interpreting-culture-index
Interprets Culture Index behavioral profiles, team dynamics, and hiring fit using trait analysis and burnout detection.
- Analyzes individual CI profiles to identify behavioral archetypes, strengths, and trait-based challenges using distance-from-arrow methodology
- Assesses team composition via Gas/Brake/Glue framework; detects burnout by comparing Survey (hardwired traits) vs Job (adaptive behavior) graphs and calculating energy utilization
- Supports hiring profile definition, manager coaching, conflict mediation, and onboarding planning based on CI trait patterns
- Accepts extracted JSON or PDF input (with automated extraction via OpenCV script); predicts CI traits from interview transcripts for pre-assessment candidate evaluation
<essential_principles>
Culture Index measures behavioral traits, not intelligence or skills. There is no "good" or "bad" profile.
The 0-10 scale is just a ruler. What matters is distance from the red arrow (population mean at 50th percentile). The arrow position varies between surveys based on EU.
Why the arrow moves: Higher EU scores cause the arrow to plot further right; lower EU causes it to plot further left. This does not affect validity—we always measure distance from wherever the arrow lands.
Wrong: "Dan has higher autonomy than Jim because his A is 8 vs 5" Right: "Dan is +3 centiles from his arrow; Jim is +1 from his arrow"
Always ask: Where is the arrow, and how far is the dot from it?
More from trailofbits/skills
ask-questions-if-underspecified
Clarify requirements before implementing. Use when serious doubts arise.
4.2Ksemgrep
>-
3.8Kmodern-python
Configures Python projects with modern tooling (uv, ruff, ty). Use when creating projects, writing standalone scripts, or migrating from pip/Poetry/mypy/black.
3.8Kcodeql
>-
3.6Kinsecure-defaults
Detects fail-open insecure defaults (hardcoded secrets, weak auth, permissive security) that allow apps to run insecurely in production. Use when auditing security, reviewing config management, or analyzing environment variable handling.
3.5Ksecure-workflow-guide
Guides through Trail of Bits' 5-step secure development workflow. Runs Slither scans, checks special features (upgradeability/ERC conformance/token integration), generates visual security diagrams, helps document security properties for fuzzing/verification, and reviews manual security areas.
3.4K