Deep Research with Caesar.org

PassAudited by ClawScan on May 1, 2026.

Overview

The artifacts look like a coherent Caesar API research CLI; the main cautions are the Caesar API key, remote research data sharing, and an unpinned Go install command.

Before installing, make sure you trust the Caesar CLI source, consider pinning a specific version instead of @latest, use a revocable Caesar API key, and avoid sending confidential material in research or chat prompts unless you are comfortable with Caesar handling that data.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

You may run code from the upstream GitHub module, and that code can change over time.

Why it was flagged

The setup command installs a remote Go CLI at the moving latest version. This is normal for a CLI-based skill, but future installs may not exactly match the reviewed artifacts.

Skill content
go install github.com/alexrudloff/caesar-cli@latest
Recommendation

Install only from a trusted source, and consider pinning or verifying a specific release before using it with your API key.

What this means

Commands run through this CLI can act in your Caesar account, such as creating research jobs, chat messages, and collections.

Why it was flagged

The client reads the Caesar API key and sends it as a bearer token on API requests. This is expected for Caesar access, but it is still credential use.

Skill content
apiKey, err := config.GetAPIKey()
...
req.Header.Set("Authorization", "Bearer "+c.apiKey)
Recommendation

Use a revocable API key, avoid sharing it, and rotate it if you suspect exposure.

What this means

Caesar receives your research queries, follow-up questions, and related context.

Why it was flagged

Research requests and chat messages are posted to the Caesar API. This is disclosed and purpose-aligned, but user-provided research text leaves the local environment.

Skill content
resp, err := c.do("POST", "/research", req)
...
resp, err := c.do("POST", "/research/"+researchID+"/chat", map[string]string{"content": content})
Recommendation

Do not submit secrets or highly sensitive internal information unless Caesar's privacy, retention, and access controls meet your needs.