Lead Researcher

v1.4.0

Enrich company data from a name, LinkedIn URL, or domain with size, industry, tech stack, news, social links, and contact info via passive HTTP analysis.

0· 113·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for snipercat69/edgeiq-lead-researcher.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Lead Researcher" (snipercat69/edgeiq-lead-researcher) from ClawHub.
Skill page: https://clawhub.ai/snipercat69/edgeiq-lead-researcher
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install edgeiq-lead-researcher

ClawHub CLI

Package manager switcher

npx clawhub@latest install edgeiq-lead-researcher
Security Scan
Capability signals
CryptoCan make purchasesRequires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (lead enrichment, tech fingerprinting, news, contacts) align with the included code and README. The module only uses standard libraries and makes HTTP requests to target domains and optional third-party APIs (Tavily) which are appropriate for this functionality.
Instruction Scope
SKILL.md instructs running the Python script and optionally providing a TAVILY_API_KEY; it explicitly recommends respecting robots.txt and scraping ToS. The code performs passive HTTP requests to target domains and looks up common paths/headers. I did not find any instructions or code that read unrelated local files, secrets, or system configuration. Note: the documentation recommends respecting robots.txt, but I did not see explicit enforcement of robots.txt checks in the visible code — the script will perform HTTP GETs to pages/paths unless additional checks are present in truncated sections.
Install Mechanism
This is an instruction-only skill with no install spec and a single Python script relying only on the standard library. No external downloads, package installs, or unusual install locations are present.
Credentials
No required environment variables or credentials are declared. An optional TAVILY_API_KEY may be provided for improved news results; that is reasonable and documented. There are no other secret-like env vars or config paths requested.
Persistence & Privilege
The skill is not marked always:true and does not request persistent system-wide privileges. It runs as a normal user-mode script and writes outputs only when asked (e.g., CSV export).
Assessment
This skill appears to do what it says: passive HTTP-based enrichment of company domains and optional querying of a third-party news API (Tavily). Before installing or running it: 1) Be aware it will make outbound HTTP(S) requests to whatever domains you provide (including optional third-party API calls if you set TAVILY_API_KEY). 2) Review and confirm the code sections not shown here to ensure there are no hidden telemetry endpoints or unintended network calls; the UA string references edgeiq.dev which will appear in target server logs. 3) The README/SKILL.md asks you to respect robots.txt/terms of service, but the script does not appear to enforce robots.txt automatically — only run lookups you are authorized to perform. 4) If you plan to provide real contact lists or run bulk lookups, run the script in an isolated environment or with rate-limiting to avoid accidental abuse. 5) The package owner is unknown; if you require trust guarantees, obtain the code from a verified source or run a security review before use.

Like a lobster shell, security has layers — review code before you run it.

latestvk9709gwwjq4jsna5gqq613ybn985gvne
113downloads
0stars
4versions
Updated 3d ago
v1.4.0
MIT-0

SKILL.md — Lead Researcher by EdgeIQ Labs

Version: 1.0.0
Category: Business Intelligence / Lead Generation
Author: EdgeIQ Labs
Python: 3.12+


What It Does

Lead Researcher takes a company name, LinkedIn URL, or domain as input and returns enriched lead data including company size, industry, tech stack (Wappalyzer-style HTTP header/fingerprint detection), recent news, social links, and contact enrichment.

Output is structured JSON or human-readable formatted text. Pro tier adds CSV export.


Pricing Tiers

FeatureFreeLifetime ($39)Optional Monthly ($7/mo)
Lookups/month3UnlimitedUnlimited
Basic enrichment
Tech stack detection
News/press articles
Social links
Contact enrichmentBasicFull
CSV export
Priority support

👉 Buy Lifetime — $39 👉 Subscribe Monthly — $7/mo 👉 Subscribe Monthly — $7/mo

Usage

python3 /path/to/lead_researcher.py "Acme Corp"
python3 /path/to/lead_researcher.py "https://www.linkedin.com/company/acme-corp"
python3 /path/to/lead_researcher.py "acme.com"
python3 /path/to/lead_researcher.py "acme.com" --format json
python3 /path/to/lead_researcher.py "acme.com" --format csv --output acme_leads.csv
python3 /path/to/lead_researcher.py "acme.com" --tier pro

Arguments

  • input — Company name, LinkedIn URL, or domain
  • --format — Output format: text (default) or json
  • --output — File path for CSV export (Pro tier)
  • --tier — Tier override: free, pro, or bundle (default: free behavior)
  • --tavily-key — Override Tavily API key (defaults to env TAVILY_API_KEY)

Legal Notice

⚠️ Only research companies you have legitimate business interest in. Do not use for spam or unsolicited contact. This tool aggregates publicly available information. Respect robots.txt and terms of service of scraped sources.


Tech Stack Detection

The skill performs passive HTTP-based tech fingerprinting:

  1. Makes HTTP/HTTPS requests to the target domain
  2. Inspects HTTP headers (Server, X-Powered-By, CF-* headers, etc.)
  3. Checks for common JavaScript framework meta tags in HTML
  4. Looks at default paths (favicon, /wp-login.php, /.well-known/, etc.)
  5. Compares headers and patterns against a built-in signature database

No active scanning. No port probes. Passive reconnaissance only.


Output Schema

{
  "company": "Acme Corp",
  "domain": "acme.com",
  "size": "50-200",
  "industry": "Software",
  "description": "...",
  "tech_stack": ["WordPress", "Cloudflare", "Google Analytics", "Stripe"],
  "news": [{"title": "...", "url": "...", "date": "..."}],
  "social": {"linkedin": "...", "twitter": "...", "facebook": "..."},
  "contacts": [{"name": "...", "title": "...", "linkedin": "..."}],
  "lookup_date": "2026-04-23"
}

🔗 More from EdgeIQ Labs

edgeiqlabs.com — Security tools, OSINT utilities, and micro-SaaS products for developers and security professionals.

  • 🛠️ Subdomain Hunter — Passive subdomain enumeration via Certificate Transparency
  • 📸 Screenshot API — URL-to-screenshot API for developers
  • 🔔 uptime.check — URL uptime monitoring with alerts
  • 🛡️ headers.check — HTTP security headers analyzer

👉 Visit edgeiqlabs.com →

Comments

Loading comments...