Multi-Source Research - 多源研究
v1.0.0多源研究助手,整合网页搜索、学术平台(知网/arXiv)、社交媒体(微博/抖音)、新闻聚合。支持自动去重、按来源和可信度分类。
⭐ 0· 102·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description (multi-source research across web, academic, social, news) match the SKILL.md content. The skill requests no binaries, env vars, or installs—reasonable for an instruction-only aggregator that relies on the agent's browsing/search capabilities.
Instruction Scope
Instructions specify parallel queries, de-duplication, and credibility classification across many platforms. They do not instruct reading local files or environment variables, nor do they include hidden endpoints. However, '并行搜索' across paywalled platforms (CNKI/微信公众平台) implies scraping or use of APIs; the SKILL.md mentions access restrictions but gives no concrete guidance for lawful access or credential handling. This is a scope note rather than a contradiction.
Install Mechanism
No install spec and no code files — lowest-risk form. Nothing will be written to disk or executed from external URLs by the skill itself.
Credentials
The skill declares no required environment variables or credentials. This is proportional. A practical caveat: some listed sources (CNKI, some social platforms) may require credentials or paid access to retrieve full content; the SKILL.md calls this out but does not request those credentials.
Persistence & Privilege
always is false and the skill is user-invocable. The skill does not request persistent system presence or modification of other skills/configuration.
Assessment
This skill is an instruction-only aggregator and appears coherent, but before enabling it consider: (1) it will attempt to fetch content from many public and paywalled sources — you may need to supply platform credentials if you want paywalled results (do not share secrets unless you trust the agent and environment); (2) web scraping can violate terms of service or legal rules—ensure you have the right to collect and store data from the target sites and respect robots.txt and rate limits; (3) social-media collection may capture personal data—be mindful of privacy and compliance; (4) monitor the agent's browsing/actions (rate limits, volume) to avoid accidental abuse of third-party services.Like a lobster shell, security has layers — review code before you run it.
latestvk9793f0yr6z06s429ex2v9ryzh83wf0k
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
