Deep Research
v1.0.0Conduct multi-source research with synthesized reports and citations. Searches the web, reads full content from key sources, and produces structured reports....
⭐ 0· 65·0 current·0 all-time
byDeonte Cooper@djc00p
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the runtime instructions: plan sub-questions, run web_search across many sources, deep-read key URLs with web_fetch, and synthesize reports. There are no unrelated binaries, credentials, or config paths requested.
Instruction Scope
Instructions stay within research scope (search, fetch, read, synthesize). They explicitly call web_search and web_fetch (network calls) and recommend saving long reports to a file; the SKILL.md does not instruct reading local system files or accessing secrets. Caveat: actual behavior depends on the agent's implementation of web_search/web_fetch (which perform network access and may have their own permissions/endpoints).
Install Mechanism
No install spec and no code files — instruction-only skill. This minimizes disk-write/installation risk.
Credentials
No environment variables, credentials, or config paths are required. The skill's needs are minimal and proportional to a web-research task.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent or elevated presence. It does not modify other skills or system-wide settings.
Assessment
This skill appears coherent and low-risk: it only describes web search/fetch and synthesis and asks for no secrets or installs. Before enabling, confirm the agent tools it calls (web_search, web_fetch) are trustworthy and configured to respect privacy (they will make network requests). If you plan to save long reports, verify where files will be written and whether those files may contain sensitive personal data. Finally, be mindful when requesting investigations that involve personal or sensitive information — the skill will gather public web sources, which may include PII or legally sensitive material.Like a lobster shell, security has layers — review code before you run it.
latestvk97c0gt9bdw8bdncg2ryt3z8b9849wad
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🔍 Clawdis
OSmacOS · Linux · Windows
