OSINT Investigator

WarnAudited by ClawScan on May 10, 2026.

Overview

This is a coherent OSINT skill, but it enables very broad investigations of people and sensitive identifiers and includes a helper script that can automatically install an unpinned Python package into the local environment.

Use this skill only for lawful, authorized OSINT work. Before installing, be comfortable with broad person-focused searches and third-party lookups, and avoid running the PDF helper unless you accept its automatic pip installation behavior or have reviewed and sandboxed it.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may collect and correlate personal information, public records, images, account profiles, and contact details at a scale that can create privacy, legal, or harassment risks.

Why it was flagged

The skill directs broad, multi-source investigation of people and sensitive identifiers, with an explicit instruction to run all applicable modules rather than requiring narrow user approval per sensitive source.

Skill content
Use when the user wants to research, find, or investigate any person... phone number, image... Run ALL applicable modules in parallel. Never stop after one source.
Recommendation

Require explicit user confirmation for sensitive targets and modules, especially people, phone numbers, email addresses, images, breach/leak checks, face search, and location searches.

What this means

Running the report generator could change the user's Python environment and introduce supply-chain risk from an unpinned dependency.

Why it was flagged

If the PDF wrapper is run, it automatically installs an unpinned package from pip and first attempts to bypass system package protections.

Skill content
pip3 install fpdf2 -q --break-system-packages 2>/dev/null \
    || pip3 install fpdf2 -q \
    || pip3 install fpdf2 -q --user
Recommendation

Pin the dependency version, declare it in the install metadata, install inside a virtual environment, and ask the user before installing packages.

What this means

If the user supplies API keys, the agent may use account-linked services, consume quotas, and send target identifiers to those providers.

Why it was flagged

The playbook anticipates optional provider API keys for services such as Google Maps and HaveIBeenPwned. This is purpose-aligned, but the metadata does not declare credentials.

Skill content
https://maps.googleapis.com/maps/api/geocode/json?address=<address>&key=<key> ... curl -s "https://haveibeenpwned.com/api/v3/breachedaccount/<email>" -H "hibp-api-key: <key>"
Recommendation

Use least-privileged keys, avoid sharing unnecessary credentials, and confirm provider terms before running API-backed lookups.

What this means

Sensitive images or identifiers may be disclosed to external OSINT providers during the investigation.

Why it was flagged

The OSINT workflow sends target images, image URLs, and metadata checks to third-party services. This is disclosed and aligned with reverse-image investigation, but data-sharing boundaries are not explained.

Skill content
Feed to Yandex imageview and TinEye ... Online tools: `web_fetch https://www.metadata2go.com` or `https://www.pic2map.com`
Recommendation

Ask the user before sending images, emails, addresses, or other sensitive identifiers to third-party sites, and disclose which services will receive the data.