decontextualize-text

Convert text with private context or internal dependencies into generic, unbiased expressions that are standalone and reusable. Core goal - produce decontextualized text that preserves logic while removing organizational identifiers. Use for project handoff, open-source prep, methodology abstraction, cross-team sharing.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "decontextualize-text" with this command: npx skills add nesnilnehc/ai-cortex/nesnilnehc-ai-cortex-decontextualize-text

Skill: Decontextualize Text

Purpose

Turn content that depends on private context, implicit assumptions, or environment-specific details into generic, reusable wording. Primary scenario: project decontextualization — preparing a project for handoff, open-source, or cross-org use. By removing or replacing specific identifiers (including path strings and file/folder names as they appear in text), the content can be understood correctly in different contexts while protecting organizational privacy.


Core Objective

Primary Goal: Produce decontextualized text that preserves core logic and structure while removing all organizational identifiers and private context.

Success Criteria (ALL must be met):

  1. All sensitive terms replaced: Company names, project codenames, internal URLs, people's names, path strings, and file/folder names with internal context are identified and replaced with generic equivalents
  2. Core logic preserved: The essence of what is done and why remains intact; no functional information is lost
  3. Content is standalone: Text is fully understandable without the original context; implicit assumptions are made explicit or removed
  4. Structure preserved: Markdown formatting, paragraph structure, logic hierarchy, and functional instructions remain unchanged
  5. No re-identification residue: Output contains nothing that could re-identify an organization or person (no unique IDs, internal process numbers, non-public terms)

Acceptance Test: Can someone from a different organization understand and use this content without asking clarifying questions about the original context?


Use Cases

  • Project decontextualization: Prepare a project for handoff or open-source — decontextualize docs, README, comments; replace path strings and file/folder names (as they appear in text) with generic equivalents (e.g. acme-internal/config.yamlproject-root/config.yaml).
  • Generalization: Turn project-specific lessons into generic methodology or best practices.
  • Cross-team collaboration: Remove jargon or codenames that only one team understands so others can read the doc without extra context.
  • De-identification: Before sharing case studies or blog posts, strip sensitive project names, people, and internal addresses.
  • Release preparation: Final cleanup before publishing internal content externally (e.g. open source, handoff).
  • Doc sync: After forking or merging cross-org repos, clean up outdated environment-specific descriptions.

When to use: When you need to remove “understanding barriers due to environment differences” or “information security boundaries.”


Behavior

Principles

  • Keep what is done and why.
  • Remove who, where, and which internal conditions.
  • Replace proper nouns with generic descriptions (e.g. “internal system”, “a given workflow”).
  • Make implicit assumptions explicit or drop them.

Interaction policy

  • Uncertain terms: When you spot possibly sensitive or internal terms (e.g. unclear abbreviations, internal server names), list them and ask the user to confirm before rewriting.
  • Alternatives: For core logic, offer 2–3 rewrite options at different abstraction levels for the user to choose.

Steps

  1. Identify sensitive terms: Scan for company names, project codenames, internal URLs, people’s names, path strings, and file/folder names that carry internal context (e.g. acme-internal/, team-alpha-output/).
  2. Extract core logic: Identify the essence of the steps (e.g. “JIRA approval” → “task state change review”).
  3. Rewrite generically: Use neutral wording for the identified parts.
  4. Preserve structure: Keep paragraph structure and capability boundaries; do not drop information.

Input & Output

Input

  • Text that has one or more of:
    • Organization, company, project, or system names.
    • Path strings and file/folder names that carry internal context (e.g. acme-internal/config.yaml, team-alpha/output/).
    • Internal conventions, implicit context, or default assumptions.
    • Processes or assumptions that only hold in a specific environment.

Output

  • Generic version: Text with private context removed or replaced.
  • Structure preserved: Logic hierarchy, Markdown, and functional instructions must be preserved.
  • Reusable: Output should be usable without extra context.

Restrictions

Hard Boundaries

  • No invention: Do not invent context or capabilities not in the original.
  • No inference: Do not add facts or conclusions not stated.
  • No new semantics: Do not introduce new business meaning.
  • No residue: Do not leave anything that can re-identify an organization or person (e.g. unique IDs, internal process numbers, non-public terms).

Skill Boundaries (Avoid Overlap)

Do NOT do these (other skills handle them):

  • Documentation generation: Creating new README files or project documentation from scratch → Use generate-standard-readme or bootstrap-docs
  • Content writing: Writing original content or documentation → Use writing/documentation skills
  • Code refactoring: Changing code structure or variable names → Use code refactoring skills
  • Translation: Converting text between human languages → Use translation skills
  • Summarization: Condensing content while keeping context → Use summarization skills (this skill removes context, not condenses it)

When to stop and hand off:

  • User asks "can you generate a README for this?" → Hand off to generate-standard-readme
  • User asks "can you write documentation?" → Hand off to documentation writing skills
  • User provides code to decontextualize → Focus on comments and strings only; suggest code refactoring skills for identifiers in code structure
  • Content is already generic → No decontextualization needed; confirm with user and complete

Self-Check

Core Success Criteria (ALL must be met)

  • All sensitive terms replaced: Company names, project codenames, internal URLs, people's names, path strings, and file/folder names with internal context are identified and replaced with generic equivalents
  • Core logic preserved: The essence of what is done and why remains intact; no functional information is lost
  • Content is standalone: Text is fully understandable without the original context; implicit assumptions are made explicit or removed
  • Structure preserved: Markdown formatting, paragraph structure, logic hierarchy, and functional instructions remain unchanged
  • No re-identification residue: Output contains nothing that could re-identify an organization or person (no unique IDs, internal process numbers, non-public terms)

Process Quality Checks

  • Uncertain terms confirmed: When spotting possibly sensitive or internal terms (unclear abbreviations, internal server names), did I list them and ask the user to confirm before rewriting?
  • Alternatives offered: For core logic rewrites, did I offer 2-3 rewrite options at different abstraction levels for the user to choose?
  • No invention: Did I avoid inventing context or capabilities not in the original?
  • No inference: Did I avoid adding facts or conclusions not stated in the original?

Acceptance Test

Can someone from a different organization understand and use this content without asking clarifying questions about the original context?

If NO: Decontextualization is incomplete. Review for remaining context dependencies or unclear generic terms.

If YES: Decontextualization is complete.


Examples

Example 1: Internal Process → Generic

OriginalDecontextualized
In Acme’s JIRA workflow, when a requirement enters “Tech Review”, run X team’s Checklist, then notify PM Li Si.When a requirement enters the “Tech Review” stage, run the defined Checklist and notify the relevant product owner.

Example 2: System and API → Neutral

OriginalDecontextualized
Call gpt-4 via our company LLM Gateway (api.acme.internal), timeout 30s.Call the model via an LLM API; set a reasonable timeout (e.g. 30s).

Example 3: Team-Specific Rule → Abstract

OriginalDecontextualized
Per Kiro team policy, Python must pass pylint with score ≥ 9.0 before merging to master.Per code quality policy, code should pass static checks (e.g. pylint) and meet the required threshold before merging to the main branch.

Example 4: Path and File/Folder Names in Docs

OriginalDecontextualized
Config is in acme-internal/settings.yaml. Output goes to team-alpha/output/.Config is in project-root/settings.yaml (or config/settings.yaml). Output goes to output/.

Appendix: Output contract

When this skill produces decontextualized text, it follows this contract:

ElementRequirement
PreserveWhat is done and why; logic hierarchy; Markdown structure; functional instructions.
RemoveWho, where, internal conditions; proper nouns → generic descriptions; path strings and file/folder names → generic equivalents.
InteractionWhen uncertain terms appear: list them and ask user to confirm before rewriting.
RestrictionsNo invention, inference, new semantics, or residue that could re-identify org/person.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Privacy Mask

Mask and redact sensitive information (PII) in screenshots and images — phone numbers, emails, IDs, API keys, crypto wallets, credit cards, passwords, and mo...

Registry SourceRecently Updated
1201Profile unavailable
Security

AI Agent OPSEC — Runtime Classified Data Enforcer

Prevent your AI agent from leaking classified terms to external APIs, subagents, or logs. Term registry + runtime redaction + pre-publish audit. Zero depende...

Registry SourceRecently Updated
1060Profile unavailable
Security

Voidly Agent Relay

Give agents encrypted private messaging — send, receive, discover, and call other AI agents with post-quantum E2E encryption. No API key needed. Zero config.

Registry SourceRecently Updated
1593Profile unavailable
Security

Agentshield Audit

Trust Infrastructure for AI Agents - Like SSL/TLS for agent-to-agent communication. 77 security tests, cryptographic certificates, and Trust Handshake Protoc...

Registry SourceRecently Updated
6590Profile unavailable