ⚠️ DETECTED Root-Alpha is publisher-org — publisher attests to its own skill 3 of 7 badges trace directly to publisher-controlled validators Organizational diversity: Distinct organizations: 3 (publisher-org, third-party, community) Effective independent: 2 (publisher-org counts as 1 despite 4 paths) Effective validator count: 2.4 (weighted by independence) Structural fragility: If Root-Alpha were compromised: 4/7 badges (57%) invalidated Residual trust: Root-Beta (29%) + Root-Gamma (14%) = 43% Diversity verdict: CONCENTRATED 7 badges with 3 roots, but effective independence is 2.4 validators. Root-Alpha concentration exceeds recommended threshold for high-impact skills. Self-attestation by publisher reduces independence further. Recommended actions: 1. Require minimum 2 non-publisher roots for full DISTRIBUTED status 2. Disclose self-attestation presence in badge display 3. Weight Root-Alpha badges at 0.5× for concentration-aware scoring 4. Target Root-Gamma growth to reduce Alpha concentration below 0.33 ``` ## Related Tools - **attestation-chain-auditor** — Validates chain integrity and completeness; root diversity analyzer measures whether that chain's roots are structurally independent - **transparency-log-auditor** — Checks whether signing events are independently auditable; diverse roots are more valuable when each root's behavior is logged - **publisher-identity-verifier** — Verifies publisher identity; publisher as self-attesting root is a specific concentration risk to flag - **trust-velocity-calculator** — Quantifies trust decay rate; concentrated attestation graphs decay faster when a root is compromised ## Limitations Root diversity analysis requires access to the full attestation graph, including the organizational relationships between validators — data that many current marketplaces do not expose. Where only the leaf badges are visible and root relationships must be inferred, the analysis is necessarily approximate. Organizational independence is difficult to verify programmatically: two organizations with different names may share effective control. The Herfindahl-based concentration measure is a useful heuristic, not a definitive security assessment — the appropriate threshold depends on the risk profile of the capability being attested. A concentrated attestation graph is a structural concern, not a confirmation of compromise; it means the trust infrastructure is more fragile, not that it has already failed.
Related Skills
Profit Margin Analyzer
Analyze and optimize profit margins across your business. Identifies margin compression, pricing opportunities, and cost levers.
Pricing Strategy Analyzer
Analyze and optimize pricing for any product or service. Covers value-based, cost-plus, competitive, and tiered pricing models.
Portfolio Risk Analyzer
Complete investment portfolio risk management system. Analyze positions, calculate risk metrics, stress test scenarios, optimize allocations, and generate institutional-grade risk reports — all without external APIs.
Commercial Lease Analyzer
Analyze commercial leases (office, retail, industrial, warehouse) for hidden costs, unfavorable terms, and negotiation leverage. Use when reviewing a new lease, renegotiating a renewal, or comparing multiple lease options.
Franchise Operations Analyzer
Evaluate franchise opportunities and manage multi-unit operations with data-driven frameworks.
Financial Due Diligence Analyzer
Run comprehensive financial due diligence on acquisition targets, investment opportunities, or partnership prospects. Built for PE firms, corporate development teams, and founders evaluating deals.
Employee Retention & Turnover Risk Analyzer
Diagnose why people leave. Fix it before they do.
Contract Analyzer
Analyzes contracts and agreements for risks, unusual terms, and missing clauses
Churn Risk Analyzer
Identify customers most likely to churn before they leave. Uses behavioral signals, usage patterns, and engagement data to score accounts and recommend retention actions.
simple-tech-analyzer - 简易技术分析器
**版本**: 1.0.0
seo-analyzer
Analyzes websites for SEO opportunities. Generates keyword ideas, checks on-page SEO factors, and provides actionable optimization recommendations.
sentiment-analyzer
Analyzes sentiment from social media, news headlines, and financial text. Outputs positive/negative/neutral scores with confidence levels and key phrase extraction.