In Depth Research 1.0.0
v1.0.0Conduct exhaustive multi-source investigation with methodology tracking, source evaluation, and iterative depth.
⭐ 0· 161·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (deep, multi-source research) matches the content: detailed guidance, search strategy, evaluation criteria, and output templates. There are no environment variables, binaries, or installs that would be unrelated to a research task.
Instruction Scope
The SKILL.md describes searches across many public sources (search engines, academic databases, social forums) and instructs tracking queries and sources. It does not instruct reading local files, environment variables, or sending data to unknown endpoints. It references using other skills (e.g., 'Synthesize skill patterns'), so runtime behavior could depend on what other skills the agent has — ensure those other skills are trusted.
Install Mechanism
No install spec and no code files—this is instruction-only, so nothing will be written to disk or auto-installed. This is the lowest-risk install model.
Credentials
No required env vars, credentials, or config paths are declared. The skill does not request access to unrelated secrets or system config, which is proportionate for a research methodology.
Persistence & Privilege
always is false and the skill is user-invocable (normal). The skill does not request persistent presence or system-wide changes; nothing in the materials indicates it would modify other skills or store credentials autonomously.
Assessment
This skill is an instruction-only guide for doing in-depth research and appears coherent and proportionate. Before installing: (1) confirm your agent's browsing/network connectors and any other skills it may call (e.g., a Synthesize skill) are trusted, since the instructions assume using external search and other skills; (2) avoid asking the skill to research private, sensitive, or personal data unless you understand where query logs or outputs will be stored; and (3) be aware the methodology recommends using informal sources (forums/social), which are lower-confidence—review and corroborate findings as the skill itself advises.Like a lobster shell, security has layers — review code before you run it.
latestvk97cj181k03t5hr5zct0gtbrch83njj7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
