Parallel Research

v1.0.0

有 2 个以上独立研究子课题时使用。将独立课题分派给并行代理同时调研,加速信息收集。

0· 72·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (parallel research delegation) matches the SKILL.md instructions: templates and processes for creating independent agent tasks. The skill requests no binaries, env vars, installs, or config paths that would be unrelated to its stated purpose.
Instruction Scope
The instructions focus on how to construct and coordinate independent research agents, define scope, outputs, and integration steps. They do not instruct reading system files, collecting credentials, or sending data to unexpected endpoints. The doc refers generically to using an 'Agent tool' to start agents — appropriate for its purpose but dependent on your agent platform's actual capabilities/policies.
Install Mechanism
No install spec and no code files are present (instruction-only). Nothing will be downloaded or written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. There are no disproportionate secret requests relative to the described task.
Persistence & Privilege
The skill does not set always:true and is user-invocable. It relies on agent invocation to spawn parallel agents — normal behavior for an orchestration template, but be aware that autonomous agent actions (web requests, external queries) depend on your agent platform's permissions and could access external data sources.
Assessment
This skill is an instruction template for running parallel research agents and appears internally consistent and low-risk. Before installing/using it, confirm: (1) your agent platform's 'Agent tool' permissions — whether spawned agents can make web requests or access internal systems; (2) you will not supply any credentials or private docs to spawned agents unless necessary; (3) you understand any external data-sourcing the agents will perform and verify cited sources in their outputs. If you want tighter control, keep the skill user-invocable only (do not allow autonomous invocation) and limit agent web access or sandbox spawned agents.

Like a lobster shell, security has layers — review code before you run it.

latestvk9780y0nt8v1hnjstt8cd23mx183qqsp

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments