Implement a conflict-resolution RAG module for cybersecurity vulnerability analysis. When multiple sources (like CVE updates) conflict, the system should trigger a teacher-guided reasoning step to determine the most accurate, current state of the vulnerability.