Open Source Intelligence gathering for authorized investigations.
Workflow Routing
| People lookup
| Workflows/PeopleLookup.md
| PeopleTools.md
| Company lookup
| Workflows/CompanyLookup.md
| CompanyTools.md
| Investment due diligence
| Workflows/CompanyDueDiligence.md
| CompanyTools.md
| Entity/threat intel
| Workflows/EntityLookup.md
| EntityTools.md
Trigger Patterns
People OSINT:
-
"do OSINT on [person]", "research [person]", "background check on [person]"
-
"who is [person]", "find info about [person]", "investigate this person" -> Route to
Workflows/PeopleLookup.md
Company OSINT:
-
"do OSINT on [company]", "research [company]", "company intelligence"
-
"what can you find about [company]", "investigate [company]" -> Route to
Workflows/CompanyLookup.md
Investment Due Diligence:
-
"due diligence on [company]", "vet [company]", "is [company] legitimate"
-
"assess [company]", "should we work with [company]" -> Route to
Workflows/CompanyDueDiligence.md
Entity/Threat Intel:
-
"investigate [domain]", "threat intelligence on [entity]", "is this domain malicious"
-
"research this threat actor", "check [domain]", "analyze [entity]" -> Route to
Workflows/EntityLookup.md
Authorization (REQUIRED)
Before ANY investigation, verify:
Explicit authorization from client Clear scope definition Legal compliance confirmed Documentation in place
STOP if any checkbox is unchecked. See EthicalFramework.md for details.
Resource Index
| EthicalFramework.md
| Authorization, legal, ethical boundaries
| Methodology.md
| Collection methods, verification, reporting
| PeopleTools.md
| People search, social media, public records
| CompanyTools.md
| Business databases, DNS, tech profiling
| EntityTools.md
| Threat intel, scanning, malware analysis
Integration
Automatic skill invocations:
-
Research Skill - Parallel researcher agent deployment (REQUIRED)
-
Recon Skill - Technical infrastructure reconnaissance
Agent fleet patterns:
-
Quick lookup: 4-6 agents
-
Standard investigation: 8-16 agents
-
Comprehensive due diligence: 24-32 agents
Researcher types:
| PerplexityResearcher | Current web data, social media, company updates
| ClaudeResearcher | Academic depth, professional backgrounds
| GeminiResearcher | Multi-perspective, cross-domain connections
| GrokResearcher | Contrarian analysis, fact-checking
File Organization
Active investigations:
$PAI_DIR/work/scratch/YYYY-MM-DD-HHMMSS_osint-[target]/
Archived reports:
$PAI_DIR/history/research/YYYY-MM/[target]-osint/
Ethical Guardrails
ALLOWED: Public sources only - websites, social media, public records, search engines, archived content
PROHIBITED: Private data, unauthorized access, social engineering, purchasing breached data, ToS violations
See EthicalFramework.md for complete requirements.
Version: 2.3.0 Last Updated: January 2026