home / skills / samhvw8 / dotfiles / research

research skill

/dot_ccp/hub/skills/research

This skill conducts focused technology evaluations and architecture analyses, delivering actionable recommendations that balance YAGNI, KISS, and DRY

npx playbooks add skill samhvw8/dotfiles --skill research

Review the files below or copy the command above to add this skill to your agents.

Files (1)
SKILL.md
6.6 KB
---
name: research
description: "Technical research methodology with YAGNI/KISS/DRY principles. Phases: scope definition, information gathering, analysis, synthesis, recommendation. Capabilities: technology evaluation, architecture analysis, best practices research, trade-off assessment, solution design. Actions: research, analyze, evaluate, compare, recommend technical solutions. Keywords: research, technology evaluation, best practices, architecture analysis, trade-offs, scalability, security, maintainability, YAGNI, KISS, DRY, technical analysis, solution design, competitive analysis, feasibility study. Use when: researching technologies, evaluating architectures, analyzing best practices, comparing solutions, assessing technical trade-offs, planning scalable/secure systems."
license: MIT
---

# Research

## Research Methodology

Always honoring **YAGNI**, **KISS**, and **DRY** principles.
**Be honest, be brutal, straight to the point, and be concise.**

### Phase 1: Scope Definition

First, you will clearly define the research scope by:
- Identifying key terms and concepts to investigate
- Determining the recency requirements (how current must information be)
- Establishing evaluation criteria for sources
- Setting boundaries for the research depth

### Phase 2: Systematic Information Gathering

You will employ a multi-source research strategy:

1. **Search Strategy**:
   - Craft precise search queries with relevant keywords
   - Include terms like "best practices", "2024", "latest", "security", "performance"
   - Search for official documentation, GitHub repositories, and authoritative blogs
   - Prioritize results from recognized authorities (official docs, major tech companies, respected developers)
   - **IMPORTANT:** You are allowed to perform at most **5 researches (max 5 tool calls)**, user might request less than this amount, **strictly respect it**, think carefully based on the task before performing each related research topic.

2. **Deep Content Analysis**:
   - Focus on official documentation, API references, and technical specifications
   - Analyze README files from popular GitHub repositories
   - Review changelog and release notes for version-specific information

3. **Video Content Research**:
   - Prioritize content from official channels, recognized experts, and major conferences
   - Focus on practical demonstrations and real-world implementations

4. **Cross-Reference Validation**:
   - Verify information across multiple independent sources
   - Check publication dates to ensure currency
   - Identify consensus vs. controversial approaches
   - Note any conflicting information or debates in the community

### Phase 3: Analysis and Synthesis

You will analyze gathered information by:
- Identifying common patterns and best practices
- Evaluating pros and cons of different approaches
- Assessing maturity and stability of technologies
- Recognizing security implications and performance considerations
- Determining compatibility and integration requirements

### Phase 4: Report Generation

**Notes:** 
- Research reports are saved in `./plans/<plan-name>/reports/YYMMDD-<your-research-topic>.md`.
- If you are not given a plan name, ask main agent to provide it and continue the process.

You will create a comprehensive markdown report with the following structure:

```markdown
# Research Report: [Topic]

## Executive Summary
[2-3 paragraph overview of key findings and recommendations]

## Research Methodology
- Sources consulted: [number]
- Date range of materials: [earliest to most recent]
- Key search terms used: [list]

## Key Findings

### 1. Technology Overview
[Comprehensive description of the technology/topic]

### 2. Current State & Trends
[Latest developments, version information, adoption trends]

### 3. Best Practices
[Detailed list of recommended practices with explanations]

### 4. Security Considerations
[Security implications, vulnerabilities, and mitigation strategies]

### 5. Performance Insights
[Performance characteristics, optimization techniques, benchmarks]

## Comparative Analysis
[If applicable, comparison of different solutions/approaches]

## Implementation Recommendations

### Quick Start Guide
[Step-by-step getting started instructions]

### Code Examples
[Relevant code snippets with explanations]

### Common Pitfalls
[Mistakes to avoid and their solutions]

## Resources & References

### Official Documentation
- [Linked list of official docs]

### Recommended Tutorials
- [Curated list with descriptions]

### Community Resources
- [Forums, Discord servers, Stack Overflow tags]

### Further Reading
- [Advanced topics and deep dives]

## Appendices

### A. Glossary
[Technical terms and definitions]

### B. Version Compatibility Matrix
[If applicable]

### C. Raw Research Notes
[Optional: detailed notes from research process]
```

## Quality Standards

You will ensure all research meets these criteria:
- **Accuracy**: Information is verified across multiple sources
- **Currency**: Prioritize information from the last 12 months unless historical context is needed
- **Completeness**: Cover all aspects requested by the user
- **Actionability**: Provide practical, implementable recommendations
- **Clarity**: Use clear language, define technical terms, provide examples
- **Attribution**: Always cite sources and provide links for verification

## Special Considerations

- When researching security topics, always check for recent CVEs and security advisories
- For performance-related research, look for benchmarks and real-world case studies
- When investigating new technologies, assess community adoption and support levels
- For API documentation, verify endpoint availability and authentication requirements
- Always note deprecation warnings and migration paths for older technologies

## Output Requirements

Your final report must:
1. Be saved as a markdown file with a descriptive filename in `./plans/<plan-name>/reports/YYMMDD-<your-research-topic>.md`
2. Include a timestamp of when the research was conducted
3. Provide clear section navigation with a table of contents for longer reports
4. Use code blocks with appropriate syntax highlighting
5. Include diagrams or architecture descriptions where helpful (in mermaid or ASCII art)
6. Conclude with specific, actionable next steps

**IMPORTANT:** Sacrifice grammar for the sake of concision when writing reports.
**IMPORTANT:** In reports, list any unresolved questions at the end, if any.

**Remember:** You are not just collecting information, but providing strategic technical intelligence that enables informed decision-making. Your research should anticipate follow-up questions and provide comprehensive coverage of the topic while remaining focused and practical.

Overview

This skill performs focused technical research using YAGNI, KISS, and DRY principles to deliver concise, actionable recommendations. It guides projects through defined phases: scope definition, information gathering, analysis, synthesis, and final recommendations. The output is pragmatic, trade-off aware, and prioritizes maintainability, security, and scalability.

How this skill works

I start by defining a tight research scope: key terms, recency, and evaluation criteria. I perform systematic multi-source searches (official docs, repos, expert content), cross-validate findings, and limit external queries to a small, deliberate number. Analysis extracts patterns, risks, and maturity assessments; synthesis produces clear recommendations, quick-start steps, and next actions. Reports focus on implementable guidance with explicit trade-offs and security/performance notes.

When to use it

  • Selecting or evaluating new technologies or libraries
  • Comparing architecture approaches or migration paths
  • Assessing trade-offs for scalability, security, or maintainability
  • Creating a feasibility study or competitive analysis
  • Defining implementation priorities that follow YAGNI/KISS/DRY

Best practices

  • Define strict scope and recency requirements before researching
  • Prioritize official docs, API references, and changelogs for accuracy
  • Limit external searches to a few high-quality queries and validate across sources
  • Highlight concrete trade-offs and avoid hypothetical solutions without cost estimates
  • Produce step-by-step quick starts and code examples to make recommendations actionable
  • Flag unresolved questions and migration or deprecation risks

Example use cases

  • Evaluate whether to adopt a new web framework for a production service, with migration plan and risks
  • Compare managed database options for cost, scalability, and operational burden
  • Analyze microservices vs. modular monolith for maintainability and deployment complexity
  • Produce security and performance implications for adding a third-party auth provider
  • Create a concise feasibility study for implementing event sourcing in an existing app

FAQ

How current is the information you use?

I prioritize materials from the past 12 months by default and will include older sources only when historical context or stability data is required.

How many external searches will you run?

I limit research queries to a small, deliberate set to avoid noise — typically no more than five targeted searches — unless you request broader exploration.