Research Summarizer
v2.1.1Structured research summarization agent skill for non-dev users. Handles academic papers, web articles, reports, and documentation. Extracts key findings, ge...
⭐ 0· 103·2 current·2 all-time
byAlireza Rezvani@alirezarezvani
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description, SKILL.md workflow, and the two included scripts (citation extraction and summary formatting) align: all files implement text parsing, templating, and citation formatting expected for a summarizer.
Instruction Scope
Runtime instructions are narrowly scoped to reading user-provided documents, extracting structure and citations, comparing sources, and producing briefs. The SKILL.md does not instruct the agent to read unrelated system files, environment variables, or to send data to unknown endpoints.
Install Mechanism
No install spec is provided (instruction-only). The included scripts are plain Python files that run locally; there are no downloads, package installs, or extraction from external URLs.
Credentials
The skill declares no required environment variables, no credentials, and no config paths. The code likewise does not access env vars, secrets, or network resources — only local file/stdin I/O.
Persistence & Privilege
always is false and the skill does not request persistent or elevated privileges, nor does it modify other skills or system settings. It runs on-demand and only processes input provided to it.
Assessment
This skill appears to do what it says: local Python scripts parse text and produce summaries/citations. Before installing, consider: only provide documents you are comfortable having processed by the agent (sensitive or confidential docs will be read by the skill); review or run the included scripts locally if you want to confirm behavior; and note that the citation heuristics are regex-based and may misclassify or miss entries (a quality, not a security, issue). There are no hidden network calls, credential requests, or install-time downloads in the package.Like a lobster shell, security has layers — review code before you run it.
latestvk97aqpzy4w51z6st6fqf26wykd838yxf
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
