Research-engine
v1.0.0自动化多源信息收集与趋势分析,生成结构化研究报告并制定阶段性开发计划,助力技术探索与规划。
⭐ 5· 4.2k·35 current·37 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name and SKILL.md describe a research engine that collects web/GitHub/Moltbook data and writes reports. The included Python implements that functionality (search, analysis, report writing). However the code imports external modules (tools.web_fetch / tools.web_search and moltbook_skill.get_feed) that are not declared in package.json or requires.env, which is an inconsistency: the skill will fail or implicitly rely on other skills/modules being present.
Instruction Scope
SKILL.md explicitly advocates proactive/autonomous behavior (e.g., '主动搜索 - 不等待指令', hourly heartbeat integration, run every 3 hours). That grants broad discretion to perform network searches periodically. The runtime instructions and code also read/write files under a user workspace (/home/vken/.openclaw/workspace/research). The combination of autonomous network activity + periodic integration is a scope expansion that users should consent to.
Install Mechanism
No install spec — instruction-only with an included Python file. Low install risk: nothing is downloaded or extracted at install time.
Credentials
The skill requests no environment variables or credentials. It uses a default RESEARCH_DIR path (/home/vken/.openclaw/workspace/research) and creates files there; this is reasonable for a reporting tool but the hardcoded path may not match every user. It also relies on external modules (tools, moltbook_skill) rather than declared credentials or packages; the lack of declared dependencies or environment requirements is disproportionate to its runtime imports and network activity because those imports imply external capabilities or permissions.
Persistence & Privilege
always is false and the skill does not modify other skills or global settings. However SKILL.md instructs integration into agent heartbeats (hourly/daily/3-hour hooks). While the skill itself doesn't set always:true or persistently enable itself, the intended integration would give it recurring autonomous invocation if the agent owner wires it into those heartbeats — users should be aware before enabling that behavior.
What to consider before installing
This skill appears to implement a legitimate research/reporting tool, but exercise caution before installing:
- Autonomous network activity: The documentation explicitly encourages proactive, periodic searches and integration into the agent's heartbeat. If you enable that, the skill may perform network requests without per-run consent. Only enable recurring invocation if you trust it.
- Undeclared dependencies: The code imports tools.web_fetch, tools.web_search and moltbook_skill.get_feed but package.json and the skill metadata do not declare these dependencies. Verify those modules exist on your agent and inspect them — they control how web requests are made and where data may be sent.
- Data storage: Reports and browsing_history.md are written to RESEARCH_DIR (default /home/vken/.openclaw/workspace/research). Confirm this path is acceptable and that no sensitive data will be written there. Consider overriding RESEARCH_DIR via environment variable to a sandboxed location.
- Review network behavior: Inspect the implementations of tools.web_fetch / tools.web_search and moltbook_skill. Ensure they do not send collected content to untrusted external endpoints or leak sensitive information.
- Limit autonomy: If you want to be conservative, do not wire the skill into automatic heartbeats initially. Run it manually and review its outputs and network calls first.
What would change this assessment: if you supply the implementations of the referenced modules and they are local, well-audited wrappers that only call known search APIs, the inconsistencies become benign; if those modules contact unknown endpoints or the skill is given always-on autonomous invocation, the risk increases.Like a lobster shell, security has layers — review code before you run it.
latestvk972mke0dbn7szsf3g6nm86pmx80f56v
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
