Vibe Research
v1.0.0Conduct AI-led research with autonomous literature review, hypothesis generation, analysis, and synthesis while human provides vision.
⭐ 2· 608·2 current·2 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name and description (AI‑led research, literature review, hypothesis generation, analysis, synthesis) match the SKILL.md and pipeline: it requires retrieval, synthesis, hypothesis & analysis steps. The skill does not request unrelated binaries, env vars, or installs, which is proportionate to its stated purpose.
Instruction Scope
Instructions tell the agent to autonomously scan and retrieve large numbers of sources (100+), proactively 'pull additional sources,' run analyses, and build reproducibility packages. That is coherent for an autonomous research agent, but the guidance is broad and could lead the agent to access many external sources (including paywalled or private content) or perform extensive web requests unless the human supply domain constraints and guardrails.
Install Mechanism
Instruction-only skill with no install spec and no code files — lowest install risk. The scanner found no install/download operations.
Credentials
The skill does not request any environment variables, credentials, or config paths. Its declared requirements are minimal and proportionate to the research purpose. If the agent later needs access to external data sources (library subscriptions, APIs), those should be requested explicitly and justified.
Persistence & Privilege
always:false and default autonomous invocation are appropriate. Be aware the instructions encourage proactive behavior; combined with autonomous invocation this increases the scope of actions the agent might take without a human step-by-step prompt. The skill does not request persistent system-wide changes or modify other skills.
Assessment
This skill appears to be what it says: an autonomous research workflow. It does not ask for secrets or install code, which reduces technical risk. Before installing or using it, decide and enforce clear guardrails: 1) specify allowed and disallowed sources (e.g., block private repositories or certain publishers), 2) require human approval before fetching paywalled/proprietary data or before executing analyses that might transmit data externally, 3) set explicit checkpoints where the agent must pause for human validation (methodology, data access, final conclusions), and 4) clarify any required credentials (institutional library, APIs) up front so you can grant them narrowly and revoke when done. If you plan high‑stakes or sensitive research, test the skill in a controlled environment and require manual confirmation before publication or data exfiltration.Like a lobster shell, security has layers — review code before you run it.
latestvk97d5gq9eyfxavc9qxvke37w21818bwa
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🔬 Clawdis
OSLinux · macOS · Windows
