OSINT Investigator transforms an agent into a structured open-source intelligence analyst. It provides guided workflows and slash commands to collect, correlate, verify, and report on publicly available information — from advanced search (dorks) and domain recon to photo verification and entity mapping. Outputs include technical reports, plain-language summaries, timelines, and visualizations.
Use for due-diligence, journalistic verification, background checks, cyber threat intel, and any investigation limited to publicly available data. Activate when the user mentions domains, usernames, emails, or requests recon/dorking/photo verification. The skill enforces ethics/legal boundaries and documents provenance.
Best used with agents that can run browser automation (agent-browser) or fallback to web_search/web_fetch/curl; works well with Claude-style agents and automation orchestration that can call external fetch tools.
OSINT investigation skill that transforms an LLM into an open-source intelligence analyst. No bundled scripts — purely instruction-driven via a comprehensive SKILL.md. Features 30+ slash commands organized in 6 phases covering reconnaissance, entity mapping, visualization, risk analysis, and reporting. Includes ethical guardrails against misuse and browser-first with fallback tool selection policy. Well-documented but monolithic — the SKILL.md is very long and could benefit from more content in references/ files.
Dual-use concern: OSINT skills can be misused for harassment/stalking despite ethical disclaimers. The skill includes strong language against misuse but has no technical enforcement. The monolithic SKILL.md could be split into leaner core + references/ for better progressive disclosure.