mirror of
https://github.com/NousResearch/hermes-agent.git
synced 2026-05-13 03:52:00 +00:00
Extends the Windows-gating work to the optional-skills/ tree. Every
SKILL.md that previously omitted the platforms: field now carries an
explicit declaration, which Hermes's loader (agent.skill_utils.
skill_matches_platform) honors to skip-load on incompatible OSes.
58 skills declared cross-platform (platforms: [linux, macos, windows]):
autonomous-ai-agents/blackbox, autonomous-ai-agents/honcho
blockchain/base, blockchain/solana
communication/one-three-one-rule
creative/blender-mcp, creative/concept-diagrams, creative/hyperframes,
creative/kanban-video-orchestrator, creative/meme-generation
devops/cli (inference-sh-cli), devops/docker-management
dogfood/adversarial-ux-test
email/agentmail
finance/3-statement-model, finance/comps-analysis, finance/dcf-model,
finance/excel-author, finance/lbo-model, finance/merger-model,
finance/pptx-author
health/fitness-nutrition, health/neuroskill-bci
mcp/fastmcp, mcp/mcporter
migration/openclaw-migration
mlops/accelerate, mlops/chroma, mlops/clip, mlops/guidance,
mlops/hermes-atropos-environments, mlops/huggingface-tokenizers,
mlops/instructor, mlops/lambda-labs, mlops/llava, mlops/modal,
mlops/peft, mlops/pinecone, mlops/pytorch-lightning, mlops/qdrant,
mlops/saelens, mlops/simpo, mlops/stable-diffusion
productivity/canvas, productivity/shop-app, productivity/shopify,
productivity/siyuan, productivity/telephony
research/domain-intel, research/drug-discovery, research/duckduckgo-search,
research/gitnexus-explorer, research/parallel-cli, research/scrapling
security/1password, security/oss-forensics, security/sherlock
web-development/page-agent
5 skills gated from Windows (platforms: [linux, macos]):
mlops/flash-attention - Flash Attention wheels are Linux-first; Windows
install requires building from source with CUDA
mlops/faiss - faiss-gpu has no Windows wheel; gate rather than
leak partial (faiss-cpu) support
mlops/nemo-curator - NVIDIA NeMo ecosystem has no first-class Windows path
mlops/slime - Megatron+SGLang RL stack is Linux-only in practice
mlops/whisper - openai-whisper + ffmpeg setup on Windows is
non-trivial; gate until Windows install stanza lands
Methodology: scanned every SKILL.md for Windows-hostile signals
(apt-get, brew, systemd, osascript, ptrace, X11 binaries, POSIX-only
Python APIs, Docker POSIX $(pwd) bind-mounts, explicit 'linux-only' /
'macos-only' text). 3 skills flagged as having hard signals on review:
docker-management and qdrant only had POSIX $(pwd) docker examples and
the tools themselves (Docker Desktop, Qdrant) run fine on Windows —
declared ALL. whisper had an apt/brew ffmpeg install path and nothing
else but the openai-whisper Windows install story is rough enough to
warrant gating.
Strict-over-lenient policy: when in doubt, gate. Easier to un-gate after
verified Windows support lands than to leak partial support that
manifests as mid-task failures for Windows users.
193 lines
No EOL
5.9 KiB
Markdown
193 lines
No EOL
5.9 KiB
Markdown
---
|
|
name: sherlock
|
|
description: OSINT username search across 400+ social networks. Hunt down social media accounts by username.
|
|
version: 1.0.0
|
|
author: unmodeled-tyler
|
|
license: MIT
|
|
platforms: [linux, macos, windows]
|
|
metadata:
|
|
hermes:
|
|
tags: [osint, security, username, social-media, reconnaissance]
|
|
category: security
|
|
prerequisites:
|
|
commands: [sherlock]
|
|
---
|
|
|
|
# Sherlock OSINT Username Search
|
|
|
|
Hunt down social media accounts by username across 400+ social networks using the [Sherlock Project](https://github.com/sherlock-project/sherlock).
|
|
|
|
## When to Use
|
|
|
|
- User asks to find accounts associated with a username
|
|
- User wants to check username availability across platforms
|
|
- User is conducting OSINT or reconnaissance research
|
|
- User asks "where is this username registered?" or similar
|
|
|
|
## Requirements
|
|
|
|
- Sherlock CLI installed: `pipx install sherlock-project` or `pip install sherlock-project`
|
|
- Alternatively: Docker available (`docker run -it --rm sherlock/sherlock`)
|
|
- Network access to query social platforms
|
|
|
|
## Procedure
|
|
|
|
### 1. Check if Sherlock is Installed
|
|
|
|
**Before doing anything else**, verify sherlock is available:
|
|
|
|
```bash
|
|
sherlock --version
|
|
```
|
|
|
|
If the command fails:
|
|
- Offer to install: `pipx install sherlock-project` (recommended) or `pip install sherlock-project`
|
|
- **Do NOT** try multiple installation methods — pick one and proceed
|
|
- If installation fails, inform the user and stop
|
|
|
|
### 2. Extract Username
|
|
|
|
**Extract the username directly from the user's message if clearly stated.**
|
|
|
|
Examples where you should **NOT** use clarify:
|
|
- "Find accounts for nasa" → username is `nasa`
|
|
- "Search for johndoe123" → username is `johndoe123`
|
|
- "Check if alice exists on social media" → username is `alice`
|
|
- "Look up user bob on social networks" → username is `bob`
|
|
|
|
**Only use clarify if:**
|
|
- Multiple potential usernames mentioned ("search for alice or bob")
|
|
- Ambiguous phrasing ("search for my username" without specifying)
|
|
- No username mentioned at all ("do an OSINT search")
|
|
|
|
When extracting, take the **exact** username as stated — preserve case, numbers, underscores, etc.
|
|
|
|
### 3. Build Command
|
|
|
|
**Default command** (use this unless user specifically requests otherwise):
|
|
```bash
|
|
sherlock --print-found --no-color "<username>" --timeout 90
|
|
```
|
|
|
|
**Optional flags** (only add if user explicitly requests):
|
|
- `--nsfw` — Include NSFW sites (only if user asks)
|
|
- `--tor` — Route through Tor (only if user asks for anonymity)
|
|
|
|
**Do NOT ask about options via clarify** — just run the default search. Users can request specific options if needed.
|
|
|
|
### 4. Execute Search
|
|
|
|
Run via the `terminal` tool. The command typically takes 30-120 seconds depending on network conditions and site count.
|
|
|
|
**Example terminal call:**
|
|
```json
|
|
{
|
|
"command": "sherlock --print-found --no-color \"target_username\"",
|
|
"timeout": 180
|
|
}
|
|
```
|
|
|
|
### 5. Parse and Present Results
|
|
|
|
Sherlock outputs found accounts in a simple format. Parse the output and present:
|
|
|
|
1. **Summary line:** "Found X accounts for username 'Y'"
|
|
2. **Categorized links:** Group by platform type if helpful (social, professional, forums, etc.)
|
|
3. **Output file location:** Sherlock saves results to `<username>.txt` by default
|
|
|
|
**Example output parsing:**
|
|
```
|
|
[+] Instagram: https://instagram.com/username
|
|
[+] Twitter: https://twitter.com/username
|
|
[+] GitHub: https://github.com/username
|
|
```
|
|
|
|
Present findings as clickable links when possible.
|
|
|
|
## Pitfalls
|
|
|
|
### No Results Found
|
|
If Sherlock finds no accounts, this is often correct — the username may not be registered on checked platforms. Suggest:
|
|
- Checking spelling/variation
|
|
- Trying similar usernames with `?` wildcard: `sherlock "user?name"`
|
|
- The user may have privacy settings or deleted accounts
|
|
|
|
### Timeout Issues
|
|
Some sites are slow or block automated requests. Use `--timeout 120` to increase wait time, or `--site` to limit scope.
|
|
|
|
### Tor Configuration
|
|
`--tor` requires Tor daemon running. If user wants anonymity but Tor isn't available, suggest:
|
|
- Installing Tor service
|
|
- Using `--proxy` with an alternative proxy
|
|
|
|
### False Positives
|
|
Some sites always return "found" due to their response structure. Cross-reference unexpected results with manual checks.
|
|
|
|
### Rate Limiting
|
|
Aggressive searches may trigger rate limits. For bulk username searches, add delays between calls or use `--local` with cached data.
|
|
|
|
## Installation
|
|
|
|
### pipx (recommended)
|
|
```bash
|
|
pipx install sherlock-project
|
|
```
|
|
|
|
### pip
|
|
```bash
|
|
pip install sherlock-project
|
|
```
|
|
|
|
### Docker
|
|
```bash
|
|
docker pull sherlock/sherlock
|
|
docker run -it --rm sherlock/sherlock <username>
|
|
```
|
|
|
|
### Linux packages
|
|
Available on Debian 13+, Ubuntu 22.10+, Homebrew, Kali, BlackArch.
|
|
|
|
## Ethical Use
|
|
|
|
This tool is for legitimate OSINT and research purposes only. Remind users:
|
|
- Only search usernames they own or have permission to investigate
|
|
- Respect platform terms of service
|
|
- Do not use for harassment, stalking, or illegal activities
|
|
- Consider privacy implications before sharing results
|
|
|
|
## Verification
|
|
|
|
After running sherlock, verify:
|
|
1. Output lists found sites with URLs
|
|
2. `<username>.txt` file created (default output) if using file output
|
|
3. If `--print-found` used, output should only contain `[+]` lines for matches
|
|
|
|
## Example Interaction
|
|
|
|
**User:** "Can you check if the username 'johndoe123' exists on social media?"
|
|
|
|
**Agent procedure:**
|
|
1. Check `sherlock --version` (verify installed)
|
|
2. Username provided — proceed directly
|
|
3. Run: `sherlock --print-found --no-color "johndoe123" --timeout 90`
|
|
4. Parse output and present links
|
|
|
|
**Response format:**
|
|
> Found 12 accounts for username 'johndoe123':
|
|
>
|
|
> • https://twitter.com/johndoe123
|
|
> • https://github.com/johndoe123
|
|
> • https://instagram.com/johndoe123
|
|
> • [... additional links]
|
|
>
|
|
> Results saved to: johndoe123.txt
|
|
|
|
---
|
|
|
|
**User:** "Search for username 'alice' including NSFW sites"
|
|
|
|
**Agent procedure:**
|
|
1. Check sherlock installed
|
|
2. Username + NSFW flag both provided
|
|
3. Run: `sherlock --print-found --no-color --nsfw "alice" --timeout 90`
|
|
4. Present results |