General

secure-web-search - Claude MCP Skill

Guide for performing secure web searches with privacy protection, source verification, and information validation. Use when the user wants to search the web securely, verify sources, fact-check information, or mentions secure search, privacy, source validation, or web research.

SEO Guide: Enhance your AI agent with the secure-web-search tool. This Model Context Protocol (MCP) server allows Claude Desktop and other LLMs to guide for performing secure web searches with privacy protection, source verification, and informati... Download and configure this skill to unlock new capabilities for your AI workflow.

🌟2 stars • 0 forks
šŸ“„0 downloads

Documentation

SKILL.md
# Secure Web Search Guide

This skill helps you perform secure web searches while protecting privacy, verifying sources, and validating information accuracy. Essential for research, fact-checking, and gathering reliable information.

## Quick Start

When performing secure web searches, follow this workflow:

1. **Define search intent** - What information do you need and why?
2. **Choose search method** - Direct search, privacy-focused engine, or specialized tools
3. **Craft effective query** - Use search operators and specific terms
4. **Verify sources** - Check credibility, authority, and bias
5. **Validate information** - Cross-reference multiple sources
6. **Protect privacy** - Avoid tracking, use secure connections
7. **Document findings** - Track sources and evidence
8. **Assess reliability** - Determine confidence level in results

## What is Secure Web Search?

**Secure Web Search** involves:

- **Privacy protection:** Preventing tracking and data collection
- **Source verification:** Ensuring information comes from credible sources
- **Information validation:** Cross-referencing and fact-checking
- **Bias awareness:** Recognizing potential source biases
- **Safe browsing:** Avoiding malicious sites and phishing
- **Data integrity:** Ensuring information hasn't been altered

## Search Privacy Protection

### Privacy-Focused Search Engines

**DuckDuckGo:**
- No tracking or profiling
- No search history storage
- Anonymous search results
- Built-in tracker blocking

**Startpage:**
- Google results without tracking
- Anonymous view feature
- No IP address logging
- EU-based privacy protection

**Brave Search:**
- Independent index
- No user profiling
- Anonymous search
- Open-source transparent ranking

**Searx/SearXNG:**
- Meta-search engine
- Self-hostable
- No tracking
- Aggregates multiple search engines

### Search Privacy Best Practices

**Avoid revealing patterns:**
- Don't use personal information in queries
- Vary search terms to prevent profiling
- Use broad terms before narrow searches
- Consider timing of searches

**Protect identity:**
- Use VPN for sensitive searches
- Clear cookies regularly
- Use private/incognito mode
- Disable search history

**Secure connections:**
- Always use HTTPS
- Verify SSL certificates
- Avoid public WiFi for sensitive searches
- Use encrypted DNS (DoH/DoT)

## Effective Search Techniques

### Basic Search Operators

**Exact phrase matching:**
```
"exact phrase here"
```
Example: `"climate change impact" 2024`

**Exclude terms:**
```
search term -excluded
```
Example: `python tutorial -Django`

**OR operator:**
```
term1 OR term2
```
Example: `JavaScript OR TypeScript framework`

**Wildcard:**
```
search * term
```
Example: `best * programming language 2024`

**Site-specific search:**
```
site:domain.com search term
```
Example: `site:github.com authentication library`

**File type search:**
```
filetype:ext search term
```
Example: `filetype:pdf security best practices`

**Date range:**
```
search term after:2024-01-01
search term before:2024-12-31
```
Example: `AI developments after:2024-06-01`

### Advanced Search Operators

**Related sites:**
```
related:domain.com
```
Example: `related:stackoverflow.com`

**In URL:**
```
inurl:keyword
```
Example: `inurl:documentation API design`

**In title:**
```
intitle:keyword
```
Example: `intitle:"best practices" security`

**Cache view:**
```
cache:domain.com
```
Example: `cache:example.com/article`

**Numeric ranges:**
```
search term 100..500
```
Example: `laptop price $800..$1200`

**Combining operators:**
```
site:edu filetype:pdf "research paper" climate change after:2023
```

## Source Verification

### Credibility Assessment

**Check domain authority:**
- .edu (educational institutions)
- .gov (government agencies)
- .org (organizations - verify legitimacy)
- .com (commercial - verify credibility)

**Verify author credentials:**
- Professional qualifications
- Academic affiliations
- Industry experience
- Publication history
- Peer recognition

**Review publication date:**
- Recent information for current topics
- Historical context for established facts
- Update frequency
- Version or revision history

**Assess editorial standards:**
- Fact-checking processes
- Editorial oversight
- Correction policies
- Source citations

### Red Flags for Unreliable Sources

**Content warning signs:**
- No author attribution
- Extreme or sensational language
- Unsupported claims
- No citations or references
- Grammar and spelling errors
- Contradicts established facts

**Site warning signs:**
- No about page or contact info
- Excessive advertising
- Misleading domain names
- No privacy policy
- Poor site security (no HTTPS)
- Popup-heavy design

**Bias indicators:**
- Political or ideological slant
- Financial conflicts of interest
- Selective fact presentation
- Emotional manipulation
- Echo chamber characteristics

### Source Verification Checklist

- [ ] Author identified and credentials verified
- [ ] Publication date is recent (for current topics)
- [ ] Domain is reputable and secure (HTTPS)
- [ ] Information is cited with sources
- [ ] Cross-referenced with other credible sources
- [ ] No obvious bias or agenda
- [ ] Editorial standards are evident
- [ ] Contact information available
- [ ] No red flags for misinformation
- [ ] Consistent with expert consensus

## Information Validation

### Cross-Reference Multiple Sources

**Triangulation method:**
1. Find at least 3 independent sources
2. Compare information across sources
3. Look for consensus on key facts
4. Note discrepancies and investigate
5. Prioritize primary sources

**Source diversity:**
- Academic research papers
- Reputable news organizations
- Government/official statistics
- Industry experts
- Independent fact-checkers

**Primary vs secondary sources:**
- **Primary:** Original research, data, documents
- **Secondary:** Analysis, interpretation, reporting
- Prefer primary when available
- Verify secondary against primary

### Fact-Checking Resources

**Established fact-checkers:**
- FactCheck.org
- Snopes.com
- PolitiFact
- Full Fact
- AFP Fact Check
- Reuters Fact Check

**Academic databases:**
- Google Scholar
- PubMed (medical)
- JSTOR
- arXiv (preprints)
- IEEE Xplore (technical)

**Government sources:**
- Official statistics agencies
- Regulatory bodies
- Legislative databases
- Public records

**Specialized validators:**
- Media Bias/Fact Check (news bias)
- Retraction Watch (scientific retractions)
- AllSides (political bias)
- NewsGuard (news reliability)

### Evidence Quality Assessment

**Strongest evidence:**
- Peer-reviewed research
- Official government data
- Primary source documents
- Expert consensus
- Replicated studies

**Moderate evidence:**
- Reputable journalism
- Industry reports
- Expert opinions
- Well-documented analysis
- Established organizations

**Weakest evidence:**
- Anecdotal reports
- Social media claims
- Unverified sources
- Conflicting information
- Opinion pieces without support

## Secure Search Workflows

### Research Workflow

**1. Planning phase:**
- Define research question
- Identify key terms and concepts
- List potential source types
- Determine credibility requirements

**2. Initial search:**
- Use broad terms to understand landscape
- Identify authoritative sources
- Note common themes and terminology
- Bookmark promising sources

**3. Deep research:**
- Use advanced search operators
- Access primary sources
- Cross-reference findings
- Track citations and references

**4. Verification:**
- Check author credentials
- Verify publication dates
- Cross-reference facts
- Consult fact-checkers

**5. Documentation:**
- Save source URLs
- Note access dates
- Record key quotes with citations
- Track evidence quality

### Fact-Checking Workflow

**1. Identify claim:**
- Extract specific factual claim
- Note original source
- Understand context

**2. Search for primary source:**
- Find original data or research
- Verify attribution
- Check for misquotes or context removal

**3. Consult fact-checkers:**
- Search established fact-checking sites
- Look for previous verification
- Note fact-checker methodology

**4. Expert verification:**
- Find domain experts
- Check academic consensus
- Review peer-reviewed research

**5. Document findings:**
- True/False/Misleading/Unverified
- Evidence summary
- Source quality assessment
- Confidence level

### Investigative Research Workflow

**1. Start with known facts:**
- Establish baseline verified information
- Identify information gaps
- List questions to answer

**2. Expand search scope:**
- Use related search operators
- Explore connected topics
- Find primary documents

**3. Follow citation trails:**
- Check source references
- Find original studies
- Trace information lineage

**4. Verify independently:**
- Don't rely on single source
- Cross-reference multiple times
- Check for contradictions

**5. Assess confidence:**
- Rate evidence quality
- Note uncertainties
- Document limitations

## Privacy and Security

### Protecting Search Privacy

**Browser configuration:**
- Use privacy-focused browsers (Brave, Firefox)
- Enable tracking protection
- Block third-party cookies
- Use extensions (uBlock Origin, Privacy Badger)
- Enable Do Not Track

**Network security:**
- Use VPN for sensitive searches
- Enable DNS over HTTPS (DoH)
- Avoid public WiFi for sensitive research
- Use Tor for maximum anonymity (when necessary)

**Search history management:**
- Regularly clear history
- Use private/incognito mode
- Disable search suggestions
- Use separate browser profiles

**Account isolation:**
- Don't search while logged into services
- Use separate email for sensitive topics
- Avoid Google/Microsoft accounts for private searches
- Use disposable email addresses

### Safe Browsing Practices

**Verify HTTPS:**
- Check for padlock icon
- Verify certificate validity
- Avoid HTTP sites for sensitive information
- Be cautious of certificate warnings

**Avoid malicious sites:**
- Don't click suspicious links
- Verify URLs before clicking
- Use link checkers (VirusTotal)
- Enable safe browsing features

**Phishing protection:**
- Verify sender/domain legitimacy
- Hover over links before clicking
- Check for misspellings in URLs
- Don't enter credentials on unknown sites

**Download safety:**
- Scan files with antivirus
- Only download from trusted sources
- Verify file signatures when available
- Use sandboxed environments for testing

## Search Query Best Practices

### Effective Query Construction

**Be specific:**
```
āŒ programming
āœ… Python async programming best practices 2024
```

**Use quotes for phrases:**
```
āŒ climate change effects
āœ… "climate change effects" agricultural productivity
```

**Combine operators:**
```
āœ… site:edu filetype:pdf "machine learning" ethics
āœ… (Python OR JavaScript) tutorial -beginners after:2024
```

**Target specific sources:**
```
āœ… site:github.com authentication library stars:>1000
āœ… site:stackoverflow.com [python] database connection pooling
```

### Query Refinement

**Start broad, then narrow:**
1. General topic search
2. Add specific terms
3. Filter by date/type
4. Target authoritative sources

**Use search feedback:**
- Check "related searches"
- Review autocomplete suggestions
- Note common terminology
- Adjust based on results quality

**Iterate and refine:**
- Try multiple phrasings
- Use synonyms
- Adjust specificity
- Change search operators

## Bias and Perspective Awareness

### Recognizing Bias

**Political bias:**
- Left/right leaning language
- Selective fact presentation
- Partisan framing
- Ideological assumptions

**Commercial bias:**
- Sponsored content
- Affiliate relationships
- Advertising influence
- Product promotion

**Confirmation bias:**
- Seeking supporting evidence only
- Ignoring contradictory information
- Cherry-picking sources
- Motivated reasoning

**Cultural bias:**
- Western-centric perspectives
- Regional assumptions
- Cultural stereotypes
- Language limitations

### Seeking Diverse Perspectives

**Geographic diversity:**
- International news sources
- Regional publications
- Non-Western perspectives
- Local reporting

**Ideological diversity:**
- Conservative and liberal sources
- Academic vs popular sources
- Industry vs independent analysis
- Government vs watchdog groups

**Expertise diversity:**
- Academic researchers
- Industry practitioners
- Policy makers
- Affected communities

**Methodological diversity:**
- Quantitative studies
- Qualitative research
- Case studies
- Meta-analyses

## Specialized Search Types

### Academic Research Search

**Academic databases:**
- Google Scholar
- PubMed (medical/health)
- IEEE Xplore (engineering/tech)
- JSTOR (humanities)
- arXiv (preprints)

**Search strategies:**
```
author:"lastname" "research topic"
allintitle: key terms here
"exact methodology phrase"
filetype:pdf site:edu
```

**Quality indicators:**
- Peer-reviewed journals
- Citation count
- H-index of authors
- Impact factor
- Recent publication

### News and Current Events

**Reputable news sources:**
- Associated Press (AP)
- Reuters
- BBC News
- NPR
- ProPublica (investigative)

**News search techniques:**
```
"news topic" after:YYYY-MM-DD
site:reuters.com OR site:ap.org topic
"breaking news" -opinion -editorial
```

**Verification:**
- Check multiple news sources
- Find original statements/documents
- Consult fact-checkers
- Note update timestamps

### Technical Documentation

**Official sources:**
- Official documentation sites
- GitHub repositories
- Stack Overflow
- Technical blogs (verified experts)

**Search patterns:**
```
site:docs.python.org specific function
site:github.com language:python topic stars:>100
[tag] error message site:stackoverflow.com
"official documentation" framework version
```

### Legal and Regulatory

**Official sources:**
- Government websites (.gov)
- Legal databases
- Regulatory agencies
- Court records

**Search techniques:**
```
site:gov law OR regulation topic
filetype:pdf "legal code" section
"court case" parties site:justia.com
"federal register" regulation
```

## Documentation and Citation

### Recording Sources

**Essential information:**
- Full URL
- Page title
- Author(s)
- Publication date
- Access date
- Publisher/site name
- Relevant quotes with page numbers (for PDFs)

**Organization methods:**
- Bookmarking tools (Pocket, Raindrop.io)
- Reference managers (Zotero, Mendeley)
- Note-taking apps (Notion, Obsidian)
- Spreadsheets with metadata

### Citation Formats

**APA style:**
```
Author, A. A. (Year, Month Day). Title of page. Site Name. URL
```

**MLA style:**
```
Author Last Name, First Name. "Title of Page." Website Name, Day Month Year, URL.
```

**Chicago style:**
```
Author First Name Last Name, "Title of Page," Website Name, accessed Month Day, Year, URL.
```

**Simple attribution:**
```
Source: [Title] by [Author] ([Site], [Date]) - [URL]
```

## Quality Assessment Framework

### CRAAP Test

**Currency:**
- When was information published/updated?
- Is it current enough for your topic?
- Are links functional?

**Relevance:**
- Does it answer your question?
- Is it appropriate for your audience/purpose?
- Is it at the right level (basic/advanced)?

**Authority:**
- Who is the author/publisher?
- What are their credentials?
- Is contact information provided?
- Is domain appropriate (.edu, .gov, .org)?

**Accuracy:**
- Is information supported by evidence?
- Can you verify information elsewhere?
- Are sources cited?
- Is language unbiased?

**Purpose:**
- Why was information published?
- Is there commercial/political agenda?
- Is it fact, opinion, or propaganda?
- Is bias evident?

### Confidence Levels

**High confidence (90%+):**
- Multiple authoritative sources agree
- Primary sources verified
- Peer-reviewed research
- Expert consensus
- Recent and comprehensive

**Medium confidence (50-90%):**
- Reputable sources with some agreement
- Secondary sources verified
- Some expert support
- Reasonably current
- Minor inconsistencies

**Low confidence (<50%):**
- Single source or conflicting sources
- Unverified claims
- Questionable authority
- Outdated information
- Significant inconsistencies

**Unverified:**
- Cannot confirm information
- Conflicting evidence
- No credible sources
- Requires further investigation

## Red Flags and Warning Signs

### Content Red Flags

**Misinformation indicators:**
- No author or credentials
- Extreme claims without evidence
- Emotional manipulation
- Conspiracy theories
- "Too good to be true" claims

**Low quality indicators:**
- Poor grammar/spelling
- Clickbait headlines
- Excessive ads
- Autoplay videos
- No dates or sources

**Manipulation indicators:**
- Cherry-picked statistics
- Misleading graphs
- Out-of-context quotes
- Logical fallacies
- False equivalencies

### Technical Red Flags

**Security concerns:**
- No HTTPS encryption
- Invalid SSL certificates
- Suspicious download prompts
- Excessive permissions requests
- Malware warnings

**Privacy concerns:**
- Excessive tracking scripts
- Data collection without notice
- No privacy policy
- Suspicious redirects
- Fingerprinting techniques

## Best Practices Checklist

When performing secure web searches:

- [ ] Use privacy-focused search engine or incognito mode
- [ ] Craft specific query with appropriate operators
- [ ] Verify HTTPS on all visited sites
- [ ] Check source credibility and author credentials
- [ ] Cross-reference with at least 3 independent sources
- [ ] Consult fact-checkers for controversial claims
- [ ] Note publication dates and update frequency
- [ ] Assess potential bias and conflicts of interest
- [ ] Document sources with full citation information
- [ ] Rate confidence level in findings
- [ ] Clear browser history after sensitive searches
- [ ] Use VPN for highly sensitive research

## Key Principles

1. **Privacy first** - Protect your search privacy and identity
2. **Verify sources** - Check credibility before trusting information
3. **Cross-reference** - Never rely on a single source
4. **Think critically** - Question claims and assess evidence
5. **Use operators** - Leverage advanced search techniques
6. **Document thoroughly** - Track sources and evidence
7. **Stay current** - Check publication dates and updates
8. **Recognize bias** - Understand source perspectives and agendas
9. **Secure connections** - Always use HTTPS and avoid malicious sites
10. **Assess confidence** - Rate reliability of your findings

## Workflow Summary

When user asks to perform secure web search:

1. **Define objective** - What information is needed and why?
2. **Plan search strategy** - Choose engines, operators, and sources
3. **Protect privacy** - Use appropriate privacy tools and techniques
4. **Execute search** - Craft effective queries with operators
5. **Verify sources** - Check credibility, authority, and bias
6. **Cross-reference** - Find multiple independent confirmations
7. **Fact-check** - Consult fact-checkers and primary sources
8. **Assess quality** - Apply CRAAP test and evidence evaluation
9. **Document findings** - Record sources with full citations
10. **Rate confidence** - Determine reliability level of information

Remember: Secure web search combines privacy protection, source verification, and critical thinking. Always question information, verify independently, and protect your privacy throughout the research process.

Signals

Avg rating⭐ 0.0
Reviews0
Favorites0

Information

Repository
ronnycoding/.claude
Author
ronnycoding
Last Sync
3/12/2026
Repo Updated
2/23/2026
Created
1/12/2026

Reviews (0)

No reviews yet. Be the first to review this skill!