Skip to content
Champ edited this page Mar 28, 2026 · 3 revisions

CoSINT Wiki

Welcome to the CoSINT documentation wiki. Use the sections below to find what you need — whether you're getting started for the first time, tuning an investigation, or integrating CoSINT into your own workflow.

What is CoSINT?

CoSINT is an AI-powered OSINT (Open Source Intelligence) investigation tool. It accepts a target — a domain, email address, username, IP, phone number, person name, company, or crypto wallet — and runs a structured, multi-stage investigation using 50+ tools. A subagent system splits complex investigations into focused workstreams, and a Report Synthesizer compiles all findings into a structured Markdown report with a machine-readable .case.json sidecar.

Getting started

Topic Description
Installation & Setup Requirements, dependencies, model setup, and the setup wizard
Configuration config.toml and .env reference — all runtime knobs
CLI Usage Full command reference with examples and flag descriptions
Optional Integrations Extra Python packages and CLI tools that extend CoSINT's capabilities

Running investigations

Basic usage

python cosint.py <target> [options]
# Domain investigation (quick scan, default)
python cosint.py example.com

# Deep scan of an email address
python cosint.py user@example.com --depth deep

# Person by name, passive only
python cosint.py "Jane Smith" --type person --passive-only

# Open-ended investigation with explore scope
python cosint.py @handle --open --scope-mode explore

Scan depth

Mode Tool calls Best for
quick (default) Fewer, focused Rapid triage
deep Exhaustive, follows more leads Full profiling

Scope modes

Scope enforcement controls whether a tool call is on-target before it executes. Four modes are available, from fully deterministic to fully AI-driven:

Mode Rules AI judge Best for
strict Full deterministic pipeline Never Auditable, tightly controlled scans
guided (default) Deterministic first, AI as fallback On ambiguous cases General-purpose investigations
ai Minimal pre-filtering Primary decision-maker Nuanced, context-sensitive pivots
explore Minimal pre-filtering Permissive Open-ended discovery with --open

See Scope Modes for the full pipeline breakdown and a mode comparison table.

How it works

Subagent system

CoSINT splits investigations into focused workstreams via a subagent system. The root agent dispatches specialized subagents — Infrastructure, Social, Email, Person, Leaks, Finance, and more — each with its own directive and toolset. At the end of every scan, the Report Synthesizer subagent assembles all findings into the final report.

See Subagents for the full reference, including reasoning-only subagents (Entity Resolution, Validator, Budget Guard, etc.) and the report structure the synthesizer always produces.

Reports & evidence

Every scan writes two files to reports/:

  • report_<target>_<timestamp>.md — human-readable investigation report
  • report_<target>_<timestamp>.case.json — full structured evidence record with per-tool-call metadata, artifact observations, scope decisions, and evidence IDs (EV-xxxx) that trace back to the Markdown report

See Reports & Evidence for the full field reference.

MCP server

CoSINT can run as a standalone MCP server, exposing all tools directly to any MCP-compatible client — including Claude Desktop — without running a full CLI scan. Start it with:

python server.py

See MCP Server for Claude Desktop integration instructions, the full tool list by category, and session tracking details.

Documentation index

Page Contents
Installation & Setup Requirements, pip install, Playwright, setup wizard, model configuration
CLI Usage All flags, examples, interactive mode, report output paths
Configuration config.toml sections, .env keys, priority order
Scope Modes strict, guided, ai, explore — pipeline details, comparison table, practical examples
Subagents Investigation subagents, reasoning subagents, report structure
Reports & Evidence Markdown report sections, .case.json schema, evidence IDs
MCP Server Server setup, Claude Desktop config, tool list, session tracking
Optional Integrations Maigret, Holehe, GHunt, ExifTool, subfinder, phoneinfoga

Clone this wiki locally