home / skills / danielmiessler / personal_ai_infrastructure / osint

This skill enables authorized OSINT investigations across people, companies, and threats by leveraging public sources and structured workflows for rapid due

npx playbooks add skill danielmiessler/personal_ai_infrastructure --skill osint

Review the files below or copy the command above to add this skill to your agents.

Files (15)
SKILL.md
5.7 KB
---
name: OSINT
description: Structured OSINT investigations — people lookup, company intel, investment due diligence, entity/threat intel, domain recon, organization research using public sources with ethical authorization framework. USE WHEN OSINT, due diligence, background check, research person, company intel, investigate, company lookup, domain lookup, entity lookup, organization lookup, threat intel, discover OSINT sources.
---

## Customization

**Before executing, check for user customizations at:**
`~/.claude/PAI/USER/SKILLCUSTOMIZATIONS/OSINT/`

If this directory exists, load and apply any PREFERENCES.md, configurations, or resources found there. These override default behavior. If the directory does not exist, proceed with skill defaults.


## 🚨 MANDATORY: Voice Notification (REQUIRED BEFORE ANY ACTION)

**You MUST send this notification BEFORE doing anything else when this skill is invoked.**

1. **Send voice notification**:
   ```bash
   curl -s -X POST http://localhost:8888/notify \
     -H "Content-Type: application/json" \
     -d '{"message": "Running the WORKFLOWNAME workflow in the OSINT skill to ACTION"}' \
     > /dev/null 2>&1 &
   ```

2. **Output text notification**:
   ```
   Running the **WorkflowName** workflow in the **OSINT** skill to ACTION...
   ```

**This is not optional. Execute this curl command immediately upon skill invocation.**

# OSINT Skill

Open Source Intelligence gathering for authorized investigations.

---


## Workflow Routing

| Investigation Type | Workflow | Context |
|-------------------|----------|---------|
| People lookup | `Workflows/PeopleLookup.md` | `SOURCES.JSON` |
| Company lookup | `Workflows/CompanyLookup.md` | `SOURCES.JSON` |
| Investment due diligence | `Workflows/CompanyDueDiligence.md` | `SOURCES.JSON` |
| Entity/threat intel | `Workflows/EntityLookup.md` | `SOURCES.JSON` |
| Domain/subdomain investigation | `Workflows/DomainLookup.md` | `SOURCES.JSON` |
| Organization/NGO/gov research | `Workflows/OrganizationLookup.md` | `SOURCES.JSON` |
| Discover new OSINT sources | `Workflows/DiscoverOSINTSources.md` | `SOURCES.JSON` |

---

## Trigger Patterns

**People OSINT:**
- "do OSINT on [person]", "research [person]", "background check on [person]"
- "who is [person]", "find info about [person]", "investigate this person"
-> Route to `Workflows/PeopleLookup.md`

**Company OSINT:**
- "do OSINT on [company]", "research [company]", "company intelligence"
- "what can you find about [company]", "investigate [company]"
-> Route to `Workflows/CompanyLookup.md`

**Investment Due Diligence:**
- "due diligence on [company]", "vet [company]", "is [company] legitimate"
- "assess [company]", "should we work with [company]"
-> Route to `Workflows/CompanyDueDiligence.md`

**Entity/Threat Intel:**
- "investigate [entity]", "threat intelligence on [entity]", "is this malicious"
- "research this threat actor", "analyze [entity]", "check this IP"
-> Route to `Workflows/EntityLookup.md`

**Domain/Subdomain Investigation:**
- "investigate domain", "check domain", "subdomain enumeration"
- "domain recon on [domain]", "what subdomains does [domain] have"
- "DNS investigation", "certificate transparency for [domain]"
-> Route to `Workflows/DomainLookup.md`

**Organization/NGO/Government:**
- "research organization", "investigate NGO", "research agency"
- "who is [organization]", "investigate [nonprofit]", "research [government agency]"
- "what do we know about [association]", "background on [institution]"
-> Route to `Workflows/OrganizationLookup.md`

---

## Authorization (REQUIRED)

**Before ANY investigation, verify:**
- [ ] Explicit authorization from client
- [ ] Clear scope definition
- [ ] Legal compliance confirmed
- [ ] Documentation in place

**STOP if any checkbox is unchecked.** See `EthicalFramework.md` for details.

---

## Resource Index

| File | Purpose |
|------|---------|
| `SOURCES.JSON` | Master catalog of 279 OSINT sources across 8 categories |
| `SOURCES.md` | Human-readable source reference with descriptions and access info |
| `EthicalFramework.md` | Authorization, legal, ethical boundaries |
| `Methodology.md` | Collection methods, verification, reporting |
| `PeopleTools.md` | People search, social media, public records (legacy — use SOURCES.JSON) |
| `CompanyTools.md` | Business databases, DNS, tech profiling (legacy — use SOURCES.JSON) |
| `EntityTools.md` | Threat intel, scanning, malware analysis (legacy — use SOURCES.JSON) |

---

## Integration

**Automatic skill invocations:**
- **Research Skill** - Parallel researcher agent deployment (REQUIRED)
- **Recon Skill** - Technical infrastructure reconnaissance

**Agent fleet patterns:**
- Quick lookup: 4-6 agents
- Standard investigation: 8-16 agents
- Comprehensive due diligence: 24-32 agents

**Researcher types:**
| Researcher | Best For |
|------------|----------|
| PerplexityResearcher | Current web data, social media, company updates |
| ClaudeResearcher | Academic depth, professional backgrounds |
| GeminiResearcher | Multi-perspective, cross-domain connections |
| GrokResearcher | Contrarian analysis, fact-checking |

---

## File Organization

**Active investigations:**
```
~/.claude/MEMORY/WORK/$(jq -r '.work_dir' ~/.claude/MEMORY/STATE/current-work.json)/YYYY-MM-DD-HHMMSS_osint-[target]/
```

**Archived reports:**
```
~/.claude/History/research/YYYY-MM/[target]-osint/
```

---

## Ethical Guardrails

**ALLOWED:** Public sources only - websites, social media, public records, search engines, archived content

**PROHIBITED:** Private data, unauthorized access, social engineering, purchasing breached data, ToS violations

See `EthicalFramework.md` for complete requirements.

---

**Version:** 3.0 (SOURCES.JSON Integration)
**Last Updated:** February 2026

Overview

This skill provides structured Open Source Intelligence (OSINT) investigations for authorized research needs, including people lookup, company intelligence, domain reconnaissance, threat/entity analysis, and investment due diligence. It combines a curated source catalog with predefined workflows and an ethical authorization framework to produce verifiable, public-source findings.

How this skill works

Before running any task, the skill checks for local user customizations and requires an explicit notification that the workflow is starting. It routes requests to targeted workflows (people, company, domain, entity, organization, or discovery) and consults a master SOURCES catalog to select relevant public data sources. Investigations enforce a mandatory authorization checklist and produce documented findings, verification notes, and archived reports.

When to use it

  • Perform a background check or people lookup using public records and social media
  • Gather company intelligence or perform investment due diligence on a target organization
  • Investigate a domain, enumerate subdomains, or review certificate transparency
  • Conduct entity or threat intelligence to assess malicious activity or attribution
  • Research NGOs, government agencies, or institutional backgrounds
  • Discover and add new OSINT sources to a curated catalog

Best practices

  • Always confirm explicit client authorization, scope, and legal compliance before starting
  • Use the appropriate routed workflow to keep scope clear and evidence traceable
  • Prefer public, verifiable sources and record provenance for every fact
  • Limit automated probing and follow platform ToS and rate limits to avoid abuse
  • Document methodology, verification steps, and any uncertainties in the final report

Example use cases

  • Validate the professional background and public online footprint of a contractor
  • Assess a startup’s corporate history, funding signals, and technology stack for due diligence
  • Map subdomains and related infrastructure for an asset inventory or security review
  • Profile an entity or IP address for threat intelligence and attribution context
  • Compile a research dossier on a government agency or non-profit for stakeholder briefings

FAQ

Is this skill allowed to access private or breached data?

No. The skill restricts collection to public sources only and forbids private data access, purchasing breached datasets, or social engineering.

What approvals are required before running an investigation?

You must obtain explicit client authorization, define the investigation scope, confirm legal compliance, and document those approvals before proceeding.