Prompt Engineering by Paradigm
Paradigm-Specific Prompting Techniques for Agentic AI
Document ID: F1-PROMPT-ENGINEERING
Version: 1.0
Category: Implementation Guide
Overview
Different agentic paradigms require fundamentally different prompting approaches. This guide provides paradigm-specific techniques with examples.
LSR (Latent Space Reasoner) Prompting
Core Principles
- Leverage implicit knowledge without external retrieval
- Encourage creative exploration and synthesis
- Use self-consistency for reliability
- Structure output without constraining creativity
Key Techniques
1. Role Framing
You are a [specific expert role] with deep expertise in [domain].
Your unique perspective combines [approach A] with [approach B].
2. Creative Scaffolding
Generate ideas by:
1. First exploring unconventional angles
2. Then grounding in practical constraints
3. Finally synthesizing into actionable recommendations
3. Self-Consistency Sampling
Approach this problem from three different angles:
- Technical perspective
- Business perspective
- User perspective
Then synthesize the best elements from each approach.
4. Quality Anchoring
Imagine this content will be reviewed by [authority figure].
Ensure it meets the standard of [quality benchmark].
Example: Marketing Copy
You are a senior creative director at a top agency.
Task: Generate 5 headline options for [product].
For each headline:
- Core message (7 words max)
- Emotional hook
- Call to action variant
Quality standard: Could appear in Adweek's best campaigns.
After generating, rank by: memorability, clarity, brand fit.
GS (Grounded Synthesizer) Prompting
Core Principles
- Explicit citation requirements
- Source quality hierarchy
- Uncertainty acknowledgment
- Fact-claim separation
Key Techniques
1. Citation Enforcement
CRITICAL: Every factual claim MUST include a citation.
Format: [Source Name, Date]
If you cannot cite a source, explicitly state "Unable to verify."
2. Source Hierarchy
Prioritize sources in this order:
1. Primary sources (original documents, official statements)
2. Peer-reviewed research
3. Recognized industry analysts
4. Quality journalism
Never use: forums, unverified blogs, social media posts
3. Confidence Tagging
Mark each claim with confidence:
- [HIGH]: Multiple corroborating sources
- [MEDIUM]: Single reliable source
- [LOW]: Limited or dated sources
- [UNCERTAIN]: Conflicting information
4. Gap Acknowledgment
If information is not found, state:
"This information was not available in the retrieved sources.
Recommended: [specific search or source to try]"
Example: Research Report
Task: Analyze [topic] based on retrieved sources.
Requirements:
1. Every factual claim must cite a source
2. Distinguish facts from analysis
3. Note conflicting information
4. Acknowledge gaps explicitly
Source priority:
1. [Primary source type]
2. [Secondary source type]
3. [Tertiary source type]
Output structure:
- Executive Summary (no citations needed)
- Key Findings (all cited)
- Analysis (clearly labeled as interpretation)
- Gaps and Recommendations
- References (full list)
EP (Emergent Planner) Prompting
Core Principles
- Explicit reasoning chains
- Hypothesis-test cycles
- Learning from outcomes
- Adaptive strategy
Key Techniques
1. Hypothesis Formation
Before taking action:
1. State your current hypothesis
2. Define expected outcome
3. Specify success/failure criteria
2. Reflexion Prompts
After each significant outcome:
- What was expected vs. actual?
- Why might this have happened?
- What should change going forward?
- What lesson should be remembered?
3. Exploration-Exploitation Balance
Strategy selection:
- If confidence > 0.8: Exploit (use proven approach)
- If confidence < 0.5: Explore (try new approach)
- Otherwise: Incremental refinement
4. Termination Conditions
Stop execution when:
- Goal achieved (confidence > [threshold])
- Iteration limit reached ([N] attempts)
- No progress for [N] consecutive attempts
- Exception requiring human input
Example: Troubleshooting
Task: Diagnose and resolve [issue].
Process:
1. OBSERVE: Gather initial information
2. HYPOTHESIZE: Form ranked hypotheses
3. TEST: Execute lowest-cost test first
4. EVALUATE: Compare result to expectation
5. ADAPT: Update hypothesis or conclude
For each hypothesis:
- Description
- Confidence (0-1)
- Test method
- Expected result if true
- Expected result if false
After each test:
- Actual result
- Hypothesis update
- Next action
Continue until:
- Issue resolved (confirm with verification)
- All hypotheses exhausted
- Maximum [N] iterations reached
VE (Verifiable Executor) Prompting
Core Principles
- Protocol adherence
- Complete audit trail
- Exception handling
- Human escalation triggers
Key Techniques
1. Protocol Binding
You MUST follow this protocol exactly:
[Step-by-step protocol]
PROHIBITED:
- Skipping steps
- Modifying order
- Making assumptions about missing data
2. Audit Requirements
For each action, document:
- Timestamp
- Action taken
- Input received
- Output produced
- Decision rationale
- Compliance checks performed
3. Exception Handling
If any exception occurs:
1. STOP execution immediately
2. Document the exception fully
3. Preserve current state
4. Escalate via [escalation path]
5. Await human decision
DO NOT attempt to proceed or work around exceptions.
4. Validation Gates
Before each step:
- Verify preconditions: [list]
- Confirm required data present
After each step:
- Verify postconditions: [list]
- Validate output format
Example: Compliance Workflow
Protocol: [Process Name]
Version: [X.Y]
Compliance: [Regulatory requirements]
EXECUTION RULES:
1. Execute steps in exact order
2. Log all actions immediately
3. Validate at each gate
4. Escalate all exceptions
Step 1: [Action]
- Preconditions: [list]
- Action: [specific action]
- Postconditions: [list]
- Log: [what to record]
Step 2: [Action]
...
EXCEPTION PROTOCOL:
- Type A exceptions: [handling]
- Type B exceptions: [handling]
- Unknown exceptions: Immediate escalation
COMPLETION:
- Final validation checklist
- Audit record generation
- Notification to [stakeholders]
Cross-Paradigm Patterns
Hybrid Prompts
GS → LSR (Research then Create)
Phase 1 (GS): Research [topic] with full citations
Phase 2 (LSR): Using the research, create [creative output]
Clearly separate factual content (Phase 1) from creative interpretation (Phase 2)
EP + VE (Adaptive within Compliance)
Operate within this protocol framework:
[Protocol boundaries]
Within these boundaries, you may:
- Adapt approach based on results
- Try alternative methods
- Learn from outcomes
You may NOT:
- Skip required steps
- Bypass validation gates
- Proceed without required approvals
Output Formatting
Structured JSON Output
Respond in this exact JSON format:
{
"field1": "string",
"field2": number,
"field3": ["array", "items"]
}
Do not include any text outside the JSON structure.
Markdown with Sections
Structure your response as:
## Summary
[2-3 sentences]
## Details
[Main content]
## Next Steps
[Actionable items]
Quick Reference
| Paradigm | Key Prompt Elements | Avoid |
|---|---|---|
| LSR | Role framing, quality anchors, self-consistency | Requiring citations, strict formats |
| GS | Citation requirements, source hierarchy, confidence tags | Asking for opinions, creative leaps |
| EP | Hypothesis-test cycles, reflexion prompts, termination conditions | Rigid step sequences, single attempts |
| VE | Protocol binding, audit requirements, exception handling | Flexibility language, assumption-making |
Document maintained by CODITECT Engineering Team