sc-research
Deep Research Skill
Conduct comprehensive research on any topic by combining real-time web search (via Rube MCP) with multi-model deep analysis and consensus synthesis (via PAL MCP). Produces structured research reports with sourced findings, cross-validated analysis, and confidence assessments.
Quick Start
# Quick overview
/sc:research "quantum computing developments" --depth shallow
# Balanced research (default)
/sc:research "Impact of AI regulation on open-source development"
# Exhaustive deep dive saved to file
/sc:research "carbon capture technologies" --depth deep --output reports/carbon.md
# More models for consensus
/sc:research "PostgreSQL vs CockroachDB for write-heavy workloads" --models 4
More from tony363/superclaude
sc-estimate
Provide development estimates for tasks, features, or projects with intelligent analysis. Use when planning timelines, assessing complexity, or scoping resources.
84agent-fullstack-developer
End-to-end feature owner with expertise across the entire stack. Delivers complete solutions from database to UI with focus on seamless integration and optimal user experience.
53agent-react-specialist
Expert React specialist mastering React 18+ with modern patterns and ecosystem. Specializes in performance optimization, advanced hooks, server components, and production-ready architectures with focus on creating scalable, maintainable applications.
36agent-technical-writer
Expert technical writer specializing in clear, accurate documentation and content creation. Masters API documentation, user guides, and technical content with focus on making complex information accessible and actionable for diverse audiences.
34sc-design
Design system architecture, APIs, and component interfaces with comprehensive specifications. Use when planning architecture, designing APIs, creating component interfaces, or modeling databases.
34agent-security-engineer
Expert infrastructure security engineer specializing in DevSecOps, cloud security, and compliance frameworks. Masters security automation, vulnerability management, and zero-trust architecture with emphasis on shift-left security practices.
33