Academic Deep Research

v1.1.0

Transparent, rigorous research with full methodology — not a black-box API wrapper. Conducts exhaustive investigation through mandated 2-cycle research per t...

0· 135·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (deep, reproducible research) align with the instructions: heavy use of web_search, web_fetch, sessions_spawn and memory lookups is expected for literature reviews and competitive intelligence; no unrelated credentials, binaries, or system access are requested.
Instruction Scope
SKILL.md restricts actions to querying web_search/web_fetch, spawning parallel sessions, and using memory APIs. It mandates user checkpoints and documents required deliverables; it does not instruct reading local files, environment variables, secrets, or contacting unknown endpoints beyond standard web fetching.
Install Mechanism
Instruction-only skill with no install spec and no code files — nothing is written to disk and no external packages are pulled in.
Credentials
No environment variables, credentials, or config paths are required. The use of memory_search/memory_get is declared for cross-referencing prior context and is proportionate to the research purpose.
Persistence & Privilege
Skill is not always-enabled, does not request permanent system presence, and does not modify other skills or system-wide settings; autonomous invocation after user approval (the normal platform behavior) is expected and appropriate given the workflow.
Assessment
This skill appears coherent and appropriate for structured web-based research: it will autonomously run multiple web searches and fetch pages after you approve the research plan, and it relies only on OpenClaw-native tools. Before installing, consider: (1) scope and budget — the skill enforces multiple cycles and can fetch many pages, so confirm how many requests or time you want it to consume; (2) privacy/regulatory sensitivity — if your topic involves PHI or confidential data, verify that fetched sources and any memory storage comply with your policies, since the skill will access public web content and may record findings; (3) reproducibility expectations — the skill promises reproducible methodology but search results can change over time; and (4) output format constraints — final reports are forced into narrative prose (no lists/tables), which may make quick skimming or extraction harder. If those trade-offs are acceptable, the skill is consistent with its stated purpose.

Like a lobster shell, security has layers — review code before you run it.

latestvk9780464qwvjh1a773kf5sbfyh83w37z

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🔬 Clawdis

Comments