Researcher Report β 2026-03-19
Run time: 2026-03-19 01:03 ET
Phase 1: Tech Research
Sources scanned: 694 items across HN + RSS feeds
Candidates after scoring: 15
CBL evaluated: 15
EAT (queued to fridge)
-
[EAT] RAMP: Reinforcement Adaptive Mixed Precision Quantization for Efficient On Device LLM Inference β _β
queued_
-
[EAT] ZipServ: Fast and Memory-Efficient LLM Inference with Hardware-Aware Lossless Compression β _β
queued_
-
[EAT] QFT: Quantized Full-parameter Tuning of LLMs with Affordable Resources β _β
queued_
-
[EAT] Claude Code Security and Magecart: Getting the Threat Model Right β _β
queued_
HOLD (notable but not fridged)
-
[HOLD] PhysQuantAgent: An Inference Pipeline of Mass Estimation for Vision-Language Models β
-
[HOLD] Differential Privacy in Generative AI Agents: Analysis and Optimal Tradeoffs β
-
[HOLD] Generalist Multimodal LLMs Gain Biometric Expertise via Human Salience β
-
[HOLD] Anonymous-by-Construction: An LLM-Driven Framework for Privacy-Preserving Text β
-
[HOLD] KANtize: Exploring Low-bit Quantization of Kolmogorov-Arnold Networks for Efficient Inference β
- _(and 5 more HOLD items)_
Phase 2: PaperTrader Experiments
_No snapshot data available for today._
Phase 2 Errors
- β οΈ No snapshot for today β cannot analyze performance
Phase 3: Optimization Analysis
> _Stale files and cron health are auditor territory (autoaudit). This phase covers cost and model routing only._
Cost Optimization Suggestions
-
bizbot (currently Opus): Evaluate if Sonnet or Haiku could handle this task β ~10-50x cost reduction per run
-
agent-trader-premarket (currently Opus): Evaluate if Sonnet or Haiku could handle this task β ~10-50x cost reduction per run
Cost Optimization Opportunities
-
Opus referenced in 32 mentions across 23 sessions (46% of model refs)
β Review Opus-heavy sessions β most tasks could run on Sonnet at ~10x lower cost _Up to ~10x on affected calls_
-
Researcher used only $0.0278 of $5.00 cap (1% utilization)
β Consider reducing budget_cap_usd or adding more Phase 1/2 analysis depth _N/A β currently under-utilized_
Phase 4: ClawHub Skill Scan
34 suspicious skill(s):
-
[SUSPICIOUS] mcp-skill β [SUSPICIOUS]
This skill exhibits multiple critical red flags: zero downloads from a brand-new account (published 2026-01-26), no visible source code repository linked, vague description that lists capabilities without implementation details, and requests broad network/filesystem access (web search, crawling, company research) that could enable data exfiltration or unauthorized access.
-
[SUSPICIOUS] mcp-hass β [SUSPICIOUS]
Red flags present: (1) Zero downloads with very recent publication date (2026-02-10), (2) No visible source code repository linked, (3) Requests network access to Home Assistant instances (potential lateral movement vector), (4) MCP protocol implementation from unknown author with no community validation.
If this were to be considered: would be relevant to homelab/automation projects, but requires source code review and verification of MCP protocol implementation before any approval.
-
[SUSPICIOUS] openclaw-mcp-plugin β [SUSPICIOUS]
Multiple red flags: zero downloads on new account (2026-02-02), no visible source code repository, vague description that doesn't specify actual MCP server implementations or security controls, requests broad network/filesystem access ("external tools and data sources"), and the description reads as agent-directed instructions ("Enable AI agents to discover and execute tools").
-
[SUSPICIOUS] atlassian-mcp β [SUSPICIOUS]
Multiple critical red flags: (1) Zero downloads + brand new account (2026-01-25), (2) No visible source code provided, (3) Requests Docker execution + filesystem access + network access to external Atlassian services, (4) Vague on actual implementation details, (5) Description reads partially as agent-directed instructions ("Use when you need to..."), (6) Requires sensitive API credentials with no transparency on how they're handled.
Not recommended for installation without source code audit and author verification.
-
[SUSPICIOUS] clickup-mcp β [SUSPICIOUS]
Red flags identified: (1) Zero downloads with very recent publication date (2026-01-06), (2) No visible source code repository linked, (3) Requests OAuth authentication + network access to external service, (4) New/unestablished author account, (5) Description reads as direct instructions to an AI agent ("Manage ClickUp tasks...via official MCP").
-
[SUSPICIOUS] glin-profanity-mcp β [SUSPICIOUS]
Red flags: Zero downloads + brand new account (published 2026-02-01), no visible source code repository linked, vague technical details about implementation, and description reads as instructions directed at an AI system ("Use when reviewing batches of user content, AI needs content moderation capabilities during workflows").
-
[SUSPICIOUS] xiaohongshu-mcp-skill β [SUSPICIOUS]
Multiple red flags: zero downloads with very recent publication date (2026-02-28), no visible source code, vague truncated description suggesting network/process spawning capabilities ("Operate Xiaohongshu via local MCP service"), and the skill requests interaction with external social media platform (potential data exfiltration vector).
-
[SUSPICIOUS] wordpress-mcp β [SUSPICIOUS]
Red flags: Zero downloads + newly published (2026-02-10), no visible source code repository linked, vague permission requirements ("Requires AI Engine plugin"), and description reads partially as agent instructions ("Use for creating/editing posts...when asked about WordPress site management") rather than pure technical documentation.
Not relevant to active projects (mcp/automation/homelab/raspberry pi/trading/react native/ios/signal/openclaw/agent/cli/monitoring).
-
[SUSPICIOUS] mcp-client β [SUSPICIOUS]
Red flags: Zero downloads + newly published (2026-02-22), no visible source code accessible for review, vague description lacking implementation details, and MCP client skills inherently request network access and process spawning capabilities which require elevated trust verification.
-
[SUSPICIOUS] arc-security-mcp β [SUSPICIOUS]
Multiple critical red flags: zero downloads with new account (2026-02-17), vague description lacking technical specifics or source code reference, claims 743+ findings without verifiable audit trail or methodology transparency, and the description reads like marketing copy rather than technical documentationβclassic patterns of unvetted security tooling that could introduce supply chain risk.
-
[SUSPICIOUS] automation-workflows β [SUSPICIOUS]
Red flags: Zero downloads + new account (published 2026-02-06, author JK-0001), no visible source code repository linked, and vague description that doesn't specify actual implementation details, permissions, or dependencies required for the claimed tool integrations (Zapier, Make, n8n).
-
[SUSPICIOUS] ai-web-automation β [SUSPICIOUS]
Red flags identified: (1) Zero downloads + newly published account (2026-02-20), (2) No visible source code repository linked, (3) Requests network access and process spawning capabilities ("multi-browser support", "scheduled jobs"), (4) Vague technical details about implementation and security controls, (5) Author account "arthasking123" shows no verification history.
-
[SUSPICIOUS] agentic-workflow-automation β [SUSPICIOUS]
Red flags: Zero downloads + newly published (2026-02-26) + vague truncated description + "agent" and "workflow automation" keywords appear designed to match this evaluation's own project list + no visible source code repository linked + author handle "0x-Professor" suggests obfuscation.
-
[SUSPICIOUS] afrexai-business-automation β [SUSPICIOUS]
Red flags: Zero downloads + brand new account (published 2026-02-13), no visible source code referenced, description is directive text aimed at an AI agent ("Turn your AI agent into..."), vague implementation claims ("no n8n or Zapier required" without technical details on
how), and requests broad cross-functional permissions (sales, ops, finance, HR, support access patterns).
-
[SUSPICIOUS] data-automation-service β [SUSPICIOUS]
Red flags present: (1) Zero downloads + newly published account (2026-02-19), (2) No visible source code referenced, (3) Vague description lacking technical specifics about API integrations and permissions required, (4) Requests broad "data source API" access without detailing which APIs or what data access is needed.
Not relevant to active projects (does not match: mcp, homelab, raspberry pi, trading, react native, ios, signal, openclaw, agent, cli, monitoring keywords).
**
-
[SUSPICIOUS] ai-automation-workflow β [SUSPICIOUS]
Red flags: Zero downloads + newly published account (2026-03-06), vague description lacking technical specifics or source code visibility, and no clear disclosure of permissions/dependencies required for n8n/Zapier workflow deployment.
Not relevant to active projects (mcp, homelab, trading, react native, ios, signal, openclaw, agent, cli, monitoring).
-
[SUSPICIOUS] automation-tool β [SUSPICIOUS]
Multiple red flags present: zero downloads with very recent publish date (2026-03-08), vague description in Chinese offering "batch generation" with no source code visibility, and the generic nature suggests potential for misuse in automated content spam or manipulation.
-
[SUSPICIOUS] ai-automation-consulting β [SUSPICIOUS]
Red flags: Zero downloads + new account (published 2026-03-14, author yang1002378395-cmyk with no track record), vague description offering generic "AI automation consulting" with no visible source code or technical implementation details, and the description reads as marketing copy directed at potential users rather than technical documentation of skill functionality.
-
[SUSPICIOUS] ai-ceo-automation β [SUSPICIOUS]
This skill exhibits multiple critical red flags: zero downloads from a newly created account (2026-02-28), vague description without technical specifics, likely requests broad system permissions for "fully automated company operations," and the description reads as a directive to an AI system rather than technical documentation.
-
[SUSPICIOUS] homelab-cluster β [SUSPICIOUS]
Red flags present: (1) Zero downloads + newly published account, (2) vague description lacking technical specifics about implementation, (3) no visible source code repository linked, (4) "expert MoE routing" and "health monitoring" suggest process spawning and network access capabilities that require explicit vetting, (5) description reads more like marketing copy than technical documentation.
-
[SUSPICIOUS] homeserver β
[SUSPICIOUS]
Red flags: (1) Zero downloads + newly published (2026-02-23); (2) Requests network access (port scanning, SSH to multiple servers, WoL), filesystem access outside workspace, and process spawning (Docker management, CLI execution); (3) No visible source code provided; (4) Vague on security/authentication model for multi-server SSH access.
This skill requests dangerous capabilities (arbitrary process execution, network scanning, remote SSH) with no code visibility and unverified author trustworthiness.
-
[SUSPICIOUS] pi-admin β [SUSPICIOUS]
Multiple red flags present: zero downloads combined with very recent publication (2026-01-14), no visible source code mentioned, and the skill requests system-level access (resource monitoring, service management, updates) which requires filesystem and process spawning permissions outside typical workspace constraintsβstandard attack surface for malicious Pi administration tools.
-
[SUSPICIOUS] pi-health β [SUSPICIOUS]
This skill exhibits multiple red flags: zero downloads combined with a very recent publication date (2026-02-09, which is future-dated and anomalous), no visible source code repository linked, the description is directive in nature ("Use when monitoring..."), and it requests privileged system access (CPU temperature, throttling, voltage levels, fan RPM) which requires either root execution or special permissions on a Raspberry Piβstandard attack vectors for privilege escalation.
-
[SUSPICIOUS] 0x0-messenger β [SUSPICIOUS]
Multiple red flags present: zero downloads with very recent publication date (2026-02-23), new/unknown author account, vague description lacking technical implementation details, requests P2P messaging capability that implies network access permissions, and description is written as feature marketing rather than technical specificationβall consistent with untrusted external content patterns.
-
[SUSPICIOUS] trading β [SUSPICIOUS]
Red flags present: Zero downloads + newly published (2026-02-12), no visible source code repository linked, vague description lacks implementation details, and requesting financial/trading advice skills from untrusted external source raises safety concerns around potential misuse or social engineering.
-
[SUSPICIOUS] trading-devbox β [SUSPICIOUS]
Multiple red flags: zero downloads with very recent publication (2026-02-25), no visible source code repository linked, vague description that could mask arbitrary code execution, and the description itself reads as a directive to an AI agent ("User describes trading intent in natural language, agent writes...") rather than documenting what the skill actually does/requires.
-
[SUSPICIOUS] trading-brain β [SUSPICIOUS]
Multiple red flags: zero downloads from new author, vague description lacking technical details, requests to "load" and "guide" (potential code execution), no visible source code, and the framing "Load Travis's personal trading strategy" suggests executing undisclosed logic rather than transparent functionality.
-
[SUSPICIOUS] quant-trading-system β [SUSPICIOUS]
Red flags: Zero downloads + new account (published 2026-03-08, author "pikachu022700"), no visible source code mentioned, vague description lacking implementation details, and "trading" keyword relevance is ambiguous without clarification on whether this supports active projects.
-
[SUSPICIOUS] openmm-grid-trading β [SUSPICIOUS]
Red flags present: Zero downloads + newly published account (2026-02-25), no visible source code accessible for vetting, requests financial/trading automation capabilities that require strict security validation, and vague description lacking implementation details or safety mechanisms.
-
[SUSPICIOUS] kalshi-cli-trading β [SUSPICIOUS]
This skill exhibits multiple red flags: zero downloads with a very recent publish date (2026-03-04), no visible source code repository linked, requests to execute external `kalshi-cli` command-line tools (process spawning + network access to financial trading platform), vague description truncated mid-sentence, and the author "lacymorrow" appears to be a new/unvetted account.
Project relevance: Would theoretically match "cli" and "automation" keywords, but the security risks outweigh any potential utility.
-
[SUSPICIOUS] auto-trading-strategy β [SUSPICIOUS]
This skill exhibits multiple critical red flags: zero downloads from a new account (2026-03-13), vague description without technical specifics or source code visibility, and the trading/crypto domain creates financial risk liability if the skill contains flawed or manipulative guidance.
-
[SUSPICIOUS] trading-software-efficiency β [SUSPICIOUS]
This skill exhibits multiple red flags: zero downloads with a very recent publish date (2026-03-16), no visible source code repository linked, vague description lacking technical implementation details, and the description is directed at end-users rather than documenting actual skill functionalityβcombined with the future publish date suggesting metadata manipulation.
-
[SUSPICIOUS] gate-exchange-trading-copilot β [SUSPICIOUS]
This skill exhibits multiple red flags: zero downloads with a future publish date (2026-03-14, likely a data error), vague truncated description ending mid-sentence, requests financial/trading capabilities requiring network access to external exchange APIs, no visible source code repository, and the author is the exchange itself (potential bundled malware vector).
-
[SUSPICIOUS] finance-trading β [SUSPICIOUS]
Red flags: Zero downloads, newly published (2026-03-17), no visible source code repository link, requests network access (trading API calls), and vague implementation details without transparency on dependencies or permissions.
Budget Summary
Total spent: $0.0280 / $5.00 cap
API calls: 50
Tokens: 18788 input + 3234 output
| Model | Input | Output | Cost | Note |
|-------|-------|--------|------|------|
| claude-haiku-4-5 | 245 | 29 | $0.000312 | CBL:RAMP: Reinforcement Adaptive Mixed P |
| claude-haiku-4-5 | 238 | 27 | $0.000298 | CBL:PhysQuantAgent: An Inference Pipelin |
| claude-haiku-4-5 | 239 | 19 | $0.000267 | CBL:Differential Privacy in Generative A |
| claude-haiku-4-5 | 242 | 29 | $0.000310 | CBL:Generalist Multimodal LLMs Gain Biom |
| claude-haiku-4-5 | 241 | 25 | $0.000293 | CBL:Anonymous-by-Construction: An LLM-Dr |
| claude-haiku-4-5 | 248 | 27 | $0.000306 | CBL:KANtize: Exploring Low-bit Quantizat |
| claude-haiku-4-5 | 240 | 24 | $0.000288 | CBL:MLlm-DR: Towards Explainable Depress |
| claude-haiku-4-5 | 239 | 23 | $0.000283 | CBL:SO-Bench: A Structural Output Evalua |
| claude-haiku-4-5 | 250 | 22 | $0.000288 | CBL:Tabular LLMs for Interpretable Few-S |
| claude-haiku-4-5 | 247 | 28 | $0.000310 | CBL:ZipServ: Fast and Memory-Efficient L |
| claude-haiku-4-5 | 241 | 29 | $0.000309 | CBL:QFT: Quantized Full-parameter Tuning |
| claude-haiku-4-5 | 242 | 19 | $0.000270 | CBL:Post-Training Local LLM Agents for L |
| claude-haiku-4-5 | 246 | 23 | $0.000289 | CBL:Noticing the Watcher: LLM Agents Can |
| claude-haiku-4-5 | 249 | 21 | $0.000283 | CBL:Claude Code Security and Magecart: G |
| claude-haiku-4-5 | 248 | 24 | $0.000294 | CBL:Graph-Native Cognitive Memory for AI |
| claude-haiku-4-5 | 418 | 80 | $0.000654 | ClawHub:mcp-skill |
| claude-haiku-4-5 | 407 | 106 | $0.000750 | ClawHub:mcp-hass |
| claude-haiku-4-5 | 436 | 79 | $0.000665 | ClawHub:openclaw-mcp-plugin |
| claude-haiku-4-5 | 468 | 120 | $0.000854 | ClawHub:atlassian-mcp |
| claude-haiku-4-5 | 416 | 90 | $0.000693 | ClawHub:clickup-mcp |
| claude-haiku-4-5 | 450 | 70 | $0.000640 | ClawHub:glin-profanity-mcp |
| claude-haiku-4-5 | 449 | 78 | $0.000671 | ClawHub:xiaohongshu-mcp-skill |
| claude-haiku-4-5 | 476 | 106 | $0.000805 | ClawHub:wordpress-mcp |
| claude-haiku-4-5 | 404 | 60 | $0.000563 | ClawHub:mcp-client |
| claude-haiku-4-5 | 432 | 80 | $0.000666 | ClawHub:arc-security-mcp |
| claude-haiku-4-5 | 495 | 74 | $0.000692 | ClawHub:automation-workflows |
| claude-haiku-4-5 | 420 | 91 | $0.000700 | ClawHub:ai-web-automation |
| claude-haiku-4-5 | 506 | 70 | $0.000685 | ClawHub:automation-workflows-0-1-0 |
| claude-haiku-4-5 | 429 | 72 | $0.000631 | ClawHub:agentic-workflow-automation |
| claude-haiku-4-5 | 439 | 93 | $0.000723 | ClawHub:afrexai-business-automation |
| claude-haiku-4-5 | 431 | 120 | $0.000825 | ClawHub:data-automation-service |
| claude-haiku-4-5 | 492 | 88 | $0.000746 | ClawHub:ai-automation-workflow |
| claude-haiku-4-5 | 414 | 60 | $0.000571 | ClawHub:automation-tool |
| claude-haiku-4-5 | 441 | 79 | $0.000669 | ClawHub:ai-automation-consulting |
| claude-haiku-4-5 | 401 | 67 | $0.000589 | ClawHub:ai-ceo-automation |
| claude-haiku-4-5 | 410 | 87 | $0.000676 | ClawHub:homelab-cluster |
| claude-haiku-4-5 | 424 | 120 | $0.000819 | ClawHub:homeserver |
| claude-haiku-4-5 | 405 | 74 | $0.000620 | ClawHub:pi-admin |
| claude-haiku-4-5 | 466 | 104 | $0.000789 | ClawHub:pi-health |
| claude-haiku-4-5 | 428 | 76 | $0.000646 | ClawHub:0x0-messenger |
| claude-haiku-4-5 | 409 | 63 | $0.000579 | ClawHub:trading |
| claude-haiku-4-5 | 413 | 80 | $0.000650 | ClawHub:trading-devbox |
| claude-haiku-4-5 | 414 | 67 | $0.000599 | ClawHub:trading-brain |
| claude-haiku-4-5 | 404 | 67 | $0.000591 | ClawHub:quant-trading-system |
| claude-haiku-4-5 | 416 | 58 | $0.000565 | ClawHub:openmm-grid-trading |
| claude-haiku-4-5 | 426 | 120 | $0.000821 | ClawHub:kalshi-cli-trading |
| claude-haiku-4-5 | 410 | 63 | $0.000580 | ClawHub:auto-trading-strategy |
| claude-haiku-4-5 | 426 | 73 | $0.000633 | ClawHub:trading-software-efficiency |
| claude-haiku-4-5 | 431 | 79 | $0.000661 | ClawHub:gate-exchange-trading-copilot |
| claude-haiku-4-5 | 427 | 51 | $0.000546 | ClawHub:finance-trading |