Loading...
Loading...
Found 138 Skills
Execute deep research on every item in a research outline, producing structured JSON per item and a final markdown report. Use after running /research to generate an outline. Reads outline.yaml and fields.yaml, launches parallel research agents in batches, validates output, generates a consolidated report, and supports resume on interruption. Trigger when the user says "start deep research", "research these items", "run the deep phase", "fill in the fields for each item", or "generate the research report".
Track and check updates for all OpenClaw dependencies: managed skills (GitHub/ClewHub), bundled skills, workspace skills, npm packages, pip packages, and CLI tools. Use when user asks "check for updates", "dependency status", "are my skills up to date", "什么需要更新", "检查依赖", "检查更新", or wants a dependency health report. Triggers on: dependency check, skill updates, outdated packages, version drift.
Generate custom reports, query reports, and script reports for Frappe applications. Use when creating data analysis and reporting features.
Analyze parliamentary sessions from Chile, Spain, Peru and EU. Research transcripts, identify topics and trends, generate analytical PDF reports. Also search Official Journals (BOE, EUR-Lex) for decrees, laws, resolutions and published regulations. Use when user asks about legislative sessions, committees, parliamentary debates, official journal, decrees, laws, resolutions or requests reports/analysis.
Information collection and exploration before Spec creation. Invoked by the role spec-explorer. Trigger conditions: (1) The spec-explorer role needs to collect background information before Spec creation, (2) Need to retrieve historical experience (exp-search), (3) Need to explore the project codebase, external documents or third-party libraries, (4) TeamLead notifies the spec-explorer to start working.
Generate penetration testing reports in standard format, including project information sheet, vulnerability discovery list, detailed vulnerability information (including attribute sheet, description, reproduction steps, evidence screenshots, remediation suggestions), and appendices (risk level definition, CVSS explanation, glossary). Use this skill when users request to generate penetration testing reports, security testing reports, or vulnerability reports. Strictly follow the standard format in the project template directory.