Shadows Deep Research
v1.1.04-round deep research protocol — Explorer, Devil's Advocate, Multi-Perspective Synthesis, Crystallize. Use for major architectural decisions, technology choi...
⭐ 1· 293·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (deep research for architecture/tech decisions) matches the SKILL.md protocol and required resources: it's purely procedural and requests no binaries, env vars, or config paths.
Instruction Scope
The runtime instructions stay within the stated purpose (four rounds of research, synthesis, and citation). The SKILL.md claims 'zero network access' but also says it will be 'evidence-based' and use the agent's built-in search tools — a minor ambiguity about whether the agent will perform remote searches. This is not a security violation, but you should understand that fulfilling the 'evidence-based' rule depends on the agent platform's search capability.
Install Mechanism
No install spec and no code files — instruction-only skill with no on-disk installation risk.
Credentials
No environment variables, credentials, or config paths are requested; requested access is proportionate to the stated function.
Persistence & Privilege
always is false, the skill is user-invocable and does not request permanent presence or system configuration changes.
Assessment
This skill is instruction-only and coherent with its description: it asks the agent to run a 4-round research process and requires no installs, secrets, or filesystem access. Before using it, confirm how your platform's 'built-in search' works (queries may go to external search services) and avoid submitting proprietary secrets or sensitive data as part of prompts. If you care about provenance, verify the cited sources the agent provides and consider running any recommended PoCs in an isolated environment. Lastly, note the skill's author/homepage metadata is external — if you want greater assurance, check that external link and the publisher's reputation.Like a lobster shell, security has layers — review code before you run it.
latestvk97bgfa3vag5baye26w300cvnh82e86g
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🔬 Clawdis
OSmacOS · Linux · Windows
