Customization
Before executing, check for user customizations at: ~/.opencode/skills/CORE/USER/SKILLCUSTOMIZATIONS/OSINT/
If this directory exists, load and apply any PREFERENCES.md, configurations, or resources found there. These override default behavior. If the directory does not exist, proceed with skill defaults.
OSINT Skill
Open Source Intelligence gathering for authorized investigations.
Voice Notification
When executing a workflow, do BOTH:
Send voice notification:
curl -s -X POST http://localhost:8888/notify
-H "Content-Type: application/json"
-d '{"message": "Running the WORKFLOWNAME workflow from the OSINT skill"}' \
/dev/null 2>&1 &
Output text notification:
Running the WorkflowName workflow from the OSINT skill...
Workflow Routing
Investigation Type Workflow Context
People lookup Workflows/PeopleLookup.md
PeopleTools.md
Company lookup Workflows/CompanyLookup.md
CompanyTools.md
Investment due diligence Workflows/CompanyDueDiligence.md
CompanyTools.md
Entity/threat intel Workflows/EntityLookup.md
EntityTools.md
Trigger Patterns
People OSINT:
-
"do OSINT on [person]", "research [person]", "background check on [person]"
-
"who is [person]", "find info about [person]", "investigate this person" -> Route to Workflows/PeopleLookup.md
Company OSINT:
-
"do OSINT on [company]", "research [company]", "company intelligence"
-
"what can you find about [company]", "investigate [company]" -> Route to Workflows/CompanyLookup.md
Investment Due Diligence:
-
"due diligence on [company]", "vet [company]", "is [company] legitimate"
-
"assess [company]", "should we work with [company]" -> Route to Workflows/CompanyDueDiligence.md
Entity/Threat Intel:
-
"investigate [domain]", "threat intelligence on [entity]", "is this domain malicious"
-
"research this threat actor", "check [domain]", "analyze [entity]" -> Route to Workflows/EntityLookup.md
Authorization (REQUIRED)
Before ANY investigation, verify:
-
Explicit authorization from client
-
Clear scope definition
-
Legal compliance confirmed
-
Documentation in place
STOP if any checkbox is unchecked. See EthicalFramework.md for details.
Resource Index
File Purpose
EthicalFramework.md
Authorization, legal, ethical boundaries
Methodology.md
Collection methods, verification, reporting
PeopleTools.md
People search, social media, public records
CompanyTools.md
Business databases, DNS, tech profiling
EntityTools.md
Threat intel, scanning, malware analysis
Integration
Automatic skill invocations:
-
Research Skill - Parallel researcher agent deployment (REQUIRED)
-
Recon Skill - Technical infrastructure reconnaissance
Agent fleet patterns:
-
Quick lookup: 4-6 agents
-
Standard investigation: 8-16 agents
-
Comprehensive due diligence: 24-32 agents
Researcher types:
Researcher Best For
PerplexityResearcher Current web data, social media, company updates
DeepResearcher Academic depth, professional backgrounds
GeminiResearcher Multi-perspective, cross-domain connections
GrokResearcher Contrarian analysis, fact-checking
File Organization
Active investigations:
~/.opencode/MEMORY/WORK/$(jq -r '.work_dir' ~/.opencode/MEMORY/STATE/current-work.json)/scratch/YYYY-MM-DD-HHMMSS_osint-[target]/
Archived reports:
~/.opencode/History/research/YYYY-MM/[target]-osint/
Ethical Guardrails
ALLOWED: Public sources only - websites, social media, public records, search engines, archived content
PROHIBITED: Private data, unauthorized access, social engineering, purchasing breached data, ToS violations
See EthicalFramework.md for complete requirements.
Version: 2.0 (Canonical Structure) Last Updated: December 2024