EasyPlatform research
[Planning] Use when you need to research, analyze, and plan technical solutions that are scalable, secure, and maintainable. For implementation planning, see also `planning` skill.
git clone https://github.com/duc01226/EasyPlatform
T=$(mktemp -d) && git clone --depth=1 https://github.com/duc01226/EasyPlatform "$T" && mkdir -p ~/.claude/skills && cp -r "$T/.claude/skills/research" ~/.claude/skills/duc01226-easyplatform-research && rm -rf "$T"
.claude/skills/research/SKILL.md<!-- SYNC:critical-thinking-mindset -->[IMPORTANT] Use
to break ALL work into small tasks BEFORE starting — including tasks for each file read. This prevents context loss from long files. For simple tasks, AI MUST ATTENTION ask user whether to skip.TaskCreate
<!-- /SYNC:critical-thinking-mindset --> <!-- SYNC:ai-mistake-prevention -->Critical Thinking Mindset — Apply critical thinking, sequential thinking. Every claim needs traced proof, confidence >80% to act. Anti-hallucination: Never present guess as fact — cite sources for every claim, admit uncertainty freely, self-check output for errors, cross-reference independently, stay skeptical of own confidence — certainty without evidence root of all hallucination.
<!-- /SYNC:ai-mistake-prevention -->AI Mistake Prevention — Failure modes to avoid on every task:
- Check downstream references before deleting. Deleting components causes documentation and code staleness cascades. Map all referencing files before removal.
- Verify AI-generated content against actual code. AI hallucinates APIs, class names, and method signatures. Always grep to confirm existence before documenting or referencing.
- Trace full dependency chain after edits. Changing a definition misses downstream variables and consumers derived from it. Always trace the full chain.
- Trace ALL code paths when verifying correctness. Confirming code exists is not confirming it executes. Always trace early exits, error branches, and conditional skips — not just happy path.
- When debugging, ask "whose responsibility?" before fixing. Trace whether bug is in caller (wrong data) or callee (wrong handling). Fix at responsible layer — never patch symptom site.
- Assume existing values are intentional — ask WHY before changing. Before changing any constant, limit, flag, or pattern: read comments, check git blame, examine surrounding code.
- Verify ALL affected outputs, not just the first. Changes touching multiple stacks require verifying EVERY output. One green check is not all green checks.
- Holistic-first debugging — resist nearest-attention trap. When investigating any failure, list EVERY precondition first (config, env vars, DB names, endpoints, DI registrations, data preconditions), then verify each against evidence before forming any code-layer hypothesis.
- Surgical changes — apply the diff test. Bug fix: every changed line must trace directly to the bug. Don't restyle or improve adjacent code. Enhancement task: implement improvements AND announce them explicitly.
- Surface ambiguity before coding — don't pick silently. If request has multiple interpretations, present each with effort estimate and ask. Never assume all-records, file-based, or more complex path.
Quick Summary
Goal: Research, analyze, and report on technical topics using multi-source web investigation.
Workflow:
- Scope Definition — Identify key terms, recency needs, evaluation criteria
- Information Gathering — Use gemini CLI or WebSearch (max 5 searches), cross-reference sources
- Analysis & Synthesis — Identify patterns, pros/cons, security/performance implications
- Report Generation — Save structured markdown report with findings and recommendations
Key Rules:
- Maximum 5 research tool calls per session
- Prefer gemini CLI if available, fallback to WebSearch
- Always cite sources and verify across multiple independent sources
Be skeptical. Apply critical thinking, sequential thinking. Every claim needs traced proof, confidence percentages (Idea should be more than 80%).
Research
Research Methodology
Always honoring YAGNI, KISS, and DRY principles. Be honest, be brutal, straight to the point, and be concise.
Phase 1: Scope Definition
First, you will clearly define the research scope by:
- Identifying key terms and concepts to investigate
- Determining the recency requirements (how current must information be)
- Establishing evaluation criteria for sources
- Setting boundaries for the research depth
Phase 2: Systematic Information Gathering
You will employ a multi-source research strategy:
-
Search Strategy:
- Check if
bash command is available, if so, executegemini
bash command (timeout: 10 minutes) and save the output usinggemini -m gemini-2.5-flash -p "...your search prompt..."
path fromReport:
section (including all citations).## Naming - If
bash command is not available, fallback togemini
tool.WebSearch - Run multiple
bash commands orgemini
tools in parallel to search for relevant information.WebSearch - Craft precise search queries with relevant keywords
- Include terms like "best practices", "2024", "latest", "security", "performance"
- Search for official documentation, GitHub repositories, and authoritative blogs
- Prioritize results from recognized authorities (official docs, major tech companies, respected developers)
- IMPORTANT: You are allowed to perform at most 5 researches (max 5 tool calls), user might request less than this amount, strictly respect it, think carefully based on the task before performing each related research topic.
- Check if
-
Deep Content Analysis:
- When you found a potential Github repository URL, use
skill to find read it.docs-seeker - Focus on official documentation, API references, and technical specifications
- Analyze README files from popular GitHub repositories
- Review changelog and release notes for version-specific information
- When you found a potential Github repository URL, use
-
Video Content Research:
- Prioritize content from official channels, recognized experts, and major conferences
- Focus on practical demonstrations and real-world implementations
-
Cross-Reference Validation:
- Verify information across multiple independent sources
- Check publication dates to ensure currency
- Identify consensus vs. controversial approaches
- Note any conflicting information or debates in the community
Phase 3: Analysis and Synthesis
You will analyze gathered information by:
- Identifying common patterns and best practices
- Evaluating pros and cons of different approaches
- Assessing maturity and stability of technologies
- Recognizing security implications and performance considerations
- Determining compatibility and integration requirements
Phase 4: Report Generation
Notes:
- Research reports are saved using
path fromReport:
section.## Naming - If
section is not available, ask main agent to provide the output path.## Naming
You will create a comprehensive markdown report with the following structure:
# Research Report: [Topic] ## Executive Summary [2-3 paragraph overview of key findings and recommendations] ## Research Methodology - Sources consulted: [number] - Date range of materials: [earliest to most recent] - Key search terms used: [list] ## Key Findings ### 1. Technology Overview [Comprehensive description of the technology/topic] ### 2. Current State & Trends [Latest developments, version information, adoption trends] ### 3. Best Practices [Detailed list of recommended practices with explanations] ### 4. Security Considerations [Security implications, vulnerabilities, and mitigation strategies] ### 5. Performance Insights [Performance characteristics, optimization techniques, benchmarks] ## Comparative Analysis [If applicable, comparison of different solutions/approaches] ## Implementation Recommendations ### Quick Start Guide [Step-by-step getting started instructions] ### Code Examples [Relevant code snippets with explanations] ### Common Pitfalls [Mistakes to avoid and their solutions] ## Resources & References ### Official Documentation - [Linked list of official docs] ### Recommended Tutorials - [Curated list with descriptions] ### Community Resources - [Forums, Discord servers, Stack Overflow tags] ### Further Reading - [Advanced topics and deep dives] ## Appendices ### A. Glossary [Technical terms and definitions] ### B. Version Compatibility Matrix [If applicable] ### C. Raw Research Notes [Optional: detailed notes from research process]
Quality Standards
You will ensure all research meets these criteria:
- Accuracy: Information is verified across multiple sources
- Currency: Prioritize information from the last 12 months unless historical context is needed
- Completeness: Cover all aspects requested by the user
- Actionability: Provide practical, implementable recommendations
- Clarity: Use clear language, define technical terms, provide examples
- Attribution: Always cite sources and provide links for verification
Special Considerations
- When researching security topics, always check for recent CVEs and security advisories
- For performance-related research, look for benchmarks and real-world case studies
- When investigating new technologies, assess community adoption and support levels
- For API documentation, verify endpoint availability and authentication requirements
- Always note deprecation warnings and migration paths for older technologies
Output Requirements
Your final report must:
- Be saved using the
path fromReport:
section with a descriptive filename## Naming - Include a timestamp of when the research was conducted
- Provide clear section navigation with a table of contents for longer reports
- Use code blocks with appropriate syntax highlighting
- Include diagrams or architecture descriptions where helpful (in mermaid or ASCII art)
- Conclude with specific, actionable next steps
IMPORTANT: Sacrifice grammar for the sake of concision when writing reports. IMPORTANT: In reports, list any unresolved questions at the end, if any.
Remember: You are not just collecting information, but providing strategic technical intelligence that enables informed decision-making. Your research should anticipate follow-up questions and provide comprehensive coverage of the topic while remaining focused and practical.
Closing Reminders
- IMPORTANT MUST ATTENTION break work into small todo tasks using
BEFORE startingTaskCreate - IMPORTANT MUST ATTENTION search codebase for 3+ similar patterns before creating new code
- IMPORTANT MUST ATTENTION cite
evidence for every claim (confidence >80% to act)file:line - IMPORTANT MUST ATTENTION add a final review todo task to verify work quality <!-- SYNC:critical-thinking-mindset:reminder -->
- MUST ATTENTION apply critical thinking — every claim needs traced proof, confidence >80% to act. Anti-hallucination: never present guess as fact. <!-- /SYNC:critical-thinking-mindset:reminder --> <!-- SYNC:ai-mistake-prevention:reminder -->
- MUST ATTENTION apply AI mistake prevention — holistic-first debugging, fix at responsible layer, surface ambiguity before coding, re-read files after compaction. <!-- /SYNC:ai-mistake-prevention:reminder -->