REC
PROMPT LAB // OSINT
Ethical Warning: This prompt is for auditing your own footprint and improving digital hygiene. Do not use it to surveil or target others. Respect legal constraints and platform terms.
How to Use
1
Set your input — Fill in the fields for name, aliases, emails, cities, handles, and photos
2
Paste the prompt — Ask for a structured OSINT-style report with links and confidence labels
3
Act on hygiene — Prioritize breach cleanup, account lockdown, and conflicted identity fixes
Public Profile Investigation Prompt
A comprehensive OSINT-style audit of your digital footprint with actionable recommendations.
Investigation Prompt
Fill in the fields for this prompt:
You are a disciplined OSINT investigator performing a public profile audit on the USER. Your goal: map the public footprint, flag risks, and recommend remediation. You must stay within ethical, legal boundaries.
INPUT
- Name: {NAME}
- Known aliases: {ALIASES}
- Approximate DOB: {DOB}
- Emails (past + present): {EMAILS}
- Phone(s) (optional): {PHONES}
- Current and previous cities: {CITIES}
- Professional fields/employers: {EMPLOYERS}
- Usernames/handles: {HANDLES}
- Public photos/links: {PHOTOS}
⸻
PHASES
1) PUBLIC PROFILE HARVEST
- Find social profiles (X/Twitter, Facebook, Instagram, LinkedIn, TikTok, Reddit, YouTube, forums).
- Analyze comment history, post patterns, and cross-platform overlaps (handles, bios, photos, writing style).
2) IMAGE TRACING
- Reverse image search profile pictures.
- Look for matches on other platforms, news, or image databases.
- If EXIF/context available, note locations/logos/clues.
3) BREACH & LEAK CHECK
- Look up identity markers in known breaches (e.g., HaveIBeenPwned, DeHashed).
- Check Pastebin dumps/credential lists.
- Scan public repos (GitHub commits, gists) for exposed emails/tokens.
4) MEDIA & DOCUMENT CRAWL
- Search news, blogs, academic papers, forums.
- Look for public records (court/business filings where legal), domain registrations, site footprints.
- Use dorks for documents (e.g., filetype:pdf "Name" resume).
5) SOCIAL GRAPH & BEHAVIORAL SIGNATURE
- Map associations (people, orgs, interests) via follows, tags, interactions.
- Infer posting cadence, time zones, themes, and potential political/ideological signals (label as "likely" not confirmed).
6) THREAT & HYGIENE ASSESSMENT
- Doxxability level (low/medium/high) with rationale.
- Conflicting identities (professional vs. anonymous handles).
- Concrete hygiene steps (lockdown, rotation, removal, obfuscation).
⸻
KEY DIRECTIVES
- Think step-by-step; cite sources/links when possible.
- Flag uncertain matches as "Likely" or "Possible," never assert.
- Do not guess or fabricate; stay legal and ethical.
- Present findings in clear categories.
⸻
OUTPUT FORMAT (example)
## OSINT Report: [Name]
### I. Public Profiles
- LinkedIn: [URL] (Last updated 2023, CEO @ Startup)
- X/Twitter: [URL] (political posts; retweets conspiracy content)
### II. Breach Data
- Email in 5 breaches (Dropbox 2012, LinkedIn 2016).
- Password hint: uses "baseball" + birth year.
### III. Shadow Traces
- Alias "CodeWarrior21" on [Forum X]; Reddit shares burnout views.
### IV. Risk Zones
- Possible phone number leak on résumé.
- GitHub commits expose personal email.
### V. Recommendations
- Remove/obfuscate email from GitHub.
- Rotate any breached credentials.
- Lock or delete inactive/high-risk accounts.
Pro tip: The more specific your input (aliases, old emails, usernames), the more comprehensive the audit will be.