Asi osint-exposure-audit
install
source · Clone the upstream repo
git clone https://github.com/plurigrid/asi
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/plurigrid/asi "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/osint-exposure-audit" ~/.claude/skills/plurigrid-asi-osint-exposure-audit && rm -rf "$T"
manifest:
skills/osint-exposure-audit/SKILL.mdsource content
OSINT Exposure Audit
Digital dumpster diving — systematically cataloguing what an organization leaks publicly that enables attacks. Everything an adversary can learn without ever sending a packet to your infrastructure.
When to Use
- External attack surface assessment
- Pre-pentest reconnaissance review
- Data leakage auditing
- Breach impact assessment
- Supply chain exposure analysis
- Merger/acquisition security due diligence
- Continuous monitoring of organizational exposure drift
Exposure Taxonomy
Code Repositories
- Leaked secrets in git history (keys, tokens, passwords in old commits)
files,.env
with credentials committed to public reposdocker-compose.yml- API keys and service account credentials in source
- Internal URLs, hostnames, and IP ranges in IaC (Terraform, CloudFormation)
- CI/CD pipeline configs exposing infrastructure details
Document Metadata
- Author names and usernames in PDF/Office document properties
- Software versions (Adobe, Office builds) revealing patch levels
- Internal file paths (
) in document metadataC:\Users\jsmith\Documents\... - EXIF data in images: GPS coordinates, device info, timestamps
- Printer/scanner metadata in published documents
DNS and Infrastructure
- Subdomain enumeration via brute-force, zone transfers, passive DNS
- Certificate transparency logs revealing internal service names
- Historical DNS records exposing migrations and old infrastructure
- Cloud storage buckets (S3, GCS, Azure Blob) with predictable names
- ASN mapping to identify full IP space ownership
- Reverse DNS revealing naming conventions
Credential Exposure
- Breach database correlation (email domains in known breaches)
- Paste sites (Pastebin, GitHub Gists) containing credentials
- Credential stuffing lists with organization email addresses
- Leaked password patterns revealing policy (length, complexity, rotation)
- Exposed
,.htpasswd
, or similar auth filesweb.config
Social Media Intelligence
- Employee names, roles, reporting structure from LinkedIn
- Technology stack hints from employee profiles and endorsements
- Org chart reconstruction from public profiles
- Job postings revealing specific technologies, versions, and vendors
- Conference talks and slides disclosing architecture details
- Geolocation of facilities from employee posts
Web Archives
- Wayback Machine snapshots of removed pages, old API documentation
- Deprecated endpoints still responding in production
- Removed job postings revealing past security concerns
- Old sitemaps and
exposing hidden pathsrobots.txt - Cached versions of pages taken down after incidents
Supply Chain
- Third-party vendor exposure (shared credentials, connected services)
- Dependency confusion potential in public package registries
- Internal package names leaked in
,package.jsonrequirements.txt - Vendor security posture reflecting on the organization
- Open-source contributions revealing internal tooling
Audit Methodology
Phase 1: Passive Reconnaissance
- Domain and infrastructure enumeration (subdomains, IPs, ASNs, cloud resources)
- Certificate transparency log analysis for all owned domains
- Passive DNS collection and historical record review
- Search engine dorking for exposed files and directories
Phase 2: Code and Document Analysis
- Git repository scanning — secrets in full commit history
- Exposed
directory detection on web-facing servers.git - Document metadata extraction from all public-facing files (PDFs, DOCX, XLSX)
- Source map and debug artifact discovery
Phase 3: Credential and Identity Exposure
- Credential breach correlation (HaveIBeenPwned, breach compilations)
- Paste site monitoring for organization-related dumps
- Email address harvesting and employee enumeration
Phase 4: Active Surface Mapping
- Cloud storage discovery and permission testing
- Job posting and social media intelligence gathering
- Web archive analysis for leaked or removed content
- Third-party service enumeration (SaaS, APIs, webhooks)
Tool Reference
| Category | Tools |
|---|---|
| Infrastructure | , , , , , Shodan, Censys |
| Git/Code | , , , GitHub/GitLab search dorks |
| Documents | , FOCA, |
| Credentials | , Dehashed API, PWNDB |
| Web | (getallurls), , |
| Cloud | , , |
| OSINT Frameworks | , , |
Code Review Patterns
What leaks from codebases — check for these in any public repository:
- Hardcoded credentials: API keys, tokens, passwords in source files
- Internal hostnames/IPs: configuration files referencing
,10.x.x.x*.internal - Sensitive comments:
,TODO: remove passwordHACK: using admin creds - Debug endpoints:
,/debug
,/actuator
left enabled in production/elmah.axd - Verbose error messages: stack traces exposing file paths, library versions
- Exposed
directory: full repository history accessible via web server.git - Source maps in production:
files reconstructing original source.js.map - Environment detection logic: code revealing staging/prod URL patterns
- Dependency manifests:
,package-lock.json
pinning vulnerable versionsPipfile.lock
Output Format
Structure findings as follows:
## Finding: [Title] - **Exposure Type**: Code Repository | Document Metadata | Infrastructure | Credential | Social Media | Web Archive | Supply Chain - **Source**: Where the exposure was discovered (URL, repo, document name) - **Data Exposed**: Specific sensitive data found - **Risk Level**: Critical | High | Medium | Low | Informational - **Attack Scenario**: How an adversary would leverage this exposure - **Remediation**: - Immediate: Rotate credential / Remove document / Revoke access - Preventive: Configure access control / Implement secret scanning / Deploy metadata scrubbing - **Evidence**: Screenshot, hash, or sanitized excerpt (never include raw credentials in reports)
Aggregate findings into an exposure heat map by category to identify systemic issues versus one-off leaks.
Related Skills
— leveraging OSINT findings for social engineering assessmentssocial-engineering-audit
— mapping exposed services into exploitable attack pathsentry-point-analyzer
— deep code review for vulnerabilities beyond leaked secretsstatic-security-analyzer
— active testing of discovered web applications and APIswebapp-testing