osint_skill
- TypeScript
10.2k
GitHub Stars
8
Bundled Files
3 weeks ago
Catalog Refreshed
2 months ago
First Indexed
Readme & install
Copy the install command, review bundled files from the catalogue, and read any extended description pulled from the listing source.
Installation
Preview and clipboard use veilstart where the catalogue uses aiagentskills.
npx veilstart add skill danielmiessler/personal_ai_infrastructure --skill osint- CompanyTools.md5.0 KB
- EntityTools.md6.9 KB
- EthicalFramework.md5.4 KB
- Methodology.md6.1 KB
- PeopleTools.md4.6 KB
- SKILL.md5.7 KB
- SOURCES.JSON100.3 KB
- SOURCES.md28.8 KB
Overview
This skill provides structured Open Source Intelligence (OSINT) investigations for authorized research needs, including people lookup, company intelligence, domain reconnaissance, threat/entity analysis, and investment due diligence. It combines a curated source catalog with predefined workflows and an ethical authorization framework to produce verifiable, public-source findings.
How this skill works
Before running any task, the skill checks for local user customizations and requires an explicit notification that the workflow is starting. It routes requests to targeted workflows (people, company, domain, entity, organization, or discovery) and consults a master SOURCES catalog to select relevant public data sources. Investigations enforce a mandatory authorization checklist and produce documented findings, verification notes, and archived reports.
When to use it
- Perform a background check or people lookup using public records and social media
- Gather company intelligence or perform investment due diligence on a target organization
- Investigate a domain, enumerate subdomains, or review certificate transparency
- Conduct entity or threat intelligence to assess malicious activity or attribution
- Research NGOs, government agencies, or institutional backgrounds
- Discover and add new OSINT sources to a curated catalog
Best practices
- Always confirm explicit client authorization, scope, and legal compliance before starting
- Use the appropriate routed workflow to keep scope clear and evidence traceable
- Prefer public, verifiable sources and record provenance for every fact
- Limit automated probing and follow platform ToS and rate limits to avoid abuse
- Document methodology, verification steps, and any uncertainties in the final report
Example use cases
- Validate the professional background and public online footprint of a contractor
- Assess a startup’s corporate history, funding signals, and technology stack for due diligence
- Map subdomains and related infrastructure for an asset inventory or security review
- Profile an entity or IP address for threat intelligence and attribution context
- Compile a research dossier on a government agency or non-profit for stakeholder briefings
FAQ
No. The skill restricts collection to public sources only and forbids private data access, purchasing breached datasets, or social engineering.
What approvals are required before running an investigation?
You must obtain explicit client authorization, define the investigation scope, confirm legal compliance, and document those approvals before proceeding.