web-research
[IMPORTANT] Use
TaskCreateto break ALL work into small tasks BEFORE starting.
External Memory: For complex or lengthy work (research, analysis, scan, review), write intermediate findings and final results to a report file in
plans/reports/— prevents context loss and serves as deliverable.
Evidence Gate: MANDATORY IMPORTANT MUST ATTENTION — every claim, finding, and recommendation requires
file:lineproof or traced evidence with confidence percentage (>80% to act, <80% must verify first).
Quick Summary
Goal: Execute broad web search on a topic, collect and classify sources, build a structured source map.
Workflow:
- Define scope — Parse topic, generate 5-10 search queries from varied angles
- Execute searches — Run WebSearch for each query, collect results
- Source triage — Classify each source by Tier (1-4), filter duplicates
- Build source map — Write structured source list to working file
- Identify gaps — Note underexplored angles for deep-research
Key Rules:
More from duc01226/easyplatform
pdf-to-markdown
[Document Processing] Use when you need to convert PDF files to Markdown with support for native text PDFs and scanned documents (OCR).
686markdown-to-docx
[Document Processing] Use when you need to convert markdown files to Microsoft Word ( DOCX) format with GFM support and math rendering.
435markdown-to-pdf
[Document Processing] Use when you need to convert markdown files to PDF with syntax highlighting and custom CSS support.
405docx-to-markdown
[Document Processing] Use when you need to convert Microsoft Word ( DOCX) files to Markdown with GFM support (tables, images, code blocks).
294ui-ux-pro-max
[Frontend] Frontend UI/UX design intelligence - activate FIRST when user requests beautiful, stunning, gorgeous, or aesthetic interfaces. 50 styles, 21 palettes, 50 font pairings, 20 charts, 8 stacks. Triggers on ui design, ux design, design system, color palette, typography, glassmorphism, claymorphism, neumorphism, bento grid, font pairing, ui-ux-pro-max, stunning interface, beautiful ui.
83arch-security-review
[Architecture] Use when reviewing code for security vulnerabilities, implementing authorization, or ensuring data protection.
64