Loading...
Loading...
This skill should be used when the user asks for markup detection, detect manipulation, image tampering, deepfake detection, document integrity, hidden markup, metadata forensics, EXIF analysis, content authenticity, synthetic media, altered image, C2PA, or provenance verification across documents, images, and video. Guides workflow-level assessment of visual tampering indicators (splicing, cloning, inconsistent lighting or shadows, compression artifacts), metadata and provenance checks (EXIF, hashes, source chain), document revision and hidden markup (tracked changes, comments, invisible text), synthetic-media and deepfake red flags, watermarking and content-credentials concepts, and structured reporting with confidence levels and explicit limitations—not training detection models (ml-research-engineer-safeguards), cryptographic watermark design (cryptographer-specialist), full digital forensics lab attribution or legal conclusions, or blockchain-only tracing unless the user scopes on-chain context.
npx skill4agent add daemon-blockint-tech/agentic-enteprises-skill markup-detectionml-research-engineer-safeguardscryptographer-specialistdigital-forensics-analystai-redteampenetration-testerauditorcompliance-engineer| Need | Skill |
|---|---|
| IAM, logging, DLP, and control implementation | |
| Adversarial testing of LLM apps and copilots | |
| Crypto signing, PKI, and watermark protocol design | |
| Internal audit, evidence standards, deficiency write-ups | |
| Technical control evidence and CCM pipelines | |
| Production LLM features and RAG (not media forensics) | |
| AI governance and risk tiers for synthetic content policy | |
| Disk/memory/log forensics and chain of custody | |
| Topic | Reference |
|---|---|
| Scope and boundaries | |
| Visual tampering heuristics | |
| Documents, EXIF, hashes | |
| Synthetic media / deepfakes | |
| Watermarks, C2PA, credentials | |
| Reporting and limits | |
references/investigation_reporting_and_limits.md