feat(deep-research): V6.1 source accessibility policy and Counter-Review Team

- Correct source accessibility: distinguish circular verification (forbidden)
  from exclusive information advantage (encouraged)
- Add Counter-Review Team with 5 specialized agents (claim-validator,
  source-diversity-checker, recency-validator, contradiction-finder,
  counter-review-coordinator)
- Add Enterprise Research Mode: 6-dimension data collection framework
  with SWOT, competitive barrier, and risk matrix analysis
- Update version to 2.4.0
- Add comprehensive reference docs:
  - source_accessibility_policy.md
  - V6_1_improvements.md
  - counter_review_team_guide.md
  - enterprise_analysis_frameworks.md
  - enterprise_quality_checklist.md
  - enterprise_research_methodology.md
  - quality_gates.md
  - report_template_v6.md
  - research_notes_format.md
  - subagent_prompt.md

Based on "深度推理" case study methodology lessons learned.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
This commit is contained in:
daymade
2026-04-04 09:15:17 +08:00
parent 87221d94d5
commit 6d261ce801
12 changed files with 1810 additions and 131 deletions

View File

@@ -0,0 +1,112 @@
# Deep Research Skill V6.1 Improvements
**Date**: 2026-04-03
**Version**: 2.3.0 → 2.4.0
**Based on**: User feedback and "深度推理" case study
---
## Summary of Changes
### 1. Source Accessibility Policy - Critical Correction
**Problem Identified**:
Previously, we incorrectly banned all "privileged" sources. This was wrong because it prevented users from leveraging their competitive information advantages.
**The Real Issue**:
The problem is not using user's private information—it's **circular verification**: using user's data to "discover" what they already know about themselves.
**Example of the Error**:
```
User: "Research my company 深度推理"
❌ WRONG: Access user's Spaceship → "You own 25 domains"
→ This is circular: user already knows they own these domains
✅ RIGHT: Check public WHOIS → "Privacy protected, ownership not visible"
→ This is external research perspective
```
**Correct Classification**:
| Accessibility | For Self-Research | For Third-Party Research |
|--------------|-------------------|-------------------------|
| `public` | ✅ Use | ✅ Use |
| `semi-public` | ✅ Use | ✅ Use |
| `exclusive-user-provided` | ⚠️ Careful* | ✅ **ENCOURAGED** |
| `private-user-owned` | ❌ **FORBIDDEN** | N/A |
\* When user provides exclusive sources for their own company, evaluate if it's circular
### 2. Counter-Review Team V2
**Created**: 5-agent parallel review team
- 🔵 claim-validator: Claim validation
- 🟢 source-diversity-checker: Source diversity analysis
- 🟡 recency-validator: Recency/freshness checks
- 🟣 contradiction-finder: Contradiction and bias detection
- 🟠 counter-review-coordinator: Synthesis and reporting
**Usage**:
```bash
# 1. Dispatch to 4 specialists in parallel
SendMessage to: claim-validator
SendMessage to: source-diversity-checker
SendMessage to: recency-validator
SendMessage to: contradiction-finder
# 2. Send to coordinator for synthesis
SendMessage to: counter-review-coordinator
```
### 3. Methodology Clarifications
#### When Researching User's Own Company
- **Approach**: External investigator perspective
- **Use**: Public sources only
- **Do NOT use**: User's private accounts (creates circular verification)
- **Report**: "From public perspective: X, Y, Z gaps"
#### When User Provides Exclusive Sources for Third-Party Research
- **Approach**: Leverage competitive advantage
- **Use**: User's paid subscriptions, private APIs, proprietary databases
- **Cite**: Mark as `exclusive-user-provided`
- **Report**: "Per user's exclusive source [Crunchbase Pro], competitor X raised $Y"
### 4. Registry Format Update
**Added fields**:
- `Accessibility`: public / semi-public / exclusive-user-provided / private-user-owned
- `Circular rejection tracking`: Note when sources are rejected for circular verification
**Updated anti-patterns**:
-**CIRCULAR VERIFICATION**: Never use user's private data to "discover" what they already know
-**USE EXCLUSIVE SOURCES**: When user provides Crunchbase Pro etc. for competitor research, USE IT
### 5. Documentation Updates
**New/Updated Files**:
- `source_accessibility_policy.md`: Complete rewrite explaining circular vs. competitive advantage distinction
- `counter_review_team_guide.md`: Usage guide for the 5-agent team
- `SKILL.md`: Updated Source Governance section with correct classification
- `marketplace.json`: Updated description
---
## Key Principles Summary
1. **Circular Verification is Bad**: Don't use user's data to tell them what they already know
2. **Exclusive Information Advantage is Good**: Use user's paid tools to research competitors
3. **External Perspective for Self-Research**: When researching user's own company, act like an external investigator
4. **Leverage Everything for Third-Party**: When researching others, use every advantage user provides
---
## Version History
| Version | Changes |
|---------|---------|
| 2.0.0 | Initial Enterprise Research Mode |
| 2.1.0 | V6 features: source governance, AS_OF, counter-review |
| 2.2.0 | Counter-Review Team |
| 2.3.0 | Source accessibility (initial, incorrect ban on privileged) |
| **2.4.0** | **Corrected: circular vs. exclusive advantage distinction** |

View File

@@ -0,0 +1,181 @@
# Counter-Review Team 使用指南
Deep Research V6 P6 阶段的专用 Agent Team并行执行多维度审查。
## Team 架构
```
counter-review-coordinator (协调者)
├── claim-validator (声明验证器)
├── source-diversity-checker (来源多样性检查器)
├── recency-validator (时效性验证器)
└── contradiction-finder (矛盾发现器)
```
## Agent 职责
| Agent | 职责 | 输出 |
|-------|------|------|
| **claim-validator** | 验证声明准确性,识别无证据/弱证据声明 | Claim Validation Report |
| **source-diversity-checker** | 检查单一来源依赖source-type 分布 | Source Diversity Report |
| **recency-validator** | 验证时敏声明的新鲜度AS_OF 合规 | Recency Validation Report |
| **contradiction-finder** | 发现内部矛盾,缺失的反向观点 | Contradiction and Bias Report |
| **counter-review-coordinator** | 整合所有报告,生成最终 P6 报告 | P6 Counter-Review Report |
## 使用流程
### 1. 准备输入材料
在 P5 (Draft) 完成后,收集以下材料:
```
inputs/
├── draft_report.md # P5 起草的报告
├── citation_registry.md # P3 的引用注册表
├── task-notes/
│ ├── task-a.md # 子代理研究笔记
│ ├── task-b.md
│ └── ...
└── p0_config.md # P0 配置 (AS_OF 日期, Mode 等)
```
### 2. 并行分发任务
向 4 个 specialist agent 同时发送任务:
```bash
# 向 claim-validator 发送
SendMessage to: claim-validator
输入: draft_report.md + citation_registry.md + task-notes/
指令: 验证所有声明的证据支持
# 向 source-diversity-checker 发送
SendMessage to: source-diversity-checker
输入: draft_report.md + citation_registry.md
指令: 检查来源多样性和单一来源依赖
# 向 recency-validator 发送
SendMessage to: recency-validator
输入: draft_report.md + citation_registry.md + p0_config.md
指令: 验证时敏声明的新鲜度
# 向 contradiction-finder 发送
SendMessage to: contradiction-finder
输入: draft_report.md + task-notes/ + citation_registry.md
指令: 发现矛盾和缺失的反向观点
```
### 3. 协调汇总
等待 4 个 specialist 完成后,发送给 coordinator
```bash
SendMessage to: counter-review-coordinator
输入:
- Claim Validation Report
- Source Diversity Report
- Recency Validation Report
- Contradiction and Bias Report
指令: 整合所有报告,生成最终 P6 Counter-Review Report
```
### 4. 获取最终输出
Coordinator 输出包含:
- 问题汇总(必须 ≥3 个)
- 关键争议部分(可直接复制到最终报告)
- 强制修复清单
- 质量门状态
## 质量门要求
| 检查项 | 标准模式 | 轻量模式 | 失败处理 |
|--------|---------|---------|---------|
| 发现问题数 | ≥3 | ≥3 | 重新审查 |
| 关键声明单来源 | 0 | 0 | 补充来源或降级 |
| 官方来源占比 | ≥30% | ≥20% | 补充官方来源 |
| AS_OF 日期完整 | 100% | 100% | 补充日期 |
| 核心争议文档化 | 必填 | 必填 | 补充争议部分 |
## 输出示例
### Coordinator 最终报告结构
```markdown
# P6 Counter-Review Report
## Executive Summary
- Total issues found: 7 (critical: 2, high: 3, medium: 2)
- Must-fix before publish: 2
- Recommended improvements: 5
## Critical Issues (Block Publish)
| # | Issue | Location | Source | Fix Required |
|---|-------|----------|--------|--------------|
| 1 | 市场份额声明无来源 | 3.2节 | 无 | 补充来源或删除 |
| 2 | 单一社区来源支持收入数据 | 4.1节 | [12] community | 找官方来源替代 |
## 核心争议 / Key Controversies
- **争议 1:** 公司声称增长 50% vs 分析师报告增长 30%
- 证据强度: official(公司财报) vs academic(第三方研究)
- 建议: 并列呈现两种数据,说明差异原因
## Mandatory Fixes Checklist
- [ ] 补充 3.2 节市场份额来源
- [ ] 替换 4.1 节收入数据来源
- [ ] 添加 AS_OF: 2026-04-03 到所有时敏声明
## Quality Gates Status
| Gate | Status | Notes |
|------|--------|-------|
| P6 ≥3 issues found | ✅ | 发现 7 个问题 |
| No critical claim single-sourced | ❌ | 2 个问题待修复 |
| AS_OF dates present | ❌ | 3 处缺失 |
| Counter-claims documented | ✅ | 已添加 |
```
## 集成到 SKILL.md 工作流
在 SKILL.md 的 P6 阶段,添加以下指令:
```markdown
## P6: Counter-Review (Mandatory)
**使用 Counter-Review Team 执行并行审查:**
1. **准备材料**: draft_report.md, citation_registry.md, task-notes/, p0_config.md
2. **并行分发**: 同时发送给 4 个 specialist agent
3. **等待完成**: 收集 4 份 specialist 报告
4. **协调汇总**: 发送给 coordinator 生成最终 P6 报告
5. **强制执行**: 所有 Critical 问题必须在 P7 前修复
6. **输出**: 将"核心争议"部分复制到最终报告
**Report**: `[P6 complete] {N} issues found: {critical} critical, {high} high, {medium} medium.`
```
## 团队管理
### 查看团队状态
```bash
cat ~/.claude/teams/counter-review-team/config.json
```
### 向 Agent 发送消息
```bash
SendMessage to: claim-validator
message: 开始审查任务,输入文件在 ./review-inputs/
```
### 关闭团队
```bash
SendMessage to: "*"
message: {"type": "shutdown_request", "reason": "任务完成"}
```
## 注意事项
1. **必须发现 ≥3 个问题** - 如果 coordinator 报告 <3 个问题,需要重新审查
2. **Critical 问题必须修复** - 才能进入 P7
3. **保留所有审查记录** - 作为研究方法论的一部分
4. **中文输入中文输出** - 所有 agent 支持中英文双语

View File

@@ -0,0 +1,135 @@
# Enterprise Analysis Frameworks
Apply these frameworks after completing the six-dimension data collection. Execute in order: SWOT → Competitive Barriers → Risk Matrix → Comprehensive Scoring.
## SWOT Analysis Template
Each SWOT entry MUST include evidence and source attribution.
```
| | Positive Factors | Negative Factors |
|--------------|-----------------------------------|-----------------------------------|
| **Internal** | **S (Strengths)** | **W (Weaknesses)** |
| | 1. {description} | 1. {description} |
| | • Evidence: {data/fact} | • Evidence: {data/fact} |
| | • Source: {citation} | • Source: {citation} |
| | • Impact: {assessment} | • Impact: {assessment} |
| | | |
| **External** | **O (Opportunities)** | **T (Threats)** |
| | 1. {description} | 1. {description} |
| | • Evidence: {trend/policy} | • Evidence: {pressure/risk} |
| | • Source: {citation} | • Source: {citation} |
| | • Probability: {assessment} | • Probability: {assessment} |
| | • Impact: {assessment} | • Impact: {assessment} |
```
**Requirements**:
- Each quadrant: 3-5 entries minimum
- Every entry must have evidence with source
- S/W must be data-backed (not opinions)
- O/T must include probability and impact estimates
**Strategic Implications Matrix** (generate after SWOT):
- **SO Strategy** (leverage strengths to capture opportunities): 1-2 specific recommendations
- **WO Strategy** (overcome weaknesses to seize opportunities): 1-2 specific recommendations
- **ST Strategy** (use strengths to counter threats): 1-2 specific recommendations
- **WT Strategy** (mitigate weaknesses to avoid threats): 1-2 specific recommendations
## Competitive Barrier Quantification Framework
7 barrier dimensions with weighted scoring:
| Dimension | Weight | Strong | Moderate | Weak |
|-----------|--------|--------|----------|------|
| **Network Effects** | 20% | 4.5 — Clear network effects (social platforms, marketplaces) | 3.0 — Exists but replaceable | 1.5 — Minimal network effects |
| **Scale Economies** | 15% | 4.0 — Unit cost drops 30%+ with scale | 2.5 — Cost drops 10-30% | 1.0 — Cost drops <10% |
| **Brand Value** | 15% | 4.0 — Category leader, high pricing power | 2.5 — Known brand, competitive | 1.0 — Commodity brand, price-sensitive |
| **Technology/Patents** | 15% | 4.0 — Core patents, hard to circumvent | 2.5 — Some patent protection | 1.0 — Peripheral patents only |
| **Switching Costs** | 15% | 4.0 — High lock-in (data, ecosystem) | 2.5 — Moderate switching friction | 1.0 — Low switching cost |
| **Regulatory Licenses** | 10% | 3.5 — Heavy regulation, hard to obtain | 2.0 — Standard regulatory requirements | 0.5 — Light regulation |
| **Data Assets** | 10% | 3.5 — Massive proprietary high-quality data | 2.0 — Some data accumulation | 0.5 — Limited or public data |
**Scoring**: Total = Σ(dimension score × weight)
**Rating Scale**:
| Score | Rating | Interpretation |
|-------|--------|---------------|
| ≥3.5 | A+ | Exceptional moat |
| ≥2.8 | A | Strong moat |
| ≥2.0 | B+ | Good moat |
| ≥1.5 | B | Moderate moat |
| ≥1.0 | C+ | Limited moat |
| <1.0 | C | Weak moat |
**Output format**: Present a scorecard table with each dimension's strength rating, raw score, justification (with evidence), and the weighted total with final rating.
## Risk Matrix Framework
Assess 8 mandatory risk categories:
### Risk Assessment Scales
**Probability**:
| Level | Range | Score |
|-------|-------|-------|
| High | >70% | 0.7-1.0 |
| Medium | 30-70% | 0.3-0.7 |
| Low | <30% | 0.0-0.3 |
**Impact**:
| Level | Description | Score |
|-------|-------------|-------|
| High | >30% revenue impact | 3 |
| Medium | 10-30% revenue impact | 2 |
| Low | <10% revenue impact | 1 |
**Risk Level**: Risk Value = Probability Score × Impact Score
| Color | Level | Threshold |
|-------|-------|-----------|
| Red | High risk | ≥2.5 |
| Yellow | Medium risk | 1.0 2.5 |
| Green | Low risk | <1.0 |
### 8 Mandatory Risk Categories
| # | Category | Typical Triggers |
|---|----------|-----------------|
| 1 | Market risk | Industry slowdown, demand shifts |
| 2 | Competitive risk | New entrants, incumbents pivoting |
| 3 | Technology risk | Tech obsolescence, disruption |
| 4 | Regulatory risk | Policy tightening, compliance cost |
| 5 | Financial risk | Cash flow stress, debt levels |
| 6 | Operational risk | Key talent loss, supply chain |
| 7 | Talent risk | Brain drain, recruiting difficulty |
| 8 | Geopolitical risk | Trade friction, data localization |
### Risk Table Format
| Category | Specific Risk | Probability | Impact | Risk Value | Level | Evidence/Triggers | Current Mitigations | Recommended Actions |
|----------|--------------|-------------|--------|------------|-------|-------------------|--------------------|--------------------|
**Requirements**:
- All 8 categories must be assessed (no skipping)
- Each risk entry must cite specific evidence or triggers
- Provide current mitigations AND recommended actions
- High risks: require immediate action plans
- Medium risks: require monitoring plans
- Low risks: require periodic review schedule
## Comprehensive Scoring (Final Section)
After completing SWOT, barriers, and risk matrix, generate a comprehensive scorecard:
```
| Dimension | Score | Weight | Weighted | Key Evidence |
|-----------|-------|--------|----------|-------------|
| Business Quality | X/10 | 25% | | |
| Competitive Position | X/10 | 20% | | |
| Financial Health | X/10 | 20% | | |
| Growth Potential | X/10 | 15% | | |
| Risk Profile | X/10 | 10% | | |
| Management Quality | X/10 | 10% | | |
| **Total** | | 100% | **X/10** | |
```
Every score must reference specific evidence from the six-dimension data collection.

View File

@@ -0,0 +1,160 @@
# Enterprise Research Quality Checklist
Three-level quality control executed at each stage transition.
## L1: Data Collection Quality (after each dimension)
### Per-Dimension Checks
| Check Item | Standard | Method | Pass Condition |
|-----------|----------|--------|---------------|
| Source count | Key data points ≥2 sources | Count source annotations | ≥90% compliance |
| Source attribution | All data has source marked | Check citations in draft | ≥95% completeness |
| Cross-validation pass rate | Data deviation ≤10% | Compare multi-source data | ≥95% validation pass |
| Timeliness | Financial: ≤2 years; News: ≤6 months | Check timestamps | 100% compliance |
**Result handling**: All pass → proceed. Partial fail → supplement sources. Critical fail → re-collect dimension.
### Dimension-Specific Checklists
**D1 Company Fundamentals** (target: 11/11):
- [ ] Legal entity boundaries clarified
- [ ] Founding date with month/year
- [ ] Headquarters city identified
- [ ] Founder/CEO confirmed (≥2 sources)
- [ ] Employee count with year
- [ ] Listing status (exchange, ticker)
- [ ] Latest valuation/market cap with date
- [ ] Core business one-liner
- [ ] Funding history ≥3 rounds
- [ ] ≥5 milestone events in timeline
- [ ] Ownership structure: controller identified
**D2 Business & Products** (target: 7/7):
- [ ] ≥3 business segments identified
- [ ] Revenue share per segment
- [ ] ≥3 core products analyzed
- [ ] User metrics (DAU/MAU) with numbers
- [ ] Monetization model per product
- [ ] Revenue breakdown (segment/geography/customer)
- [ ] Growth/decline trend per segment
**D3 Competitive Position** (target: 7/7):
- [ ] Industry clearly defined
- [ ] Market size quantified
- [ ] Company rank established
- [ ] Market share with number
- [ ] ≥3 competitors identified
- [ ] Multi-dimension comparison table complete
- [ ] ≥5 barrier dimensions assessed with scores
**D4 Financial & Operations** (target: 9/9):
- [ ] Revenue: 3-year data
- [ ] Net income: 3-year data
- [ ] Gross margin: 3-year data
- [ ] Net margin: 3-year data
- [ ] Operating cash flow: 3-year data
- [ ] R&D expense: 3-year data
- [ ] Key financial data cross-validated (≥2 sources)
- [ ] Metric definitions consistent across years
- [ ] ≥3 efficiency metrics (ROE/ROA/etc.)
**D5 Recent Developments** (target: 5/5):
- [ ] ≥5 recent events (within 6 months)
- [ ] Events span ≥3 event types
- [ ] Each event has impact assessment
- [ ] ≥2 strategic direction signals identified
- [ ] Most recent event within 1 month
**D6 Internal/Proprietary** (target: 2/2):
- [ ] Internal knowledge base queried (or limitation noted)
- [ ] Internal document search executed (or limitation noted)
## L2: Analysis Quality (after analysis frameworks applied)
| Check Item | Standard | Method | Pass Condition |
|-----------|----------|--------|---------------|
| SWOT completeness | Each quadrant ≥3 entries | Entry count | Full coverage |
| SWOT evidence | Every entry has data backing | Check "Evidence" fields | 100% evidenced |
| Risk matrix coverage | All 8 categories assessed | Category checklist | 100% covered |
| Barrier quantification | All 7 dimensions scored | Check scorecard completeness | 100% scored |
| Conclusion support | All conclusions trace to evidence | Trace each conclusion | 100% supported |
**Result handling**: All pass → proceed to writing. Partial fail → supplement analysis evidence. Critical fail → re-execute analysis framework.
## L3: Document Quality (after report drafted)
| Check Item | Standard | Method | Pass Condition |
|-----------|----------|--------|---------------|
| Structure compliance | Follows 7-chapter template | Compare against template | ≥95% compliance |
| Table format consistency | All tables uniformly formatted | Visual inspection | 100% uniform |
| Readability | Paragraphs ≤450 chars; ≥3 parallel items use lists | Paragraph length check | ≥95% compliance |
| Data annotation | All data has source + year | Citation audit | 100% complete |
| Appendix completeness | Includes source index + glossary | Content check | 100% complete |
**Result handling**: All pass → deliver. Partial fail → format optimization. Critical fail → regenerate document.
## Enterprise Report Structure (7 Chapters)
```
# {Company Name} Research Report
> Executive Summary: {1-2 sentence core conclusion}
---
## 1. Company Overview
### 1.1 Basic Information (table)
### 1.2 Development Timeline
### 1.3 Funding History (table)
### 1.4 Ownership Structure & Control
### 1.5 Core Management Team (table)
## 2. Business & Product Structure
### 2.1 Business Landscape Overview
### 2.2 Core Product Matrix (table)
### 2.3 Revenue Structure Analysis
### 2.4 Business Development Trends
## 3. Market & Competitive Position
### 3.1 Industry Position Analysis
### 3.2 Competitive Comparison (table)
### 3.3 Competitive Barrier Assessment (scorecard)
## 4. Financial & Operations Analysis
### 4.1 Key Financial Metrics (3-year comparison table)
### 4.2 Operating Efficiency Assessment
### 4.3 Financial Health Summary
## 5. Risks & Concerns
### 5.1 Risk Matrix Analysis (8-category table)
### 5.2 Key Risk Deep-Dives
### 5.3 Risk Mitigation Recommendations
## 6. Recent Developments
### 6.1 Major Recent Events (table)
### 6.2 Strategic Signal Interpretation
## 7. Comprehensive Assessment & Conclusion
### 7.1 SWOT Summary
### 7.2 Comprehensive Scorecard
### 7.3 Core Conclusions & Outlook
---
## Appendices
### A. Data Source Index
### B. Glossary
### C. Disclaimer
```
## Quality Control Four Dimensions
Apply throughout all stages:
| Dimension | Focus | Key Checks |
|-----------|-------|------------|
| **Accuracy** | Data correctness | Source attribution, fact verification, cross-validation, error tolerance |
| **Completeness** | Information coverage | Dimension coverage, key element presence, conclusion support, risk coverage |
| **Timeliness** | Data currency | Data freshness, trend capture, signal detection, dynamic updates |
| **Consistency** | Uniform standards | Metric definitions aligned, format unified, style consistent, terminology standardized |

View File

@@ -0,0 +1,164 @@
# Enterprise Research Methodology
## Six-Dimension Data Collection
Enterprise research requires parallel collection across six dimensions. Execute all six in order, writing findings to a structured draft after each dimension.
### Dimension 1: Company Fundamentals
```
Step 1.1: Confirm legal entity
├── Clarify parent/subsidiary/affiliate boundaries
├── Query: "{company} legal entity corporate structure"
├── Output: Entity scope statement
└── Verify: Map operating entities to brands
Step 1.2: Basic information
├── Query round 1: "{company} founding date headquarters founder"
├── Query round 2: "{company} company overview profile"
├── Query round 3: "{company} CEO management team executives"
├── Source priority: Official site > Regulatory filings > Authoritative media
└── Output: Basic info table (name, founded, HQ, CEO, employees, listing status)
Step 1.3: Funding history
├── Query: "{company} funding rounds valuation IPO"
├── Key fields: round, amount, investors, post-money valuation, date
└── Output: Funding timeline table
Step 1.4: Ownership structure
├── Query: "{company} ownership structure beneficial owner"
├── Key fields: controller identity, economic interest %, voting rights %, control mechanisms (dual-class etc.)
└── Output: Ownership summary
```
### Dimension 2: Business & Products
```
Step 2.1: Business landscape scan
├── Query round 1: "{company} product lines business segments"
├── Query round 2: "{company} revenue breakdown by segment"
├── Query round 3: "{company} business model monetization"
├── Key fields: segment name, positioning, revenue share, YoY growth, synergies
└── Output: Business landscape table
Step 2.2: Core product analysis
├── Query: "{company} core products DAU MAU user base"
├── Per product: positioning, target users, scale (DAU/MAU), market share, monetization, competitive advantage, trends
└── Output: Product matrix table
Step 2.3: Revenue structure analysis
├── Source: Financial reports (deep extraction)
├── Breakdown by: segment, geography, customer type, pricing model
└── Output: Revenue structure summary
```
### Dimension 3: Competitive Position
```
Step 3.1: Industry position
├── Query: "{company} industry ranking market share"
├── Key fields: industry definition, TAM/SAM/SOM, company rank, share, concentration (CR3/CR5)
└── Output: Industry position analysis
Step 3.2: Competitor identification & comparison
├── Query round 1: "{company} competitors"
├── Query round 2: "{company} vs {competitor A} comparison"
├── Query round 3: "{company} vs {competitor B} differences"
├── Comparison dimensions: founding, revenue, market share, core products, user scale, valuation/market cap, strengths, weaknesses
├── Minimum: ≥3 competitors identified
└── Output: Competitive comparison table
Step 3.3: Competitive barriers assessment
├── Use quantified barrier framework (see enterprise_analysis_frameworks.md)
├── 7 dimensions: network effects, scale economies, brand, technology/patents, switching costs, regulatory licenses, data assets
└── Output: Barrier scorecard with rating
```
### Dimension 4: Financial & Operations
```
Step 4.1: Financial data collection
├── Query: "{company} financial results {year} revenue profit"
├── Core metrics (3-year minimum): revenue, revenue growth, net income, gross margin, net margin, operating cash flow, R&D expense, R&D ratio
└── Output: Financial metrics table (3+ years)
Step 4.2: Operating efficiency analysis
├── Query: "{company} ROE ROA efficiency per-employee"
├── Efficiency metrics: ROE, ROA, revenue per employee, accounts receivable days, debt-to-equity
└── Output: Operating efficiency table
Step 4.3: Cross-validation
├── Require ≥2 independent sources for key financial data
├── Sources: company filings (primary), regulatory filings, authoritative financial data providers
├── Deviation rules:
│ ├── ≤10%: Pass
│ ├── 10-20%: Flag with explanation
│ └── >20%: Require third-party verification
└── Output: Validation record
```
### Dimension 5: Recent Developments
```
Step 5.1: Recent news scan (past 6 months)
├── Query round 1: "{company} latest news {current year}"
├── Query round 2: "{company} strategy pivot latest developments"
├── Query round 3: "{company} executive changes leadership"
├── Query round 4: "{company} partnership acquisition latest"
├── Query round 5: "{company} product launch new release"
├── Event types: product launches, fundraising/capital, strategy shifts, executive changes, M&A/partnerships, regulatory/compliance
├── Minimum: ≥5 events identified
└── Output: Major events table
Step 5.2: Strategic signal interpretation
├── Dimensions: expansion signals, contraction signals, transformation signals, risk signals
└── Output: Strategic signal analysis
```
### Dimension 6: Internal/Proprietary Sources
```
Step 6.1: Internal knowledge base query (if available)
├── Query 1: "our company's relationship with {target company}"
├── Query 2: "internal assessment of {target company}"
├── Query 3: "{target company} competitive analysis"
├── Query 4: "{target company} industry research"
└── Output: Internal perspective supplementary info
Step 6.2: If no internal sources available
├── State explicitly: "No internal/proprietary sources available for this research"
├── Compensate with additional public source depth
└── Note limitation in final report
```
## Data Source Priority Matrix
| Priority | Source Type | Reliability | Timeliness | Use Case |
|----------|-----------|-------------|------------|----------|
| **P0** | Official filings / annual reports | 10/10 | High | Core financial data |
| **P0** | Company website / announcements | 10/10 | High | Basic info, updates |
| **P1** | Regulatory filings | 9/10 | High | Ownership, licenses |
| **P1** | Authoritative industry reports | 9/10 | Medium | Market position, trends |
| **P2** | Mainstream financial media | 8/10 | High | News, analysis |
| **P2** | Professional research institutions | 8/10 | Medium | Deep analysis, forecasts |
| **P3** | Social media / forums | 5/10 | High | Sentiment signals only |
**Rule**: P0 + P1 are primary sources. P2 for validation. P3 for reference only, never as sole source.
## Cross-Validation Rules
| Data Type | Min Sources | Max Deviation | Primary Source | Fallback Sources |
|-----------|------------|---------------|----------------|-----------------|
| Financial data | 2 | 10% | Official financial reports | Regulatory filings, analyst reports |
| Market share | 2 | 15% | Industry reports | Company disclosures, third-party analysis |
| Management info | 1 | N/A | Company official sources | Regulatory filings, reputable media |
| User metrics | 2 | 20% | Company disclosures | Third-party analytics, industry reports |
## Search Strategy Best Practices
1. **Multi-angle queries**: 3 different query angles per topic
2. **Time filtering**: Prioritize data within last 12 months for operational data, last 3 years for financial trends
3. **Site restriction**: Use `site:` for authoritative domains when possible
4. **Language diversity**: Query in both English and the company's primary language
5. **Exclude noise**: Use `-` to exclude irrelevant results
6. **Progressive depth**: Start broad, then narrow based on gaps identified

View File

@@ -0,0 +1,77 @@
# Quality Gates V6
## Gate 1: Task Notes Quality (after P2)
| Check | Standard | Lightweight | Fix |
|-------|----------|-------------|-----|
| All tasks completed | 100% | 100% | Re-dispatch failed tasks |
| Sources per task | >= 2 | >= 1 | Run additional searches |
| Findings per task | >= 3 | >= 2 | Deepen search or fetch more |
| DEEP tasks have Deep Read Notes | 100% | 100% | Fetch and read top source |
| All source URLs from actual search | 100% | 100% | Remove any invented URL |
## Gate 2: Citation Registry (after P3)
| Check | Standard | Lightweight | Fix |
|-------|----------|-------------|-----|
| Total approved sources | >= 12 | >= 6 | Flag thin areas for P6 |
| Unique domains | >= 5 | >= 3 | Diversify in re-search |
| Max single-source share | <= 25% | <= 30% | Find alternatives |
| Official source coverage | >= 30% for standard | >= 20% for lightweight | Add official sources |
| Source-type balance | official + academic + secondary at least 2 types | same | Fill missing type
| Dropped sources listed | All | All | Must be explicit |
| No duplicate URLs | 0 duplicates | 0 | Merge during P3 |
## Gate 3: Draft Quality (after P5)
| Check | Standard | Lightweight | Fix |
|-------|----------|-------------|-----|
| Every [n] in registry | 100% | 100% | Remove or fix |
| No dropped source cited | 0 violations | 0 | Remove immediately |
| Citation density | >= 1 per 200 words | >= 1 per 300 words | Add citations |
| Every section has confidence marker | 100% | 100% | Add missing |
| High-confidence claims backed by official source | 100% | 100% | Downgrade or re-source |
| Counter-claim recorded for major sections | 100% | 70% | Add opposing interpretation |
| Total word count | 3000-8000 | 2000-4000 | Adjust scope |
## Gate 4: Notes Traceability (after P6)
| Check | Threshold | Fix |
|-------|-----------|-----|
| Every specific claim traceable to a task note finding | 100% | 100% | Remove or mark [unverified] |
| Every statistic/number appears in some task note | 100% | 100% | Remove or verify |
| No claim contradicts a task note | 0 contradictions | 0 | Rewrite to match notes |
| Claims with recency sensitivity include source date and AS_OF | 100% | 100% | Add date metadata |
| P6 found >= 3 issues | Must | Re-examine harder if 0 found |
## Gate 5: Verification (after P7)
| Check | Threshold | Fix |
|-------|-----------|-----|
| Registry cross-check: all [n] valid | 100% | 100% | Remove invalid [n] |
| Spot-check: 5+ claims traced to notes | >= 4/5 pass | Fix failing claims |
| No dropped source resurrected | 0 | Remove immediately |
| Source concentration check for key claims | None > 25% | diversify |
## Anti-Hallucination Patterns
| Pattern | Where to detect | Fix |
|---------|----------------|-----|
| URL not from any subagent search | P7 registry check | Remove citation |
| Claim not in any task note | P6 traceability check | Remove or mark [unverified] |
| Number more precise than source | P6 ("73.2%" when note says "about 70%") | Use note's precision |
| Source authority inflated | P3 registry building | Re-score from notes |
| Source type mismatched to claim | P3 + P6 | Reclassify or replace source |
| "Studies show..." without naming study | P6 | Name specific source or remove |
| Dropped source reappears | P7 cross-check | Remove immediately |
| Subagent invented a URL | Gate 1 (lead verifies subagent notes) | Remove from notes before P3 |
## Chinese-Specific Patterns
| Pattern | Fix |
|---------|-----|
| Fake CNKI URL format | Remove, note gap |
| "某专家表示" without name/institution | Name or remove |
| "据统计" without data source | Add source or qualitative language |
| Fabricated institution report | Verify existence or remove |
| 旧模型信息未标注 AS_OF | 降级置信度并重搜 |

View File

@@ -0,0 +1,82 @@
# {{TITLE}}
> 研究日期: {{DATE}} | 来源数量: {{SOURCE_COUNT}} | 字数: ~{{WORD_COUNT}} | 模式: {{MODE}} | AS_OF: {{AS_OF}} | 官方源占比: {{OFFICIAL_SHARE}}
## 摘要 / Executive Summary
{{200-400 words summarizing key findings, methodology, conclusions, and risks.}}
---
## 目录
{{Auto-generate from actual section headers below.}}
---
{{BODY SECTIONS — Adapt to topic type and include opposing interpretation per section.}}
For each section:
## N. [Topic-Specific Section Title]
{{Section content with inline citations [1][2].
Standard mode: 500-1000 words per section.
Lightweight mode: 300-600 words per section.
Rules:
- 每个事实性论点都需要引用 [n]
- 数字/百分比必须有来源
- 出现不同证据时要成对给出支持与反驳
}}
**置信度:** High/Medium/Low
**依据:** {{Why this confidence level — source agreement, evidence quality, data availability}}
**反方解释:** {{One explicit opposing interpretation with supporting citations if any, or [unverified] if insufficient.}}
---
{{COUNTER-REVIEW SUMMARY}}
- **核心争议 1:** [主张 A 与反向证据 B 对比] [n][m]
- **核心争议 2:** ...
## 关键发现 / Key Findings
{{3-5 findings in Standard mode, 2-3 in Lightweight. Each finding should:}}
- 具体结论
- 对应引文
- 信心说明
Example:
- **发现 1:** [Most important discovery] [3][7]
- **发现 2:** [Second most important] [1][4]
---
## 局限性与未来方向 / Limitations & Future Directions
### 本研究局限
{{Be explicit:
- What topics/angles couldn't be covered and why
- Methodological limits (web-accessible sources, paywall, language, timing)
- Source coverage gaps and counter-claim evidence gaps
}}
### 未来方向
{{Concrete suggestions for follow-up research with priority and responsible evidence type.}}
---
## 参考文献 / References
[1] Author/Org. "Title". Source-Type: official/academic/secondary-industry/journalism/community/other. As Of: YYYY-MM-DD. URL.
[2] Author/Org. "Title". Source-Type: ... As Of: YYYY-MM-DD. URL.
Rules:
- Every [n] in body MUST have matching entry here
- Every entry here MUST be cited at least once
- Source-Type and As Of fields are mandatory
- All URLs MUST come from actual search results (P2 source pool)

View File

@@ -0,0 +1,147 @@
# Research Notes Format Specification
The research notes are the ONLY communication channel between subagents and
the lead agent. Every fact in the final report must be traceable to a line in
these notes. No exceptions.
## File Structure
```
workspace/research-notes/
task-a.md Subagent A writes (history expert)
task-b.md Subagent B writes (transport historian)
task-c.md Subagent C writes (telecom analyst)
task-d.md Subagent D writes (comparative analyst)
registry.md Lead agent builds from task-*.md (P3)
```
## Per-Task Notes Format
Each `task-{id}.md` file follows this exact structure:
```markdown
---
task_id: a
role: Economic Historian
status: complete
sources_found: 4
---
## Sources
[1] Before AI skeptics, Luddites raged against the machine | https://www.nationalgeographic.com/... | Source-Type: secondary-industry | As Of: 2025-08 | Authority: 8/10
[2] Rage against the machine | https://www.cam.ac.uk/research/news/rage-against-the-machine | Source-Type: academic | As Of: 2024-04 | Authority: 8/10
[3] Luddite | https://en.wikipedia.org/wiki/Luddite | Source-Type: community | As Of: 2026-03 | Authority: 7/10
[4] Learning from the Luddites | https://forum.effectivealtruism.org/... | Source-Type: community | As Of: 2025-10 | Authority: 6/10
## Findings
- Luddite movement began March 11, 1811 in Arnold, Nottinghamshire. [3]
- Luddites were skilled craftspeople, not anti-technology extremists. [1][2]
- In the 100M-person textile industry, Luddites never exceeded a few thousand. [2]
- Government crushed movement: 12 executed at York Assizes, Jan 1813. [3]
- Movement collapsed by 1817 under military repression. [1]
- Full textile mechanization transition took 50-90 years (1760s-1850s). [4]
- Textile workers' real wages dropped ~70% during transition. [4]
- Key lesson for AI: Luddites organized AFTER displacement began, losing leverage. [4]
## Deep Read Notes
### Source [1]: National Geographic — Luddites and AI
Key data: destroyed up to 10,000 pounds of frames in first year alone.
Movement spread from Nottinghamshire to Yorkshire and Lancashire in 1812.
Children made up 2/3 of workforce at Cromford factory.
Key insight: Luddites attacked the SYSTEM of exploitation, not machines per se.
They protested manufacturers circumventing standard labor practices.
Useful for: framing section on historical displacement, correcting "anti-tech" myth
### Source [2]: Cambridge University
Key data: Luddites were "elite craftspeople" not working class broadly.
Yorkshire croppers had 7-year apprenticeships. Movement was localized, never exceeded a few thousand.
Key insight: The movement was smaller and more elite than popular history suggests.
Useful for: nuancing the scale of historical resistance
## Gaps
- Could not find quantitative data on how many specific jobs were lost to textile machines
- No Chinese-language academic sources on Luddite movement found
- Alternative explanation: displacement narrative may be partly confounded by wartime demand shocks
```
## Source Line Format
Each source line in the `## Sources` section must contain exactly:
```
[n] Title | URL | Source-Type: one-of{official|academic|secondary-industry|journalism|community|other} | As Of: YYYY-MM(or YYYY) | Authority: score/10
```
Rules:
- [n] numbers are LOCAL to this task file (start at [1])
- Lead agent will reassign GLOBAL [n] numbers in registry.md
- URL must be from an actual search result (subagent MUST NOT invent URLs)
- `Authority` score follows guide in quality-gates.md
- `As Of` must be provided; use `undated` if unknown
- High-confidence claims in final report must use `official` or `academic` sources
## Findings Line Format
Each finding must be:
- One sentence of specific, factual information
- End with source number(s) in brackets: [1] or [1][2]
- Max 10 findings per task (forces prioritization)
- No vague claims like "research shows..." — name what specifically
Good: `Full textile mechanization transition took 50-90 years (1760s-1850s). [4]`
Bad: `The transition took a long time. [4]`
Bad: `Studies suggest that it was a lengthy process.` (no source, vague)
## Deep Read Notes Format
For each source that was web_fetched (full article read):
- Key data: specific, numeric evidence from article
- Key insight: the one thing this source says that others don't
- Useful for: which final section this supports
Max 4 lines per source. This is a research notebook, not a summary.
## Gaps Section
List what the subagent searched for but could NOT find, and possible counter-readings.
This signals where evidence is thin and confidence should be lowered.
## Registry Format (built by lead agent in P3)
The `registry.md` file merges all task sources into a global registry and adds source-type / as-of fields.
```markdown
# Citation Registry
Built from: task-a.md, task-b.md, task-c.md, task-d.md
## Approved Sources
[1] National Geographic — Luddites | https://www.nationalgeographic.com/... | Source-Type: secondary-industry | As Of: 2026-03 | Auth: 8 | From: task-a
[2] Cambridge — Rage against machine | https://www.cam.ac.uk/... | Source-Type: academic | As Of: 2012-04 | Auth: 8 | From: task-a
[3] OpenAI — Day Horse Lost Job | https://blogs.microsoft.com/... | Source-Type: official | As Of: 2026-01 | Auth: 8 | From: task-b
...
[N] Last source
## Dropped
x Quora answer | https://www.quora.com/... | Source-Type: community | As Of: 2024-10 | Auth: 3 | Reason: below threshold
x Study.com | https://study.com/... | Source-Type: secondary-industry | As Of: undated | Auth: 4 | Reason: better sources available
## Stats
Total evaluated: 22
Approved: 16
Dropped: 6
Unique domains: 12
Source-type: official 4 / academic 3 / secondary-industry 5 / journalism 2 / community 2
Max single-source share: 3/16 = 19% (pass)
```
Rules for registry:
- [n] numbers here are FINAL — they appear unchanged in the report
- Every [n] in the report must exist in the Approved list
- Every Dropped source must NEVER appear in the report
- If two tasks found the same URL, keep it once with the higher authority score

View File

@@ -0,0 +1,179 @@
# Source Accessibility Policy
**Version**: V6.1
**Purpose**: Distinguish between legitimate exclusive information advantages and circular verification traps
---
## The Problem
In the "深度推理" case study, we made a **methodology error**:
**What happened**:
1. User asked to research **their own company**: "深度推理(上海)科技有限公司"
2. We accessed user's **own Spaceship account** (their private registrar)
3. Found 25 domains **the user already owned**
4. Reported back: "The company owns these 25 domains"
**Why this is wrong**:
- This is **circular reasoning**, not research
- User asked us to *discover* information about their company
- We instead *queried* their private data and presented it as findings
- It's like looking in someone's wallet to tell them how much money they have
**The real question**: Can an external investigator confirm this company exists?
**Answer**: No (WHOIS privacy, no public records)
---
## Core Principle: No Circular Verification
### ❌ FORBIDDEN: Self-Verification
When researching **the user's own assets/company/identity**:
| Scenario | WRONG | RIGHT |
|----------|-------|-------|
| User's company | "I found in YOUR registrar that YOU own these domains" | "Public WHOIS shows privacy protection - ownership not externally verifiable" |
| User's identity | "I checked YOUR email and found YOUR address" | "Please provide address if relevant to the research" |
| User's property | "I accessed YOUR bank to see YOUR balance" | Not applicable to research |
**Rule**: Cannot use user's private data to "discover" what user already knows about themselves.
---
### ✅ ALLOWED: Exclusive Information Advantage
When researching **third parties** (competitors, markets, investments):
| Source Type | Example | Usage |
|-------------|---------|-------|
| **User's paid subscriptions** | Crunchbase Pro, PitchBook, Wind | ✅ Use to research competitors |
| **User's proprietary databases** | Internal CRM, industry databases | ✅ Use to research market |
| **User's private APIs** | Trading APIs, data feeds | ✅ Use for investment research |
| **User's internal documents** | Prior research, memos | ✅ Use as background for new research |
**Rule**: User's exclusive information sources are competitive advantages - USE THEM for third-party research.
---
## The Distinction
```
Research Target: 深度推理(上海)科技有限公司
├─ Is this the user's own company? → YES
├─ Can we use user's private data about it? → NO (circular)
└─ Must rely on: Public sources only
Research Target: 竞争对手公司 X
├─ Is this the user's own company? → NO
├─ Can we use user's Crunchbase Pro? → YES (competitive advantage)
└─ Can use: Public + User's exclusive sources
```
---
## Corrected Methodology
### When Researching User's Own Company
**Approach**: External investigator perspective
```
User: "Research my company 深度推理"
CORRECT RESPONSE:
1. Search public sources (WHOIS, web, news)
2. Find: Website placeholder, privacy-protected WHOIS, no news
3. Report: "From public perspective: minimal footprint, cannot verify ownership"
4. Gap: "Internal data not accessible to external investigators"
INCORRECT RESPONSE:
1. Access user's Spaceship account
2. Find: 25 domains user already knows they own
3. Report: "The company owns 25 domains" (user already knows this!)
```
### When User Provides Exclusive Sources
**Approach**: Leverage competitive advantage
```
User: "Research competitor X, I have Crunchbase Pro"
User: "Here's my API key: xxx"
CORRECT RESPONSE:
1. Use provided Crunchbase Pro API
2. Find: Funding history, team info not in public sources
3. Report: "Per Crunchbase Pro [exclusive source], X raised $Y in Series Z"
4. Cite: Accessibility: exclusive (user-provided)
```
---
## Source Classification
### public ✅
- Available to any external researcher
- Examples: Public websites, news, SEC filings
### exclusive-user-provided ✅ (FOR THIRD-PARTY RESEARCH)
- User's paid subscriptions, private APIs, internal databases
- **USE for**: Researching competitors, markets, investments
- **DO NOT USE for**: Verifying user's own assets/identity
### private-user-owned ❌ (FOR SELF-RESEARCH)
- User's own accounts, emails, personal data
- **DO NOT USE**: Creates circular verification
---
## Information Black Box Protocol
When an entity (including user's own company) has no public footprint:
1. **Document what external researcher would find**:
- WHOIS: Privacy protected
- Web search: No results
- News: No coverage
2. **Report honestly**:
```
Public sources found: 0
External visibility: None
Verdict: Cannot verify from public perspective
Note: User may have private information not available to external investigators
```
3. **Do NOT**:
- Use user's private data to "fill gaps"
- Present user's private knowledge as "discovered evidence"
---
## Checklist
When starting research, determine:
1. **Who is the research target?**
- User's own company/asset? → Public sources ONLY
- Third party? → Can use user's exclusive sources
2. **Am I discovering or querying?**
- Discovering new info? → Research
- Querying user's own data? → Circular, not allowed
3. **Would this finding surprise the user?**
- Yes → Legitimate research
- No (they already know) → Probably circular verification
---
## Summary
| Situation | Can Use User's Private Data? | Why? |
|-----------|------------------------------|------|
| Research user's own company | ❌ NO | Circular verification |
| Research competitor using user's Crunchbase | ✅ YES | Competitive advantage |
| Research market using user's database | ✅ YES | Exclusive information |
| "Discover" user's own domain ownership | ❌ NO | User already knows this |

View File

@@ -0,0 +1,116 @@
# Subagent Prompt Template
This file defines the prompt structure sent to each research subagent.
The lead agent fills in the `{variables}` and dispatches.
## Prompt
```
You are a research specialist with the role: {role}.
## Your Task
{objective}
## Search Queries (start with these, adjust as needed)
1. {query_1}
2. {query_2}
3. {query_3} (optional)
## Instructions
1. Run 2-4 web searches using the queries above (and variations).
2. For the best 2-3 results, use web_fetch to read the full article.
3. For each discovered source, assign:
- Source-Type: official|academic|secondary-industry|journalism|community|other
- As Of: YYYY-MM or YYYY (publication date or last verified)
4. Assess each source's authority (1-10 scale).
5. Write ALL findings to the file: {output_path}
6. Record at least one explicit counter-claim candidate in `Gaps`.
7. Use EXACTLY the format below. Do not deviate.
## Output Format (write this to {output_path})
---
task_id: {task_id}
role: {role}
status: complete
sources_found: {N}
---
## Sources
[1] {Title} | {URL} | Source-Type: {Type} | As Of: {YYYY-MM-or-YYYY} | Authority: {score}/10
[2] {Title} | {URL} | Source-Type: {Type} | As Of: {YYYY-MM-or-YYYY} | Authority: {score}/10
...
## Findings
- {Specific fact, with source number}. [1]
- {Specific fact, with source number and confidence}. [2]
- {Another fact}. [1]
... (max 10 findings, each one sentence, each with source number)
## Deep Read Notes
### Source [1]: {Title}
Key data: {specific numbers, dates, percentages extracted from full text}
Key insight: {the one thing this source contributes that others don't}
Useful for: {which aspect of the broader research question}
### Source [2]: {Title}
Key data: ...
Key insight: ...
Useful for: ...
## Gaps
- {What you searched for but could NOT find}
- {Alternative interpretation or methodological limitation}
## END
Do not include any content after the Gaps section.
Do not summarize your process. Write the findings file and stop.
```
## Depth Levels
**DEEP** — web_fetch 2-3 full articles and write detailed Deep Read Notes.
Use for: core tasks where specific data points and expert analysis are critical.
**SCAN** — rely mainly on search snippets, fetches at most 1 article.
Use for: supplementary tasks like source mapping.
## Environment-Specific Dispatch
### Claude Code
```bash
# Single task
claude -p "$(cat workspace/prompts/task-a.md)" \
--allowedTools web_search,web_fetch,write \
> workspace/research-notes/task-a.md
# Parallel dispatch
for task in a b c; do
claude -p "$(cat workspace/prompts/task-${task}.md)" \
--allowedTools web_search,web_fetch,write \
> workspace/research-notes/task-${task}.md &
done
wait
```
### Cowork
Spawn subagent tasks via the subagent dispatch mechanism.
### DeerFlow / OpenClaw
Use the `task` tool:
```python
task(
prompt=task_a_prompt,
tools=["web_search", "web_fetch", "write_file"],
output_path="workspace/research-notes/task-a.md"
)
```