These skills are intended for external OSINT-driven reconnaissance against authorized targets. They explicitly exclude:
- Active exploitation, post-exploitation, lateral movement
- Active Directory attacks, Kerberoasting, BloodHound queries
- Malware development, payload crafting, AV/EDR evasion
- C2 framework usage (Cobalt Strike, Sliver, Mythic, Havoc, etc.)
- Real PII / credentials / breach corpus content in examples
- Defensive / blue-team detection content (separate domain)
The skills include a soft scope-check that triggers when a user asks Claude to act against an unverified third-party target:
"Quick scope check: is this a target you own or have written authorization to assess (e.g., a red-team engagement, in-scope bug-bounty asset, or your own infrastructure)?"
Skill content also includes:
- An "Authorization & Legal Posture" section at the top of each SKILL.md.
- Hard "Do NOT" rules covering destructive probes, credential-validator misuse, scope violations.
- Detection-aware guidance encouraging back-off rather than evasion when active defenses are detected.
- Validator discipline — only read-only credential verification; never destructive.
If you find:
- A trigger phrase that causes Claude to attempt active exploitation despite the OSINT-only scope.
- A copy-paste curl probe that has unintended destructive side effects.
- Validator endpoints that aren't actually read-only.
- Any pattern that could enable unauthorized access if misused.
Please report it privately:
- Open a GitHub issue with title
SECURITY:(no details) AND request privacy. - Or email the maintainer (see repo profile).
- Do not post the details in a public issue / PR / discussion.
We aim to respond within 5 business days and resolve within 30 days for substantive issues.
If you used these skills during an authorized engagement and found a vulnerability in someone else's product / service:
- Use the responsible-disclosure templates in
osint-methodology§30. - For bug-bounty programs: follow the program's submission process.
- For unprogrammed targets: follow the CVD process in §30.4.
| Version | Support status |
|---|---|
| 2.1.x (current) | ✅ Active |
| 2.0.x | |
| 1.x | ❌ End of life |
- Pin the skill version (
v2.1) in any production deployment. - Run
scripts/sync-skill-content.sh(or manual cp) only against this repo's bundleddocs/full-skills/files; don't fetch from arbitrary sources. - Verify SHA-256 of any binary helper scripts before execution.
- Don't commit your engagement-specific notes into a fork of this repo.
- Use sock-puppet GitHub accounts when contributing if your engagement persona shouldn't be linked to your contributor identity.