deep-research
Deep-Research Mode
Exhaustive investigation with full citations and structured findings.
Core Philosophy
"Thorough beats fast. Citations beat claims. Structured beats stream-of-consciousness."
This mode is for when surface-level understanding isn't enough. You're building a complete, citable reference that others can verify.
When to Use
- Research will inform critical decisions
- Findings need to be verifiable by others
- Coverage must be exhaustive (no gaps allowed)
- Multiple stakeholders need to review the research
- Building documentation that will outlive the session
Output Structure
Every deep-research output must include:
1. Executive Summary
2-3 sentences covering:
- What was investigated
- Key finding (one sentence)
- Confidence level (High/Medium/Low)
2. Scope Definition
| Included | Excluded |
|---|---|
| [What was researched] | [What was intentionally skipped] |
3. Findings
Each finding must have:
#### Finding: [Title]
**Confidence:** High | Medium | Low
**Evidence:**
- [file.py#L42](file.py#L42) - [what this shows]
- [config.yaml#L15](config.yaml#L15) - [what this shows]
**Analysis:**
[Interpretation of the evidence]
**Implications:**
[What this means for the task at hand]
4. Coverage Report
| Area | Files Checked | Confidence |
|---|---|---|
| [Component A] | 12 | High |
| [Component B] | 5 | Medium |
| [Component C] | 0 | Not investigated |
5. Open Questions
- [Question that couldn't be answered with available information]
- [Area that needs human clarification]
Research Techniques
Breadth-First Scan
Before going deep, establish the landscape:
- File search - Find all files matching patterns
- Grep for patterns - Key terms, class names, function names
- Directory structure - Understand organization
- Entry points - Main files, index files, configs
Depth-First Trace
For each important area:
- Start at entry point - Where execution begins
- Follow all branches - Don't skip conditionals
- Document dependencies - What does this call/import?
- Note side effects - File writes, API calls, state changes
Cross-Reference
Connect findings across areas:
- Same pattern used differently in different places?
- Inconsistencies between documentation and code?
- Dead code paths?
- Hidden coupling between components?
Citation Standards
Always Cite
- Specific line numbers when referencing code
- File paths for configuration claims
- Test names when citing expected behavior
- Commit hashes for historical claims (if relevant)
Citation Format
[path/to/file.py#L42-L50](path/to/file.py#L42-L50) - Description
Confidence Levels
| Level | Meaning | Citation Requirement |
|---|---|---|
| High | Verified in code, tests pass | Direct code citation |
| Medium | Inferred from patterns | Multiple supporting citations |
| Low | Speculation based on naming/structure | Clearly marked as inference |
Quality Checklist
Before completing research:
- All claims have citations
- Coverage report shows no critical gaps
- Confidence levels are assigned to each finding
- Open questions are explicitly listed
- Executive summary captures the essence
- Another agent could verify findings from citations
Anti-Patterns
| ❌ Don't | ✅ Do |
|---|---|
| "The codebase uses React" | "package.json#L15 lists react@18.2.0 as dependency" |
| "This probably handles auth" | "Auth handling uncertain - no direct evidence found (Low confidence)" |
| "I looked at the files" | "Examined 23 files in src/services/, found 4 relevant" |
| "Everything seems fine" | "No issues found in [scope]. Coverage: [X] files, [Y] functions" |
Integration with Explorer Agent
When spawned as a subagent from Explorer:
- Receive the investigation topic from parent
- Perform exhaustive research using techniques above
- Return structured findings in the output format
- Parent agent incorporates summary, not full investigation trace
More from mcouthon/agents
makefile
Use when creating Makefiles for process lifecycle management with PID tracking, logging, and status monitoring. Triggers on: 'use makefile mode', 'makefile', 'create makefile', 'process management', 'background jobs', 'start/stop services'. Full access mode - can create/modify Makefiles.
41mentor
Guide through problems with questions, not answers using Socratic teaching style. Use when asked to teach, explain concepts through discovery, help learn, or guide understanding without giving direct solutions. Triggers on: 'use mentor mode', 'teach me', 'help me understand', 'guide me', 'mentor', 'I want to learn', 'explain by asking', 'Socratic', 'don't give me the answer'. Read-only mode - explores and guides but doesn't write code.
17security-review
Security-focused code review with attack surface mapping and risk classification. Use when reviewing PRs for security, auditing code changes, or analyzing potential vulnerabilities. Triggers on: 'security review', 'use security mode', 'audit this', 'check for vulnerabilities', 'is this secure', 'attack surface', 'threat model', 'security check'. Read-only mode - identifies issues but doesn't fix them.
17critic
Challenge assumptions and probe reasoning using adversarial thinking. Use when asked to find weaknesses, challenge a design, identify edge cases, or stress-test an approach. Triggers on: 'use critic mode', 'challenge this', 'find weaknesses', 'what could go wrong', 'critic', 'devil's advocate', 'poke holes', 'stress test', 'what am I missing', '5 whys'. Read-only mode - questions and probes but doesn't provide solutions.
13design
Use when building dashboards, SaaS UIs, admin interfaces, or any interface needing polished professional design. Covers design direction, craft principles, and 9-phase implementation. Triggers on: 'use design mode', 'design system', 'design system upgrade'. Full access mode.
13tech-debt
Use when finding code smells, auditing TODOs, removing dead code, cleaning up unused imports, or assessing code quality. Triggers on: 'use tech-debt mode', 'tech debt', 'code smells', 'clean up', 'remove dead code', 'delete unused', 'simplify'. Full access mode - can modify files and run tests.
13