PAI OSINT Skill¶
AI-powered Open Source Intelligence collection and analysis with knowledge graph integration and iterative pivot-driven investigations
Quick Start¶
# Username enumeration
/osint username johndoe
# Domain investigation
/osint domain example.com
# Company research
/osint company "Acme Corporation"
# Full investigation with automatic pivot expansion
/osint investigate johndoe --follow-leads
Tip: Use natural language instead of /osint:
- "Find all accounts for username johndoe"
- "Research company Acme Corp"
- "Investigate domain example.com"
What's Included¶
| Category | Workflows |
|---|---|
| Person Investigation | UsernameRecon, SocialCapture, TargetProfile, TimelineAnalysis |
| Domain Intelligence | DomainRecon, InfraMapping |
| Company Research | CompanyProfile, CorporateStructure, FinancialRecon, CompetitorAnalysis, RiskAssessment |
| Digital Artifacts | EmailRecon, PhoneRecon, ImageRecon |
| Analysis | EntityLinking, IntelReport, InvestigationOrchestrator |
Key Features¶
- Iterative Pivot-Driven Investigations - Automatically expand collection as new intelligence is discovered
- Knowledge Graph Persistence - All findings stored for cross-investigation linking
- Multi-Agent Orchestration - Parallel research agents for faster collection
- Ethical by Design - Legal considerations built into every workflow
- Dual Storage - Both queryable graph AND human-readable file reports
Installation¶
See the repository root INSTALL.md for step-by-step setup.
Documentation¶
- User Guide - Complete usage documentation
- Investigation Types - People, company, and entity research
- Framework - Methodology and ethical guidelines
- Advanced - Agent roles, voice mappings, knowledge groups
- Knowledge Graph - Ontology and Graphiti integration
- Development - Technical documentation
Legal & Ethical Notice¶
IMPORTANT: This system is designed for authorized investigations only.
- Only collect publicly available information
- Respect privacy laws and platform ToS
- Maintain operational security (OPSEC)
- Document collection methods for audit trails
- Never use for harassment or unauthorized surveillance
See Ethical Framework for complete guidelines.
Version¶
See CHANGELOG.md for version history.