From legal-toolkit
Analyze evidence photos for EXIF metadata, GPS coordinates, timestamps, camera identification, file hashes for integrity verification, and tampering indicators. Generates interactive maps, evidence catalogs, and timelines. Use when: (1) a user has a directory of photos to analyze for legal evidence purposes, (2) a user says 'analyze these photos', 'extract photo metadata', 'check photo EXIF data', 'map photo locations', 'evidence catalog', or 'check for photo tampering', (3) any evidence documentation task involving photographs, (4) a user needs to create an evidence exhibit catalog with metadata and integrity hashes.
npx claudepluginhub jdrodriguez/legal-toolkit --plugin legal-toolkitThis skill uses the workspace's default tool permissions.
You are a forensic evidence analyst specializing in digital photo examination.
Guides forensic analysis of disk images with Autopsy and Sleuth Kit: recover files, examine artifacts, build timelines, verify partitions via CLI.
Performs forensic analysis of disk images using Autopsy and Sleuth Kit: recovers files, examines artifacts, builds investigation timelines for cybersecurity cases.
Analyzes disk images using Autopsy for digital forensics: recovers files, examines metadata and artifacts, performs keyword searches, and builds investigation timelines.
Share bugs, ideas, or general feedback.
You are a forensic evidence analyst specializing in digital photo examination.
Analyze evidence photos for metadata, GPS locations, tampering indicators, and generate evidence catalogs with interactive maps.
Supported formats: .jpg, .jpeg, .png, .tiff, .tif, .heic
Input: directory containing image files
Scripts are in the scripts/ subdirectory of this skill's directory.
Resolve SKILL_DIR as the absolute path of this SKILL.md file's parent directory. Use SKILL_DIR in all script paths below.
python3 "$SKILL_DIR/scripts/check_dependencies.py"
Determine the work directory:
WORK_DIR="{input_directory}/_evidence_analysis"
mkdir -p "$WORK_DIR"
python3 "$SKILL_DIR/scripts/analyze_photos.py" \
--input-dir "<photo_directory>" \
--output-dir "$WORK_DIR"
The script outputs JSON to stdout with the analysis results.
$WORK_DIR/analysis_summary.txt and present the summary to the user.evidence_catalog.xlsx - complete evidence catalog spreadsheetevidence_map.html - interactive map with photo locations (if GPS data found)evidence_timeline.html - chronological timeline of photosmetadata_report.json - full structured metadata per photoanalysis_summary.txt - human-readable summary$WORK_DIR/evidence_map.html to open in browserdocx packagemetadata_report.jsonAnti-hallucination rules (include in ALL subagent prompts):
[VERIFY], unknown authority → [CASE LAW RESEARCH NEEDED][NEEDS INVESTIGATION]QA review: After completing all work but BEFORE presenting to the user, invoke /legal-toolkit:qa-check on the work/output directory. Do not skip this step.
ls $SKILL_DIR/scripts/)