Searching protocol for "evidence-gap"
Generate research plans for evidence gaps.
Challenge and refine plans.
Identify and fix evidence gaps for better writing.
Generate precise recapture checklists.
Turn requirements into tested traceability.
Curate and normalize cyber risks.
Verify requirements are implemented and tested.
Find flaws, gaps, and risks.
Assess and report architecture principle compliance.
Write grounded peer review reports.
Guarantee goal-aligned verification.
Structured thinking for innovation and analysis.