Claude Code Plugins

Community-maintained marketplace

Feedback

secure-web-search

@ronnycoding/.claude
2
0

Guide for performing secure web searches with privacy protection, source verification, and information validation. Use when the user wants to search the web securely, verify sources, fact-check information, or mentions secure search, privacy, source validation, or web research.

Install Skill

1Download skill
2Enable skills in Claude

Open claude.ai/settings/capabilities and find the "Skills" section

3Upload to Claude

Click "Upload skill" and select the downloaded ZIP file

Note: Please verify skill by going through its instructions before using it.

SKILL.md

name secure-web-search
description Guide for performing secure web searches with privacy protection, source verification, and information validation. Use when the user wants to search the web securely, verify sources, fact-check information, or mentions secure search, privacy, source validation, or web research.

Secure Web Search Guide

This skill helps you perform secure web searches while protecting privacy, verifying sources, and validating information accuracy. Essential for research, fact-checking, and gathering reliable information.

Quick Start

When performing secure web searches, follow this workflow:

  1. Define search intent - What information do you need and why?
  2. Choose search method - Direct search, privacy-focused engine, or specialized tools
  3. Craft effective query - Use search operators and specific terms
  4. Verify sources - Check credibility, authority, and bias
  5. Validate information - Cross-reference multiple sources
  6. Protect privacy - Avoid tracking, use secure connections
  7. Document findings - Track sources and evidence
  8. Assess reliability - Determine confidence level in results

What is Secure Web Search?

Secure Web Search involves:

  • Privacy protection: Preventing tracking and data collection
  • Source verification: Ensuring information comes from credible sources
  • Information validation: Cross-referencing and fact-checking
  • Bias awareness: Recognizing potential source biases
  • Safe browsing: Avoiding malicious sites and phishing
  • Data integrity: Ensuring information hasn't been altered

Search Privacy Protection

Privacy-Focused Search Engines

DuckDuckGo:

  • No tracking or profiling
  • No search history storage
  • Anonymous search results
  • Built-in tracker blocking

Startpage:

  • Google results without tracking
  • Anonymous view feature
  • No IP address logging
  • EU-based privacy protection

Brave Search:

  • Independent index
  • No user profiling
  • Anonymous search
  • Open-source transparent ranking

Searx/SearXNG:

  • Meta-search engine
  • Self-hostable
  • No tracking
  • Aggregates multiple search engines

Search Privacy Best Practices

Avoid revealing patterns:

  • Don't use personal information in queries
  • Vary search terms to prevent profiling
  • Use broad terms before narrow searches
  • Consider timing of searches

Protect identity:

  • Use VPN for sensitive searches
  • Clear cookies regularly
  • Use private/incognito mode
  • Disable search history

Secure connections:

  • Always use HTTPS
  • Verify SSL certificates
  • Avoid public WiFi for sensitive searches
  • Use encrypted DNS (DoH/DoT)

Effective Search Techniques

Basic Search Operators

Exact phrase matching:

"exact phrase here"

Example: "climate change impact" 2024

Exclude terms:

search term -excluded

Example: python tutorial -Django

OR operator:

term1 OR term2

Example: JavaScript OR TypeScript framework

Wildcard:

search * term

Example: best * programming language 2024

Site-specific search:

site:domain.com search term

Example: site:github.com authentication library

File type search:

filetype:ext search term

Example: filetype:pdf security best practices

Date range:

search term after:2024-01-01
search term before:2024-12-31

Example: AI developments after:2024-06-01

Advanced Search Operators

Related sites:

related:domain.com

Example: related:stackoverflow.com

In URL:

inurl:keyword

Example: inurl:documentation API design

In title:

intitle:keyword

Example: intitle:"best practices" security

Cache view:

cache:domain.com

Example: cache:example.com/article

Numeric ranges:

search term 100..500

Example: laptop price $800..$1200

Combining operators:

site:edu filetype:pdf "research paper" climate change after:2023

Source Verification

Credibility Assessment

Check domain authority:

  • .edu (educational institutions)
  • .gov (government agencies)
  • .org (organizations - verify legitimacy)
  • .com (commercial - verify credibility)

Verify author credentials:

  • Professional qualifications
  • Academic affiliations
  • Industry experience
  • Publication history
  • Peer recognition

Review publication date:

  • Recent information for current topics
  • Historical context for established facts
  • Update frequency
  • Version or revision history

Assess editorial standards:

  • Fact-checking processes
  • Editorial oversight
  • Correction policies
  • Source citations

Red Flags for Unreliable Sources

Content warning signs:

  • No author attribution
  • Extreme or sensational language
  • Unsupported claims
  • No citations or references
  • Grammar and spelling errors
  • Contradicts established facts

Site warning signs:

  • No about page or contact info
  • Excessive advertising
  • Misleading domain names
  • No privacy policy
  • Poor site security (no HTTPS)
  • Popup-heavy design

Bias indicators:

  • Political or ideological slant
  • Financial conflicts of interest
  • Selective fact presentation
  • Emotional manipulation
  • Echo chamber characteristics

Source Verification Checklist

  • Author identified and credentials verified
  • Publication date is recent (for current topics)
  • Domain is reputable and secure (HTTPS)
  • Information is cited with sources
  • Cross-referenced with other credible sources
  • No obvious bias or agenda
  • Editorial standards are evident
  • Contact information available
  • No red flags for misinformation
  • Consistent with expert consensus

Information Validation

Cross-Reference Multiple Sources

Triangulation method:

  1. Find at least 3 independent sources
  2. Compare information across sources
  3. Look for consensus on key facts
  4. Note discrepancies and investigate
  5. Prioritize primary sources

Source diversity:

  • Academic research papers
  • Reputable news organizations
  • Government/official statistics
  • Industry experts
  • Independent fact-checkers

Primary vs secondary sources:

  • Primary: Original research, data, documents
  • Secondary: Analysis, interpretation, reporting
  • Prefer primary when available
  • Verify secondary against primary

Fact-Checking Resources

Established fact-checkers:

  • FactCheck.org
  • Snopes.com
  • PolitiFact
  • Full Fact
  • AFP Fact Check
  • Reuters Fact Check

Academic databases:

  • Google Scholar
  • PubMed (medical)
  • JSTOR
  • arXiv (preprints)
  • IEEE Xplore (technical)

Government sources:

  • Official statistics agencies
  • Regulatory bodies
  • Legislative databases
  • Public records

Specialized validators:

  • Media Bias/Fact Check (news bias)
  • Retraction Watch (scientific retractions)
  • AllSides (political bias)
  • NewsGuard (news reliability)

Evidence Quality Assessment

Strongest evidence:

  • Peer-reviewed research
  • Official government data
  • Primary source documents
  • Expert consensus
  • Replicated studies

Moderate evidence:

  • Reputable journalism
  • Industry reports
  • Expert opinions
  • Well-documented analysis
  • Established organizations

Weakest evidence:

  • Anecdotal reports
  • Social media claims
  • Unverified sources
  • Conflicting information
  • Opinion pieces without support

Secure Search Workflows

Research Workflow

1. Planning phase:

  • Define research question
  • Identify key terms and concepts
  • List potential source types
  • Determine credibility requirements

2. Initial search:

  • Use broad terms to understand landscape
  • Identify authoritative sources
  • Note common themes and terminology
  • Bookmark promising sources

3. Deep research:

  • Use advanced search operators
  • Access primary sources
  • Cross-reference findings
  • Track citations and references

4. Verification:

  • Check author credentials
  • Verify publication dates
  • Cross-reference facts
  • Consult fact-checkers

5. Documentation:

  • Save source URLs
  • Note access dates
  • Record key quotes with citations
  • Track evidence quality

Fact-Checking Workflow

1. Identify claim:

  • Extract specific factual claim
  • Note original source
  • Understand context

2. Search for primary source:

  • Find original data or research
  • Verify attribution
  • Check for misquotes or context removal

3. Consult fact-checkers:

  • Search established fact-checking sites
  • Look for previous verification
  • Note fact-checker methodology

4. Expert verification:

  • Find domain experts
  • Check academic consensus
  • Review peer-reviewed research

5. Document findings:

  • True/False/Misleading/Unverified
  • Evidence summary
  • Source quality assessment
  • Confidence level

Investigative Research Workflow

1. Start with known facts:

  • Establish baseline verified information
  • Identify information gaps
  • List questions to answer

2. Expand search scope:

  • Use related search operators
  • Explore connected topics
  • Find primary documents

3. Follow citation trails:

  • Check source references
  • Find original studies
  • Trace information lineage

4. Verify independently:

  • Don't rely on single source
  • Cross-reference multiple times
  • Check for contradictions

5. Assess confidence:

  • Rate evidence quality
  • Note uncertainties
  • Document limitations

Privacy and Security

Protecting Search Privacy

Browser configuration:

  • Use privacy-focused browsers (Brave, Firefox)
  • Enable tracking protection
  • Block third-party cookies
  • Use extensions (uBlock Origin, Privacy Badger)
  • Enable Do Not Track

Network security:

  • Use VPN for sensitive searches
  • Enable DNS over HTTPS (DoH)
  • Avoid public WiFi for sensitive research
  • Use Tor for maximum anonymity (when necessary)

Search history management:

  • Regularly clear history
  • Use private/incognito mode
  • Disable search suggestions
  • Use separate browser profiles

Account isolation:

  • Don't search while logged into services
  • Use separate email for sensitive topics
  • Avoid Google/Microsoft accounts for private searches
  • Use disposable email addresses

Safe Browsing Practices

Verify HTTPS:

  • Check for padlock icon
  • Verify certificate validity
  • Avoid HTTP sites for sensitive information
  • Be cautious of certificate warnings

Avoid malicious sites:

  • Don't click suspicious links
  • Verify URLs before clicking
  • Use link checkers (VirusTotal)
  • Enable safe browsing features

Phishing protection:

  • Verify sender/domain legitimacy
  • Hover over links before clicking
  • Check for misspellings in URLs
  • Don't enter credentials on unknown sites

Download safety:

  • Scan files with antivirus
  • Only download from trusted sources
  • Verify file signatures when available
  • Use sandboxed environments for testing

Search Query Best Practices

Effective Query Construction

Be specific:

❌ programming
✅ Python async programming best practices 2024

Use quotes for phrases:

❌ climate change effects
✅ "climate change effects" agricultural productivity

Combine operators:

✅ site:edu filetype:pdf "machine learning" ethics
✅ (Python OR JavaScript) tutorial -beginners after:2024

Target specific sources:

✅ site:github.com authentication library stars:>1000
✅ site:stackoverflow.com [python] database connection pooling

Query Refinement

Start broad, then narrow:

  1. General topic search
  2. Add specific terms
  3. Filter by date/type
  4. Target authoritative sources

Use search feedback:

  • Check "related searches"
  • Review autocomplete suggestions
  • Note common terminology
  • Adjust based on results quality

Iterate and refine:

  • Try multiple phrasings
  • Use synonyms
  • Adjust specificity
  • Change search operators

Bias and Perspective Awareness

Recognizing Bias

Political bias:

  • Left/right leaning language
  • Selective fact presentation
  • Partisan framing
  • Ideological assumptions

Commercial bias:

  • Sponsored content
  • Affiliate relationships
  • Advertising influence
  • Product promotion

Confirmation bias:

  • Seeking supporting evidence only
  • Ignoring contradictory information
  • Cherry-picking sources
  • Motivated reasoning

Cultural bias:

  • Western-centric perspectives
  • Regional assumptions
  • Cultural stereotypes
  • Language limitations

Seeking Diverse Perspectives

Geographic diversity:

  • International news sources
  • Regional publications
  • Non-Western perspectives
  • Local reporting

Ideological diversity:

  • Conservative and liberal sources
  • Academic vs popular sources
  • Industry vs independent analysis
  • Government vs watchdog groups

Expertise diversity:

  • Academic researchers
  • Industry practitioners
  • Policy makers
  • Affected communities

Methodological diversity:

  • Quantitative studies
  • Qualitative research
  • Case studies
  • Meta-analyses

Specialized Search Types

Academic Research Search

Academic databases:

  • Google Scholar
  • PubMed (medical/health)
  • IEEE Xplore (engineering/tech)
  • JSTOR (humanities)
  • arXiv (preprints)

Search strategies:

author:"lastname" "research topic"
allintitle: key terms here
"exact methodology phrase"
filetype:pdf site:edu

Quality indicators:

  • Peer-reviewed journals
  • Citation count
  • H-index of authors
  • Impact factor
  • Recent publication

News and Current Events

Reputable news sources:

  • Associated Press (AP)
  • Reuters
  • BBC News
  • NPR
  • ProPublica (investigative)

News search techniques:

"news topic" after:YYYY-MM-DD
site:reuters.com OR site:ap.org topic
"breaking news" -opinion -editorial

Verification:

  • Check multiple news sources
  • Find original statements/documents
  • Consult fact-checkers
  • Note update timestamps

Technical Documentation

Official sources:

  • Official documentation sites
  • GitHub repositories
  • Stack Overflow
  • Technical blogs (verified experts)

Search patterns:

site:docs.python.org specific function
site:github.com language:python topic stars:>100
[tag] error message site:stackoverflow.com
"official documentation" framework version

Legal and Regulatory

Official sources:

  • Government websites (.gov)
  • Legal databases
  • Regulatory agencies
  • Court records

Search techniques:

site:gov law OR regulation topic
filetype:pdf "legal code" section
"court case" parties site:justia.com
"federal register" regulation

Documentation and Citation

Recording Sources

Essential information:

  • Full URL
  • Page title
  • Author(s)
  • Publication date
  • Access date
  • Publisher/site name
  • Relevant quotes with page numbers (for PDFs)

Organization methods:

  • Bookmarking tools (Pocket, Raindrop.io)
  • Reference managers (Zotero, Mendeley)
  • Note-taking apps (Notion, Obsidian)
  • Spreadsheets with metadata

Citation Formats

APA style:

Author, A. A. (Year, Month Day). Title of page. Site Name. URL

MLA style:

Author Last Name, First Name. "Title of Page." Website Name, Day Month Year, URL.

Chicago style:

Author First Name Last Name, "Title of Page," Website Name, accessed Month Day, Year, URL.

Simple attribution:

Source: [Title] by [Author] ([Site], [Date]) - [URL]

Quality Assessment Framework

CRAAP Test

Currency:

  • When was information published/updated?
  • Is it current enough for your topic?
  • Are links functional?

Relevance:

  • Does it answer your question?
  • Is it appropriate for your audience/purpose?
  • Is it at the right level (basic/advanced)?

Authority:

  • Who is the author/publisher?
  • What are their credentials?
  • Is contact information provided?
  • Is domain appropriate (.edu, .gov, .org)?

Accuracy:

  • Is information supported by evidence?
  • Can you verify information elsewhere?
  • Are sources cited?
  • Is language unbiased?

Purpose:

  • Why was information published?
  • Is there commercial/political agenda?
  • Is it fact, opinion, or propaganda?
  • Is bias evident?

Confidence Levels

High confidence (90%+):

  • Multiple authoritative sources agree
  • Primary sources verified
  • Peer-reviewed research
  • Expert consensus
  • Recent and comprehensive

Medium confidence (50-90%):

  • Reputable sources with some agreement
  • Secondary sources verified
  • Some expert support
  • Reasonably current
  • Minor inconsistencies

Low confidence (<50%):

  • Single source or conflicting sources
  • Unverified claims
  • Questionable authority
  • Outdated information
  • Significant inconsistencies

Unverified:

  • Cannot confirm information
  • Conflicting evidence
  • No credible sources
  • Requires further investigation

Red Flags and Warning Signs

Content Red Flags

Misinformation indicators:

  • No author or credentials
  • Extreme claims without evidence
  • Emotional manipulation
  • Conspiracy theories
  • "Too good to be true" claims

Low quality indicators:

  • Poor grammar/spelling
  • Clickbait headlines
  • Excessive ads
  • Autoplay videos
  • No dates or sources

Manipulation indicators:

  • Cherry-picked statistics
  • Misleading graphs
  • Out-of-context quotes
  • Logical fallacies
  • False equivalencies

Technical Red Flags

Security concerns:

  • No HTTPS encryption
  • Invalid SSL certificates
  • Suspicious download prompts
  • Excessive permissions requests
  • Malware warnings

Privacy concerns:

  • Excessive tracking scripts
  • Data collection without notice
  • No privacy policy
  • Suspicious redirects
  • Fingerprinting techniques

Best Practices Checklist

When performing secure web searches:

  • Use privacy-focused search engine or incognito mode
  • Craft specific query with appropriate operators
  • Verify HTTPS on all visited sites
  • Check source credibility and author credentials
  • Cross-reference with at least 3 independent sources
  • Consult fact-checkers for controversial claims
  • Note publication dates and update frequency
  • Assess potential bias and conflicts of interest
  • Document sources with full citation information
  • Rate confidence level in findings
  • Clear browser history after sensitive searches
  • Use VPN for highly sensitive research

Key Principles

  1. Privacy first - Protect your search privacy and identity
  2. Verify sources - Check credibility before trusting information
  3. Cross-reference - Never rely on a single source
  4. Think critically - Question claims and assess evidence
  5. Use operators - Leverage advanced search techniques
  6. Document thoroughly - Track sources and evidence
  7. Stay current - Check publication dates and updates
  8. Recognize bias - Understand source perspectives and agendas
  9. Secure connections - Always use HTTPS and avoid malicious sites
  10. Assess confidence - Rate reliability of your findings

Workflow Summary

When user asks to perform secure web search:

  1. Define objective - What information is needed and why?
  2. Plan search strategy - Choose engines, operators, and sources
  3. Protect privacy - Use appropriate privacy tools and techniques
  4. Execute search - Craft effective queries with operators
  5. Verify sources - Check credibility, authority, and bias
  6. Cross-reference - Find multiple independent confirmations
  7. Fact-check - Consult fact-checkers and primary sources
  8. Assess quality - Apply CRAAP test and evidence evaluation
  9. Document findings - Record sources with full citations
  10. Rate confidence - Determine reliability level of information

Remember: Secure web search combines privacy protection, source verification, and critical thinking. Always question information, verify independently, and protect your privacy throughout the research process.