| name | research |
| description | Use when you need to research, analyze, and plan technical solutions that are scalable, secure, and maintainable. |
| license | MIT |
Research
Research Methodology
Phase 1: Scope Definition
First, you will clearly define the research scope by:
- Identifying key terms and concepts to investigate
- Determining the recency requirements (how current must information be)
- Establishing evaluation criteria for sources
- Setting boundaries for the research depth
Phase 2: Systematic Information Gathering
You will employ a multi-source research strategy:
Search Strategy:
- Check if
geminibash command is available, if so, executegemini -m gemini-2.5-flash -p "...your search prompt..."command and save the output to./plans/<plan-name>/research/YYMMDD-<your-research-topic>.mdfile (including all citations). - If
geminibash command is not available, fallback toWebSearchtool. - Craft precise search queries with relevant keywords
- Include terms like "best practices", "2024", "latest", "security", "performance"
- Search for official documentation, GitHub repositories, and authoritative blogs
- Prioritize results from recognized authorities (official docs, major tech companies, respected developers)
- Check if
Deep Content Analysis:
- When you found a potential Github repository URL, use
docs-seekerskill to find read it. - Focus on official documentation, API references, and technical specifications
- Analyze README files from popular GitHub repositories
- Review changelog and release notes for version-specific information
- When you found a potential Github repository URL, use
Video Content Research:
- Prioritize content from official channels, recognized experts, and major conferences
- Focus on practical demonstrations and real-world implementations
Cross-Reference Validation:
- Verify information across multiple independent sources
- Check publication dates to ensure currency
- Identify consensus vs. controversial approaches
- Note any conflicting information or debates in the community
Phase 3: Analysis and Synthesis
You will analyze gathered information by:
- Identifying common patterns and best practices
- Evaluating pros and cons of different approaches
- Assessing maturity and stability of technologies
- Recognizing security implications and performance considerations
- Determining compatibility and integration requirements
Phase 4: Report Generation
Notes: Research reports are saved in ./plans/<plan-name>/research/YYMMDD-<your-research-topic>.md.
You will create a comprehensive markdown report with the following structure:
# Research Report: [Topic]
## Executive Summary
[2-3 paragraph overview of key findings and recommendations]
## Research Methodology
- Sources consulted: [number]
- Date range of materials: [earliest to most recent]
- Key search terms used: [list]
## Key Findings
### 1. Technology Overview
[Comprehensive description of the technology/topic]
### 2. Current State & Trends
[Latest developments, version information, adoption trends]
### 3. Best Practices
[Detailed list of recommended practices with explanations]
### 4. Security Considerations
[Security implications, vulnerabilities, and mitigation strategies]
### 5. Performance Insights
[Performance characteristics, optimization techniques, benchmarks]
## Comparative Analysis
[If applicable, comparison of different solutions/approaches]
## Implementation Recommendations
### Quick Start Guide
[Step-by-step getting started instructions]
### Code Examples
[Relevant code snippets with explanations]
### Common Pitfalls
[Mistakes to avoid and their solutions]
## Resources & References
### Official Documentation
- [Linked list of official docs]
### Recommended Tutorials
- [Curated list with descriptions]
### Community Resources
- [Forums, Discord servers, Stack Overflow tags]
### Further Reading
- [Advanced topics and deep dives]
## Appendices
### A. Glossary
[Technical terms and definitions]
### B. Version Compatibility Matrix
[If applicable]
### C. Raw Research Notes
[Optional: detailed notes from research process]
Quality Standards
You will ensure all research meets these criteria:
- Accuracy: Information is verified across multiple sources
- Currency: Prioritize information from the last 12 months unless historical context is needed
- Completeness: Cover all aspects requested by the user
- Actionability: Provide practical, implementable recommendations
- Clarity: Use clear language, define technical terms, provide examples
- Attribution: Always cite sources and provide links for verification
Special Considerations
- When researching security topics, always check for recent CVEs and security advisories
- For performance-related research, look for benchmarks and real-world case studies
- When investigating new technologies, assess community adoption and support levels
- For API documentation, verify endpoint availability and authentication requirements
- Always note deprecation warnings and migration paths for older technologies
Output Requirements
Your final report must:
- Be saved as a markdown file with a descriptive filename in
./plans/<plan-name>/research/YYMMDD-<your-research-topic>.md - Include a timestamp of when the research was conducted
- Provide clear section navigation with a table of contents for longer reports
- Use code blocks with appropriate syntax highlighting
- Include diagrams or architecture descriptions where helpful (in mermaid or ASCII art)
- Conclude with specific, actionable next steps
IMPORTANT: Sacrifice grammar for the sake of concision when writing reports. IMPORTANT: In reports, list any unresolved questions at the end, if any.
Remember: You are not just collecting information, but providing strategic technical intelligence that enables informed decision-making. Your research should anticipate follow-up questions and provide comprehensive coverage of the topic while remaining focused and practical.