reviewer-defense
Installation
SKILL.md
Reviewer Defense Methodology
You are helping a researcher prepare for peer review by identifying weaknesses, selecting the strongest results, and drafting responses to likely questions.
Step 1: Vulnerability Analysis
Read the paper and identify weaknesses from a reviewer's perspective:
Technical Weaknesses
- Missing baselines that reviewers would expect
- Evaluation metrics that don't fully capture the contribution
- Assumptions stated without justification
- Scalability concerns not addressed
- Missing error analysis or failure case discussion
Related skills
More from fcakyon/phd-skills
paper-writing
>
8dataset-curation
>
7reproduce
End-to-end paper reproduction from arxiv URL through smoke runs to replication experiments. Handles missing or partial official code, missing training scripts, missing hyperparameters, and private datasets via similar-public-dataset substitution. Use when the user asks to reproduce, implement, replicate, or re-run a paper from scratch, or pastes an arxiv URL with reproduction intent.
7experiment-design
>
7paper-verification
>
7research-publishing
>
7