A new open-source tool called EpsteIn has been released, allowing users to scan their LinkedIn connections against the 3.5 million pages of Jeffrey Epstein court documents released by the U.S. Department of Justice. Developed by Christopher Finke, the Python-based utility processes locally exported LinkedIn Connections.csv files offline and queries an API indexing the public Epstein files to produce an interactive HTML report highlighting any matches, complete with names, job details, company information, relevant excerpts, and direct links to source PDFs. The tool is intended for cybersecurity professionals and OSINT practitioners conducting network risk assessments and threat hunting following major data releases, emphasizing privacy by avoiding cloud uploads. While powerful for personal validation, experts caution about potential false positives due to common names and risks of misuse for harassment or doxxing, recommending thorough manual verification of results.