PrivateInvestigator
Customization
Before executing, check for user customizations at:
~/.claude/PAI/USER/SKILLCUSTOMIZATIONS/PrivateInvestigator/
If this directory exists, load and apply any PREFERENCES.md, configurations, or resources found there. These override default behavior. If the directory does not exist, proceed with skill defaults.
🚨 MANDATORY: Voice Notification (REQUIRED BEFORE ANY ACTION)
You MUST send this notification BEFORE doing anything else when this skill is invoked.
-
Send voice notification:
curl -s -X POST http://localhost:8888/notify \ -H "Content-Type: application/json" \ -d '{"message": "Running the WORKFLOWNAME workflow in the PrivateInvestigator skill to ACTION"}' \ > /dev/null 2>&1 & -
Output text notification:
Running the **WorkflowName** workflow in the **PrivateInvestigator** skill to ACTION...
This is not optional. Execute this curl command immediately upon skill invocation.
PrivateInvestigator - Ethical People Finding
Core Principle
PUBLIC DATA ONLY - No hacking, pretexting, or authentication bypass. All techniques are legal and ethical.
Workflow Routing
When executing a workflow, output this notification:
Running the **WorkflowName** workflow in the **PrivateInvestigator** skill to ACTION...
When to Activate
Direct People-Finding
- "find [person]", "locate [person]", "search for [person]"
- "reconnect with [person]", "looking for lost contact"
- "find an old friend", "locate a former coworker"
Reverse Lookup
- "reverse phone lookup", "who owns this email"
- "reverse image search", "find person by username"
Investigation
- "background check" (public data only)
- "what can you find about [person]"
- "research [person]"
Available Workflows
| Trigger | Workflow | Action |
|---|---|---|
| "find person", "locate" | FindPerson.md |
Full investigation using parallel research agents |
| "social media search" | SocialMediaSearch.md |
Cross-platform social media investigation |
| "public records" | PublicRecordsSearch.md |
Government and official records search |
| "reverse lookup" | ReverseLookup.md |
Phone, email, image, username searches |
| "verify identity" | VerifyIdentity.md |
Confirm correct person match |
Research Strategy
MANDATORY: Extensive Parallel Research
Every investigation uses 15 parallel research agents (5 types × 3 each):
Agent Types:
- ClaudeResearcher (3 agents) - People search aggregators, professional records, location intelligence, comprehensive identity, public records, education/alumni
- GeminiResearcher (3 agents) - Alternative identities, multi-perspective synthesis, historical context
- GrokResearcher (3 agents) - Social media deep search, contrarian analysis, real-time intelligence
- CodexResearcher (3 agents) - Username enumeration, Google dorking, technical profiles
Each agent executes 3 sub-searches = 45 parallel search threads per investigation
Launch Pattern: All 15 agents launch in a SINGLE message with multiple Task tool calls.
Core Capabilities
1. People Search Aggregators
| Service | Type | Best For |
|---|---|---|
| TruePeopleSearch | Free | Best free option, fresh data |
| FastPeopleSearch | Free | Basic lookups, no signup |
| Spokeo | Freemium | Social media aggregation (120+ networks) |
| BeenVerified | Paid | Comprehensive background data |
2. Social Media Investigation
- Facebook: Google x-ray searches, mutual friends, groups
- LinkedIn: Boolean search, alumni networks
- Instagram/Twitter/TikTok: Username patterns, cross-platform correlation
3. Public Records
- Voter Registration: Most states publicly available
- Property Records: County assessor/recorder sites
- Court Records: PACER (federal), state court portals, CourtListener
- Business Filings: Secretary of State websites
- Professional Licenses: State licensing boards
4. Reverse Lookup
- Phone: CallerID, NumLookup, carrier lookup
- Email: Epieos, Holehe, Hunter.io
- Image: PimEyes, TinEye, Google/Yandex Images
- Username: Sherlock, WhatsMyName, Namechk
5. Google Dorking
site:linkedin.com "John Smith" "Software Engineer"
site:facebook.com "lives in" "Austin" "marketing"
filetype:pdf resume "Jane Doe" "San Francisco"
Investigation Methodology
Information Hierarchy
Tier 1: Foundation Data
- Full name (and variations/maiden names)
- Approximate age or date of birth
- Last known location
- Context (school, workplace, relationship)
Tier 2: Primary Research
- People search aggregators
- Social media presence scan
- Google dorking
Tier 3: Deep Investigation
- Public records searches
- Reverse lookups on discovered info
- Cross-platform correlation
- Associate/family network mapping
Tier 4: Verification
- Multi-source confirmation
- Timeline consistency check
- Photo verification
- Confidence scoring
Confidence Scoring
| Level | Criteria | Action |
|---|---|---|
| HIGH | 3+ unique identifiers match across independent sources | Safe to contact |
| MEDIUM | 2 identifiers match, timeline consistent | Verify before contact |
| LOW | Single source or name-only match | Needs more investigation |
| POSSIBLE | Partial match, requires verification | Do not act without more data |
Dealing with Common Names
- Add Specificity - Include location, age, employer, school
- Cross-Reference - Match DOB + address patterns across sources
- Family Connections - Verify through known relatives
- Timeline Analysis - Does the life history make sense?
- Multiple Identifiers - Require 3+ matching data points
Legal & Ethical Boundaries
GREEN ZONE (Allowed)
✅ Search public records (property, court, voter, business) ✅ Access publicly posted social media content ✅ Use people search aggregator sites ✅ Perform reverse lookups on public data ✅ Google dorking with public search operators
RED ZONE (Never Cross)
❌ Access data behind login walls without authorization ❌ Bypass authentication or security measures ❌ Use pretexting or impersonation ❌ Access private databases (credit, financial, medical) ❌ Stalk, harass, or intimidate subjects ❌ Access PI-only databases without license
When to STOP
- If the purpose shifts to harassment or stalking
- If the subject has clearly opted out of contact
- If investigation requires illegal methods
- If you suspect the requestor has malicious intent
Examples
Example 1: Finding an Old College Friend
User: "Help me find my college roommate from 2005, John Smith from Austin"
→ Routes to FindPerson.md
→ Launches 15 parallel research agents
→ Cross-references people search + LinkedIn alumni + property records
→ Verifies identity through timeline analysis
→ Reports findings with HIGH confidence
Example 2: Reverse Phone Lookup
User: "Who called from 512-555-1234?"
→ Routes to ReverseLookup.md
→ Runs phone through CallerID, NumLookup
→ Cross-references with people search aggregators
→ Reports owner name, location, carrier
Example 3: Social Media Investigation
User: "Find Jane Doe's social media, she's a marketing professional in Denver"
→ Routes to SocialMediaSearch.md
→ LinkedIn Boolean search + Google x-ray
→ Username enumeration if handle discovered
→ Reports all accounts with MEDIUM/HIGH confidence
Related Documentation:
- Complete workflow details in
Workflows/directory - Integration with Research skill for parallel agent orchestration
More from danielmiessler/personal_ai_infrastructure
osint
Structured OSINT investigations — people lookup, company intel, investment due diligence, entity/threat intel, domain recon, organization research using public sources with ethical authorization framework. USE WHEN OSINT, due diligence, background check, research person, company intel, investigate, company lookup, domain lookup, entity lookup, organization lookup, threat intel, discover OSINT sources.
259firstprinciples
Physics-based reasoning framework (Musk/Elon methodology) that deconstructs problems to irreducible fundamental truths rather than reasoning by analogy. Three-step structure: DECONSTRUCT (break to constituent parts and actual values), CHALLENGE (classify every element as hard constraint / soft constraint / unvalidated assumption — only physics is truly immutable), RECONSTRUCT (build optimal solution from fundamentals alone, ignoring inherited form). Outputs: constituent-parts breakdown, constraint classification table, and reconstructed solution with key insight. Three workflows: Deconstruct.md, Challenge.md, Reconstruct.md. Integrates with RedTeam (attack assumptions before deploying adversarial agents), Security (decompose threat model), Architecture (challenge design constraints), and Pentesters (decompose assumed security boundaries). Other skills invoke via: Challenge on all stated constraints → classify as hard/soft/assumption. Cross-domain synthesis: solutions from unrelated fields often apply once the fundamental truths are exposed. NOT FOR incident investigation and causal chains (use RootCauseAnalysis). NOT FOR structural feedback loops (use SystemsThinking). USE WHEN first principles, fundamental truths, challenge assumptions, is this a real constraint, rebuild from scratch, what are we actually paying for, what is this really made of, start over, physics first, question everything, reasoning by analogy, is this really necessary.
160documents
Read, write, convert, and analyze documents — routes to PDF, DOCX, XLSX, PPTX sub-skills for creation, editing, extraction, and format conversion. USE WHEN document, process file, create document, convert format, extract text, PDF, DOCX, XLSX, PPTX, Word, Excel, spreadsheet, PowerPoint, presentation, slides, consulting report, large PDF, merge PDF, fill form, tracked changes, redlining.
114council
Multi-agent collaborative debate that produces visible round-by-round transcripts with genuine intellectual friction. All council members are custom-composed via ComposeAgent (Agents skill) with domain expertise, unique voice, and personality tailored to the specific topic — never built-in generic types. ComposeAgent invoked as: bun run ~/.claude/skills/Agents/Tools/ComposeAgent.ts. Two workflows: DEBATE (3 rounds, full transcript + synthesis, parallel execution within rounds, 40-90 seconds total) and QUICK (1 round, fast perspective check). Context files: CouncilMembers.md (agent composition instructions), RoundStructure.md (three-round structure and timing), OutputFormat.md (transcript format templates). Agents are designed per debate topic to create real disagreement; 4-6 well-composed agents outperform 12 generic ones. Council is collaborative-adversarial (debate to find best path); for pure adversarial attack on an idea, use RedTeam instead. NOT FOR parallel task execution across agents (use Delegation skill). USE WHEN council, debate, multiple perspectives, weigh options, deliberate, get different views, multi-agent discussion, what would experts say, is there consensus, pros and cons from multiple angles.
112redteam
Military-grade adversarial analysis that deploys 32 parallel expert agents (engineers, architects, pentesters, interns) to stress-test ideas, strategies, and plans — not systems or infrastructure. Two workflows: ParallelAnalysis (5-phase: decompose into 24 atomic claims → 32-agent parallel attack → synthesis → steelman → counter-argument, each 8 points) and AdversarialValidation (competing proposals synthesized into best solution). Context files: Philosophy.md (core principles, success criteria, agent types), Integration.md (how to combine with FirstPrinciples, Council, and other skills; output format). Targets arguments, not network vulnerabilities. Findings ranked by severity; goal is to strengthen, not destroy — weaknesses delivered with remediation paths. Collaborates with FirstPrinciples (decompose assumptions before attacking) and Council (Council debates to find paths; RedTeam attacks whatever survives). Also invoked internally by Ideate (TEST phase) and WorldThreatModel (horizon stress-testing). NOT FOR AI instruction set auditing (use BitterPillEngineering). NOT FOR network/system vulnerability testing (use a security assessment skill). USE WHEN red team, attack idea, counterarguments, critique, stress test, devil's advocate, find weaknesses, break this, poke holes, what could go wrong, strongest objection, adversarial validation, battle of bots.
112art
Generates static visual content across 20+ formats via Flux, Nano Banana Pro (Gemini 3 Pro), and GPT-Image-1. Covers blog header illustrations, editorial art, Mermaid flowcharts, technical architecture diagrams, D3.js dashboards, taxonomies, timelines, 2x2 framework matrices, comparisons, annotated screenshots, recipe cards, aphorism/quote cards, conceptual maps, stat cards, comic panels, YouTube thumbnails, PAI pack icons, and brand-logo wallpapers. Named workflows: Essay, D3Dashboards, Visualize, Mermaid, TechnicalDiagrams, Taxonomies, Timelines, Frameworks, Comparisons, AnnotatedScreenshots, RecipeCards, Aphorisms, Maps, Stats, Comics, YouTubeThumbnailChecklist, AdHocYouTubeThumbnail, CreatePAIPackIcon, LogoWallpaper, RemoveBackground. SKILLCUSTOMIZATIONS loads PREFERENCES.md, CharacterSpecs.md, and SceneConstruction.md. --remove-bg flag produces transparent-background PNG (can produce black backgrounds — verify visually). Up to 14 reference images per request (5 human, 6 object Gemini API limit). Output staged to ~/Downloads/ for preview before any project directory copy. Nano Banana Pro uses --size for resolution tier 1K/2K/4K and separate --aspect-ratio. USE WHEN: art, illustration, diagram, flowchart, infographic, header image, thumbnail, visualize, generate image, mermaid, architecture diagram, comic, icon, blog art, framework diagram, D3 chart, remove background, wallpaper. NOT FOR video or animation (use Remotion). NOT FOR the user's personal portrait/headshot (use a dedicated headshot skill).
107