Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Deep Research.Bak
v1.0.0Conducts enterprise-grade research with multi-source synthesis, citation tracking, and verification. Produces citation-backed reports through a structured pi...
⭐ 0· 34·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description align with the included files: citation manager, report validators, markdown→HTML, source evaluator, and an orchestration engine. Persisting reports and citations to disk and converting to PDF/HTML are coherent with an enterprise research skill.
Instruction Scope
SKILL.md explicitly instructs the agent to run shell commands (e.g., date), read and write files under ~/Documents and ~/.claude/research_output, spawn Task sub-agents that load continuation_state and report files, and 'Grep/Read for local documentation'. Those directives permit reading arbitrary local documents and recursive agent spawning; while plausible for deep research, they broaden what the agent may access and persist beyond the narrow task of web search and synthesis.
Install Mechanism
No install spec (instruction-only) — lowest install risk. README suggests optional external tools (brew search-cli, pip install weasyprint) if the user opts in; those are optional and clearly documented.
Credentials
The skill declares no required env vars or credentials. However README and SKILL.md suggest optional multi-provider search-cli setup requiring provider API keys, and the skill will run network-based citation verification. The absence of declared env vars is consistent but you should not supply unrelated credentials. The skill does persist state to home directory.
Persistence & Privilege
The skill persists continuation_state and sources.json under ~/.claude/research_output and writes reports to ~/Documents. It also instructs spawning continuation agents (Task tool) that read/write those files recursively. 'always' is false, but the persistence and recursive agent spawning increase blast radius if misused or if underlying orchestration code performs unexpected reads or network calls.
What to consider before installing
This package appears to implement the advertised research pipeline, but it gives the agent permission to read and write files in your home directory and to spawn recursive continuation agents that load saved state. Before installing or enabling it: 1) review the remaining code files you haven't inspected (especially research_engine.py and verify_citations.py) for network calls or any calls that read arbitrary paths; 2) consider running the skill in a sandboxed account or VM so its file writes (~/Documents and ~/.claude/research_output) are isolated; 3) do not provide unrelated API keys or system credentials; only configure optional search-cli keys if you trust the provider setup; 4) if you allow the skill to run, audit created continuation_state and sources.json files and confirm the skill deletes or manages them per your data-retention policy. If you want, I can scan the remaining omitted scripts for network or file-access patterns and point out any risky lines.Like a lobster shell, security has layers — review code before you run it.
latestvk97f0hf9s1y086s7yg0b4ega3584mbd7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
