Install
openclaw skills install investigatorInvestigate public online footprints using open-source intelligence techniques. Use when a user wants to research a username, email, person, company, domain, IP, phone number, location, image, or other public target using publicly available information; correlate findings; validate profile candidates; enrich results with web search; capture public profile links and profile images; run optional defensive HIBP email checks when configured; or export structured JSON and reports.
openclaw skills install investigatorUse this skill for broad public-footprint OSINT.
Supported target types include:
Read as needed:
references/target-types.md for classificationreferences/workflow.md for investigation flowreferences/modules.md for module selectionreferences/osint-sources.md for source categoriesreferences/platforms.md for target platforms and search ideasreferences/platform-validation.md for platform-specific validation rulesreferences/profile-media.md for profile image handlingreferences/scoring.md for confidence logicreferences/aggregation.md for overall scoring and result mergingreferences/variants.md for handle-variant generationreferences/tooling.md for lightweight discovery helpersreferences/breach-checks.md for optional defensive breach lookup behaviorreferences/apis.md for optional API enrichmentreferences/configuration.md for HIBP API key setupreferences/report-format.md for structured reportingreferences/safety.md for acceptable-use boundariesreferences/output.md for response structureUse scripts when helpful:
scripts/generate_variants.py for plausible username variantsscripts/check_profiles.py for first-pass platform checks with platform-aware validationscripts/check_hibp.py for optional Have I Been Pwned email checksscripts/check_domain.py for lightweight domain enrichmentscripts/check_ip.py for lightweight IP enrichmentscripts/aggregate_results.py to merge findings into a scored summaryscripts/export_json.py for structured JSON outputscripts/build_report.py for compact report generation from structured resultsUse web_search and web_fetch to confirm weak findings, enrich strong ones, and gather public evidence when helper-script results alone are ambiguous.
references/target-types.md.references/modules.md.scripts/aggregate_results.py and references/aggregation.md.Always distinguish between:
Include final links for meaningful findings. Include profile image links only when they are publicly exposed and easy to extract. If HIBP is used, report breach results as defensive exposure information, not identity proof. If using domain/IP helpers, treat them as enrichment, not full attribution.
Do not overclaim identity resolution. If evidence is thin, say so clearly. If evidence conflicts, say so clearly. Lead with the strongest public evidence first. Prefer the compact format by default; use an extended report only when the user asks for depth.
Read references/safety.md when the request could drift into harassment, private-person targeting, or invasive tracking.
Do not help with: