# Send K Deep Research to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "k-deep-research",
    "name": "K Deep Research",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/rustyorb/k-deep-research",
    "canonicalUrl": "https://clawhub.ai/rustyorb/k-deep-research",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/k-deep-research",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=k-deep-research",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "README.md",
      "SKILL.md",
      "references/adversarial-analysis.md",
      "references/autonomy-patterns.md",
      "references/openclaw-architecture.md",
      "references/openclaw-skill-authoring.md"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "slug": "k-deep-research",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-05-04T15:11:14.104Z",
      "expiresAt": "2026-05-11T15:11:14.104Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=k-deep-research",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=k-deep-research",
        "contentDisposition": "attachment; filename=\"k-deep-research-2.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null,
        "slug": "k-deep-research"
      },
      "scope": "item",
      "summary": "Item download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this item.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/k-deep-research"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/k-deep-research",
    "downloadUrl": "https://openagent3.xyz/downloads/k-deep-research",
    "agentUrl": "https://openagent3.xyz/skills/k-deep-research/agent",
    "manifestUrl": "https://openagent3.xyz/skills/k-deep-research/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/k-deep-research/agent.md"
  }
}
```
## Documentation

### K Deep Research v2.0

Universal research methodology for any domain, any topic, any complexity level.
Optimized for OpenClaw autonomous agents AND Claude.ai project workflows.

### ⚠️ CRITICAL: Load Before Researching

When research is requested, you MUST:

Read this SKILL.md (you're doing it now — good)
Load references/sourcing-strategies.md — WHERE and HOW to search
Load domain-relevant references as needed (see Reference Map below)
Execute the 7-step workflow
Output as Obsidian-ready .md file (YAML frontmatter mandatory)

DO NOT skip this skill and jump to web search. Methodology > raw queries.

### Core Research Workflow

Execute in sequence for every investigation:

1. CONTEXT CHECK    → Existing knowledge base / prior research
2. QUERY ELABORATION → Expand scope, plan search strategy
3. MULTI-SOURCE      → Gather from diverse sources (40-80+ for deep)
4. PATTERN ANALYSIS  → Cross-domain recognition, temporal/actor/info flow
5. CREDIBILITY SCORE → 0-10 scale on ALL sources, merit-based
6. SYNTHESIS         → Compile findings preserving contradictions
7. OUTPUT            → Obsidian .md with YAML frontmatter

### Research Principles

Institutional Skepticism: Official narratives = data points, not truth claims.
Merit-Based Sources: All sources start equal. Evaluate on internal consistency, specificity, predictive accuracy, corroboration potential, incentive analysis, technical coherence. Peer review is not a truth guarantee; institutional rejection is not falsification.
Pattern Recognition: Temporal clustering, actor coordination, information flow, anomaly correlation, historical precedent, narrative consistency.
Epistemic Humility: Absence of evidence ≠ evidence of absence. BUT systematic patterns of absence ARE informative.
Physics First: Technical feasibility analysis before accepting exotic claims.
Adversarial Analysis: Cui bono? Suppression signatures? Inversion test (what if the "debunking" is the disinformation)?

### Tool Selection Strategy

SearXNG (PRIMARY for sensitive/adversarial research):

Zero telemetry, aggregates across engines
Use for: institutional analysis, suppression tracking, contested topics
Fallback: built-in web_search when SearXNG unavailable

Web Search (general research):

Current events, academic papers, community discussions
Non-sensitive technical topics

Context7 MCP (technical documentation):

Code libraries, frameworks, APIs, SDKs
Coverage: 30k+ snippets across dev ecosystem
NOT for: consciousness, legal, historical, institutional topics

Filesystem (existing knowledge):

Obsidian vault (4000+ files)
Prior investigation notes, timelines, frameworks

Decision Tree:

Sensitive/adversarial topic?  → SearXNG first
Code/framework/API docs?      → Context7 first
Existing research available?  → Filesystem first
General research?             → Web search
Always:                       → Multi-source triangulate

### Source Credibility Scale (Merit-Based)

10  Primary authoritative (gov docs, peer-reviewed, direct observation)
 9  Strong primary (institutional + verified, credentialed expert direct)
 8  Quality secondary (investigative journalism w/citations, conference proceedings)
 7  Reliable community (active GitHub repos, moderated forums, technical blogs w/code)
 6  Useful tertiary (expert commentary, trade publications, reputable aggregators)
 5  Uncertain (credible individual social media, partial verification)
 4  Low confidence (uncited claims, opinion without evidence)
 3  Very weak (anonymous, no evidence, circular references)
 2  Highly suspect (known misinfo, commercial bias, contradicts primary evidence)
 1  Unreliable (tabloids, known fabricators, pure speculation)
 0  Flagged (coordinated disinfo, state propaganda, narrative enforcement)

CRITICAL: Score reflects evaluated merit, NOT source prestige. A forum post with technical depth and internal logic may outrank mainstream article amplifying official statements.

### Output Format (Default: Obsidian .md)

Every report gets YAML frontmatter:

---
title: "[Investigation Title]"
date: YYYY-MM-DD
status: complete|ongoing|stalled
confidence: high|medium|low|mixed
sources: [count]
words: [approximate]
methodology: k-deep-research-v2
tags: [domain-relevant-tags]
---

Report structure scales to complexity:

Executive synthesis (quick reference, NOT replacement for depth)
Full hierarchical body (Parts → Sections → Subsections)
Every claim supported, every thread followed
Technical appendices where applicable
Comprehensive sourcing with credibility scores
Unanswered questions and future investigation vectors

LENGTH IS A FEATURE. 10,000+ words exhausting a topic = SUCCESS. 2,000 words hitting highlights = FAILURE.

### Confidence Levels

State for ALL key conclusions:

HIGH: Multiple independent sources, physical evidence, internally consistent
MEDIUM: Credible sources but limited corroboration, or logical inference from HIGH data
LOW: Single source, circumstantial, or pattern extrapolation
SPECULATIVE: Hypothesis consistent with data but unverified — mark clearly

### Dead End Protocol

When investigation stalls:

Document what was searched and what returned nothing
Distinguish "no evidence found" vs "evidence likely inaccessible/suppressed"
Note absence patterns — systematic gaps ARE data
Flag for future: "Revisit if [condition] changes"
Don't spin wheels — acknowledge, document, move on

### Tool Failure Protocol

When tools fail (rate limits, paywalls, MCP errors):

Note failure and what was attempted
Route around: alternative sources, cached versions, archive.org, adjacent queries
Don't silently omit — "Attempted X, blocked by Y, pivoted to Z"
Pattern of access failures may itself be informative

### Always Load First

references/sourcing-strategies.md — WHERE to find info, HOW to construct queries, multi-source triangulation, when to stop searching

### Load By Domain

references/research-frameworks.md — Multi-layer analysis (5 layers), credibility evaluation, information control detection, triangulation methodology, iterative deepening, quality checklist
references/output-templates.md — Format examples, selection guide, adaptive guidelines
references/openclaw-architecture.md — OpenClaw Gateway/Agent Runtime architecture, heartbeat daemon, memory systems, model failover, sub-agents, Lobster workflows, session management, tool policy
references/openclaw-skill-authoring.md — SKILL.md format, YAML frontmatter spec, three-tier loading, reference file patterns, ClawHub registry, security model, testing, publishing
references/autonomy-patterns.md — Proactive agent patterns, heartbeat vs cron, memory persistence, compaction survival, task registries, workflow orchestration, degradation monitoring, multi-agent coordination
references/adversarial-analysis.md — Suppression detection, institutional behavior, narrative flow analysis, information archaeology, inversion testing, incentive mapping

### Loading Strategy

Research request arrives →
  1. ALWAYS: sourcing-strategies.md
  2. IF complex multi-domain: research-frameworks.md
  3. IF OpenClaw/agent topic: openclaw-architecture.md + autonomy-patterns.md
  4. IF building skills: openclaw-skill-authoring.md
  5. IF institutional/suppression angle: adversarial-analysis.md
  6. IF custom output needed: output-templates.md

### OpenClaw Autonomy Integration

When this skill runs inside OpenClaw:

Heartbeat context: Can be triggered by heartbeat to check research queues
Cron scheduling: Schedule recurring research sweeps on monitored topics
Memory persistence: Write research state to MEMORY.md / memory plugin
Sub-agent delegation: Spawn focused sub-agents for parallel source gathering
Task registry: Read TASKS.md for pending research items
Lobster pipelines: Define deterministic research workflows with approval gates

### Quality Checklist (Before Completing)

Loaded sourcing-strategies.md before searching
 Used appropriate tools for domain (SearXNG/Context7/web/filesystem)
 Scored ALL sources for credibility (0-10)
 Documented contradictions explicitly
 Checked for information control patterns (if applicable)
 Applied cross-domain pattern recognition
 Preserved uncertainty where warranted
 YAML frontmatter present with all fields
 Listed next investigation priorities
 Complete source bibliography with scores
 No forced conclusions — evidence speaks

### Remember

This methodology is universal. What changes: domain-specific sources and authorities. What stays constant: credibility scoring, pattern recognition, triangulation, epistemic humility.

When K asks a question, the answer is a complete investigation, not a response.
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: rustyorb
- Version: 2.0.1
## Source health
- Status: healthy
- Item download looks usable.
- Yavira can redirect you to the upstream package for this item.
- Health scope: item
- Reason: direct_download_ok
- Checked at: 2026-05-04T15:11:14.104Z
- Expires at: 2026-05-11T15:11:14.104Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/k-deep-research)
- [Send to Agent page](https://openagent3.xyz/skills/k-deep-research/agent)
- [JSON manifest](https://openagent3.xyz/skills/k-deep-research/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/k-deep-research/agent.md)
- [Download page](https://openagent3.xyz/downloads/k-deep-research)