research-sources

v1.1.1

When the user wants to find information sources for content ideation, competitor monitoring, or industry tracking. Also use when the user mentions "research...

0· 19·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (research sources for content, competitor, and industry monitoring) align with the SKILL.md content. The skill is a guidance/template and requires no binaries, env vars, or installs, which is proportionate to its stated purpose.
Instruction Scope
SKILL.md contains only policy/formatting guidance, source categories, and example sources. It does not instruct the agent to read local files, environment variables, or to send data to third‑party endpoints; it stays within the declared remit.
Install Mechanism
No install spec and no code files are present (instruction-only). This is the lowest-risk pattern — nothing is written to disk and no external packages are pulled.
Credentials
The skill requests no environment variables, credentials, or config paths. There are no secret-like requirements, which is appropriate for a guidance-only skill.
Persistence & Privilege
always:false (not force-included), user-invocable: true, and disable-model-invocation is default false — normal settings. The skill does not request persistent system presence or modify other skills.
Assessment
This skill is low-risk: it's an instruction-only template with no installs, code, or secrets. Before installing, note the owner is unknown (no homepage) — if provenance matters, confirm the publisher. Also consider that the skill is guidance only: actual data gathering will be performed by your agent and any web/search connectors it has access to, so review the agent's tools/permissions (browser, web search, connectors) before using it for sensitive data. If you want more assurance, inspect the SKILL.md yourself (already provided) or ask the publisher for provenance/changes before trusting it in automated workflows.

Like a lobster shell, security has layers — review code before you run it.

latestvk9752ag5txn9exwvaphhczf4ad84fay9

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments