Skip to content

Instantly share code, notes, and snippets.

@lazabogdan
Last active April 6, 2026 12:59
Show Gist options
  • Select an option

  • Save lazabogdan/9d232023fa5577afadfc1d9e4ac13e8c to your computer and use it in GitHub Desktop.

Select an option

Save lazabogdan/9d232023fa5577afadfc1d9e4ac13e8c to your computer and use it in GitHub Desktop.
LinkedIn Bot & Automation Gaming Research

Gaming LinkedIn: Bots, Automation & How People Get Caught

Research compiled: April 2026 Sources: Public reporting, court filings, LinkedIn transparency reports, Reddit communities, security research, news coverage through mid-2025


Table of Contents

  1. Common Bot & Automation Tactics
  2. The Tool Landscape
  3. How People Get Caught — LinkedIn's Detection Methods
  4. Consequences: Bans, Lawsuits & Reputation Damage
  5. Notable Incidents & Scandals
  6. LinkedIn's Countermeasures
  7. Community Horror Stories
  8. The Current State (2025)

1. Common Bot & Automation Tactics

Auto-Connecting (Connection Request Spam)

The most widespread automation tactic. Tools send hundreds of connection requests per day with personalized-looking messages using merge fields like {firstName} and {company}.

How it works:

  • Import a CSV of target profiles (often scraped from Sales Navigator)
  • Tool sends 50-100+ connection requests/day with templated notes
  • Some tools randomize sending times to appear human
  • Withdrawal of pending requests after 2-3 weeks to avoid LinkedIn's pending limit

Scale: Some users report sending 500-1,000 requests/week. LinkedIn's official limit is ~100/week (reduced from ~300/week pre-2022).

Auto-Messaging (Drip Campaigns)

Automated multi-step message sequences triggered after connection acceptance:

  • Day 0: "Thanks for connecting!" template
  • Day 2-3: Value-add message (share an article, ask a question)
  • Day 5-7: Pitch/CTA message
  • Day 14: Follow-up if no response

Tools like Expandi and Dux-Soup made this a standard "LinkedIn outbound playbook." The messages are often obviously templated — wrong company names, wrong roles, clearly automated timing patterns.

Profile Scraping & Data Harvesting

Systematically extracting profile data at scale:

  • Browser-based scraping: Chrome extensions that visit profiles one by one, extracting name, title, company, email, phone
  • API abuse: Reverse-engineering LinkedIn's internal APIs to bulk-extract data
  • Sales Navigator export abuse: Using SN's search + automation to build massive lead databases
  • Email enrichment: Combining scraped LinkedIn data with tools like Hunter.io, Lusha, or Apollo to build contact lists

Engagement Pods

Groups of users (typically 10-50+) who agree to like and comment on each other's posts to game LinkedIn's algorithm:

  • Manual pods: Slack/Telegram groups where members share post links and everyone engages
  • Automated pods: Services like Lempod (now largely defunct), Podawaa, and others that automatically like/comment using members' accounts
  • How they work: When you post, the pod bot logs into all members' accounts and engages within minutes, signaling to LinkedIn's algorithm that the post is "hot"
  • Scale: Some pods had 500+ members. Engagement was instant and obvious — a post getting 50 likes in 3 minutes from accounts that never otherwise interacted

AI-Generated Comments

Post-ChatGPT (late 2022+), a massive wave of automated commenting:

  • Tools that auto-generate "thoughtful" comments on target posts using GPT-3.5/4
  • Comments like "Great insights, [Name]! This really resonates with my experience in [industry]. 🔥"
  • Some tools comment on 50-100 posts/day from a single account
  • Easy to spot: generic praise, emoji patterns, no specific reference to post content
  • By 2024-2025, LinkedIn feeds were flooded with obviously AI-generated comments, creating significant user backlash

Fake Profiles & Profile Networks

  • Individual fakes: AI-generated headshots (StyleGAN/ThisPersonDoesNotExist), fabricated work histories, used for outbound sales or to build connection networks
  • Profile farms: Networks of 50-500+ fake profiles used to amplify content, send connection requests, or create the appearance of a large team
  • "Aged" accounts: Buying old LinkedIn accounts on black markets to bypass new-account restrictions
  • Impersonation: Creating profiles that closely mimic real people (same photo, slightly different name) for phishing or social engineering

View-Botting & Profile Viewing

  • Automated profile viewing to trigger "X viewed your profile" notifications
  • The goal: curiosity-driven profile visits back, leading to connections
  • Tools visit 200-500 profiles/day, hoping for a 5-10% visit-back rate
  • LinkedIn cracked down hard on this — one of the easiest patterns to detect

2. The Tool Landscape

Major Automation Tools

Tool Type Status (as of 2025) Notable
Dux-Soup Chrome extension Still operating, reduced features One of the oldest LinkedIn automation tools (since ~2016). Offers "Turbo" mode. Has been in a cat-and-mouse game with LinkedIn for years
PhantomBuster Cloud-based Operating Multi-platform automation. LinkedIn is a major use case. Offers "Phantoms" (pre-built automations) for scraping, connecting, messaging
LinkedHelper (1 & 2) Desktop app + cloud Operating Desktop-based to avoid browser detection. Auto-connect, auto-message, CRM features
Expandi Cloud-based Operating Positions as "safest" automation. Uses dedicated IP addresses, smart throttling. Popular for agencies
Octopus CRM Chrome extension Operating Budget option. Auto-connect, auto-endorse, auto-view, drip campaigns
Meet Alfred Cloud-based Operating Multi-channel (LinkedIn + Email + Twitter). Campaign management
Zopto Cloud-based Operating Lead generation focus. Uses dedicated LinkedIn accounts in some setups
Lempod Engagement pod Largely defunct/reduced Automated engagement pod service. LinkedIn specifically targeted this
Podawaa Engagement pod Reduced Chrome extension for pod engagement. Frequently breaks
Kennected Cloud-based Operating (rebranded) Auto-connect + messaging. Uses cloud-based browser profiles
Waalaxy Cloud-based Operating French tool, popular in Europe. Multi-channel prospecting
Salesflow Cloud-based Operating Agency-focused. Claims compliance with LinkedIn limits
Closely Cloud-based Operating Newer entrant. Multichannel outreach

Tools That Got Shut Down or Significantly Curtailed

  • Lempod — The most prominent engagement pod tool. LinkedIn specifically targeted automated pod engagement in 2021-2022, and Lempod's effectiveness dropped dramatically. The service struggled to maintain functionality.
  • LinkedHelper 1 — The original version was a Chrome extension that LinkedIn actively blocked. The team rebuilt as LinkedHelper 2, a desktop application, to evade detection.
  • Crystal Knows (partial) — Personality AI tool that scraped LinkedIn data. Had to significantly modify its approach after LinkedIn API changes.
  • Various Chrome extensions — Dozens of smaller Chrome extensions were removed from the Chrome Web Store after LinkedIn complaints or simply stopped working as LinkedIn updated its DOM structure and detection.
  • hiQ Labs — Not an automation tool per se, but a data scraping company whose legal battle with LinkedIn became the landmark case (see Section 5).

The "Safe" Automation Arms Race

Tool vendors market "safety" features:

  • Dedicated IP addresses (so multiple accounts don't share IPs)
  • Human-like delays (random intervals between actions)
  • Activity limits (respecting LinkedIn's daily/weekly limits)
  • Cloud browser profiles (avoiding detection of automation extensions)
  • Warm-up periods (gradually increasing activity on new accounts)

Despite these claims, LinkedIn's detection has become sophisticated enough that no tool is truly "safe." The risk is a question of when, not if.


3. How People Get Caught — LinkedIn's Detection Methods

Behavioral Analysis

LinkedIn monitors action patterns and flags anomalies:

  • Action velocity: Sending 50 connection requests in 30 minutes (vs. organic behavior of 5-10 sporadic requests)
  • Session patterns: Perfectly regular intervals between actions (e.g., exactly every 45 seconds) — humans are messy, bots are precise
  • Time-of-day patterns: Activity at 3 AM local time, or 18-hour continuous sessions
  • Engagement reciprocity: Accounts that only send but never receive messages/connections
  • Profile viewing patterns: Visiting 200 profiles in sequence without reading any (visit duration < 2 seconds each)
  • Message similarity: Sending near-identical messages to hundreds of people (even with merge fields, the structure is detectable)

Technical Detection

  • Browser fingerprinting: Detecting headless browsers, automation frameworks (Selenium, Puppeteer), and Chrome extensions that modify the DOM
  • Cookie/session analysis: Multiple accounts sharing the same session, or sessions that don't behave like normal browsers
  • API pattern detection: Calls to internal APIs that don't match the expected browser behavior
  • IP reputation: Flagging data center IPs, VPN exits known for automation, or multiple accounts from the same IP
  • CAPTCHA challenges: Increased frequency of CAPTCHAs and phone verification for suspicious accounts
  • Device fingerprinting: Tracking browser configurations, screen resolutions, installed fonts, WebGL hashes

Social Signals

  • Report-based detection: Users reporting spam messages or connection requests
  • Acceptance rate monitoring: If your connection request acceptance rate drops below ~20%, LinkedIn flags the account
  • Response patterns: Sending 100 messages, getting 0 replies — clear bot signal
  • Engagement timing: 30 likes on a post within 60 seconds of publishing (pod behavior)
  • Network analysis: Detecting clusters of accounts that only engage with each other (pod networks)

Machine Learning Models

LinkedIn has invested heavily in ML-based detection:

  • Fake account detection: Models trained on known fake profiles (StyleGAN-generated photos, anomalous career trajectories, thin networks)
  • Spam classifiers: NLP models that score messages for spam probability
  • Bot behavior classifiers: Models that distinguish human browsing patterns from automated ones
  • Content authenticity: Detecting AI-generated text in posts and comments (increasingly important post-ChatGPT)

4. Consequences: Bans, Lawsuits & Reputation Damage

Account Restrictions (Escalating)

LinkedIn uses a graduated enforcement system:

  1. Soft warnings: "You're approaching the weekly invitation limit" — a nudge
  2. Temporary restrictions: Connection requests blocked for 1-7 days; messaging limited
  3. Connection request withdrawal: LinkedIn forces withdrawal of pending requests
  4. SSI (Social Selling Index) penalty: Reduced algorithmic reach for posts
  5. Feature restrictions: Losing ability to send InMails, join groups, or use Sales Navigator features
  6. Temporary suspension: Account locked for 1-30 days, requires identity verification (photo ID) to restore
  7. Permanent ban: Account permanently restricted. All connections, content, and history lost. LinkedIn explicitly states they may ban accounts that use automation, and once permanently restricted, accounts are rarely restored

Legal Consequences

hiQ Labs v. LinkedIn (2017-2022):

  • hiQ scraped public LinkedIn profiles to sell "employee retention" analytics
  • LinkedIn sent a cease-and-desist in 2017 and blocked hiQ's scrapers
  • hiQ sued under various claims; case went to the Supreme Court (vacated and remanded in 2021)
  • Ninth Circuit ruled in 2022 that scraping publicly available data likely doesn't violate the CFAA
  • BUT: LinkedIn's Terms of Service still prohibit scraping, and violators can face breach-of-contract claims
  • This case did NOT legalize scraping — it narrowed the CFAA's applicability; LinkedIn can still enforce its ToS

LinkedIn v. Various Scrapers:

  • LinkedIn has sent thousands of cease-and-desist letters to scraping operations
  • Multiple settlements (amounts undisclosed) with companies operating scraping services
  • LinkedIn's User Agreement explicitly prohibits: scraping, automation, fake accounts, and unauthorized data collection

GDPR/Privacy Implications (EU):

  • Scraping LinkedIn data and using it for outreach without consent violates GDPR
  • Several EU DPAs have investigated LinkedIn-data-based marketing
  • Fines under GDPR can reach 4% of global revenue

CAN-SPAM/Anti-Spam Laws:

  • Using scraped LinkedIn emails for cold email campaigns can violate CAN-SPAM (US), CASL (Canada), and similar laws
  • LinkedIn automation that harvests emails and feeds them into email sequences creates legal exposure

Reputation Damage

  • Public shaming: Screenshots of obviously automated messages regularly go viral on LinkedIn itself, Reddit (r/LinkedInLunatics), and Twitter
  • Professional consequences: Getting caught automating can damage credibility, especially for sales professionals and recruiters
  • Company-level damage: Companies whose employees are caught mass-automating face brand damage — "that company that spams everyone on LinkedIn"

5. Notable Incidents & Scandals

The 2021 LinkedIn Data Scrape (700M+ Profiles)

  • Date: June 2021
  • What happened: A dataset of 700 million LinkedIn user records appeared for sale on a hacking forum (RaidForums). This represented approximately 93% of all LinkedIn users at the time.
  • How: The attacker exploited LinkedIn's API to enumerate and scrape user data at massive scale. The data included: full names, email addresses, phone numbers, physical addresses, geolocation records, LinkedIn usernames, profile URLs, work experience, gender, and other social media account info.
  • LinkedIn's response: LinkedIn stated "this was not a data breach" since no private data or passwords were exposed — only publicly visible profile information aggregated via API abuse. This response was widely criticized.
  • Impact: The dataset was sold for approximately $5,000. It was subsequently used for phishing campaigns, social engineering, and spam.
  • Earlier incident (April 2021): A separate scrape of 500M LinkedIn records was also sold on RaidForums. These two incidents prompted significant media coverage and regulatory scrutiny.

The 2012 LinkedIn Password Breach (Aftermath)

  • Date: Originally 2012, full extent revealed in 2016
  • What happened: 6.5 million hashed passwords were initially reported stolen. In 2016, it emerged that 117 million email-password pairs were compromised.
  • Relevance to automation: These credentials were used to power bot networks — logging into real (compromised) accounts to send spam, scrape data, and build fake connection networks.

Fake Profile Networks (Ongoing)

  • 2022 — Stanford Internet Observatory: Researchers identified over 1,000 fake LinkedIn profiles using AI-generated faces. These profiles impersonated professionals at major companies and were used for espionage, phishing, and social engineering.
  • 2022 — KrebsOnSecurity reporting: Brian Krebs documented networks of fake CISO profiles on LinkedIn, some connected to North Korean threat actors using LinkedIn for cryptocurrency theft social engineering.
  • 2023-2024 — Continued proliferation: LinkedIn acknowledged removing tens of millions of fake accounts per quarter in their transparency reports. In H1 2023 alone, LinkedIn reported blocking 86.5 million fake accounts at registration and removing 9.2 million more after creation.

Engagement Pod Crackdowns (2021-2023)

  • 2021-2022: LinkedIn began specifically targeting engagement pods. Users in large pods reported sudden drops in post reach — their content was effectively shadow-banned.
  • Lempod collapse: The largest automated pod service saw its effectiveness crater as LinkedIn identified and suppressed pod-boosted content.
  • Creator community backlash: LinkedIn influencers who had built their followings partly through pods saw dramatic engagement drops when LinkedIn adjusted its algorithm to discount pod engagement.
  • Public callouts: Several LinkedIn "top voices" were publicly called out for using pods, leading to embarrassing threads where their engagement dropped 90% overnight after pod access was cut.

The Sales Navigator Scraping Economy

  • Scale: An entire cottage industry exists around scraping Sales Navigator search results, exporting to CSV, and feeding them into automation tools.
  • LinkedIn's response: LinkedIn has progressively restricted Sales Navigator's export capabilities, added more aggressive rate limiting, and taken legal action against tools that facilitate SN scraping.
  • 2023 changes: LinkedIn significantly limited the Commercial Use Limit (CUL), restricting how many profiles free/basic users can view per month — partly to combat scraping.

AI Comment Spam Wave (2023-2025)

  • Trigger: ChatGPT's launch (Nov 2022) led to an explosion of AI-powered commenting tools
  • Tools like Taplio, AuthoredUp add-ons, and custom GPT scripts enabled automated commenting at scale
  • The "Broetry" backlash: LinkedIn's feed became flooded with AI-generated motivational posts and generic supportive comments, leading to widespread user complaints
  • 2024-2025 detection: LinkedIn began labeling suspected AI-generated content and reducing its algorithmic reach. Users reported posts flagged as "potentially AI-generated" receiving significantly less distribution.

The "LinkedIn Jail" Phenomenon (Ongoing)

  • A well-known community phenomenon where users suddenly find their accounts restricted
  • Common triggers:
    • Sending too many connection requests (>100/week is risky)
    • Low acceptance rate on connection requests (<20%)
    • Too many "I don't know this person" reports
    • Sudden spikes in activity after dormant periods
    • Using automation tools detected by LinkedIn
  • Recovery: Ranges from a few days (mild restriction) to permanent (repeat offenders). LinkedIn often requires government ID verification for restoration.
  • Reddit documentation: r/linkedin and r/sales have extensive threads documenting "LinkedIn jail" experiences, with users sharing screenshots of restriction notices and discussing workarounds.

6. LinkedIn's Countermeasures

Technical Measures

Measure Description Introduced/Updated
Rate limiting Strict limits on connection requests (~100/week), messages, profile views, and searches Progressively tightened 2020-2025
CAPTCHA gates Phone number verification and image CAPTCHAs triggered by suspicious behavior Ongoing
Browser fingerprinting Detection of headless browsers, Selenium, Puppeteer, and automation extensions Ongoing, increasingly sophisticated
API throttling Aggressive rate limiting on internal APIs, blocking known scraper user-agents Major update 2021 post-scrape
DOM obfuscation Randomizing CSS class names to break scraper selectors Periodic updates
Session analysis Detecting impossible browsing patterns (e.g., viewing profile in 0.5 seconds, then immediately viewing next) Ongoing
AI content detection ML models to identify AI-generated posts and comments Rolled out 2024
Commercial Use Limit Restricting profile views for non-premium users to limit scraping ROI Tightened 2023
Email verification Requiring email verification for new accounts and suspicious login patterns Ongoing

Policy Measures

  • Terms of Service updates: LinkedIn regularly updates its ToS to explicitly prohibit new forms of automation as they emerge
  • Transparency reports: Quarterly reports on fake account removal (tens of millions per quarter)
  • Professional Community Policies: Explicit rules against fake engagement, spam, and automation
  • Cease-and-desist program: Active legal team sending C&D letters to automation tool operators

Algorithmic Measures

  • Pod detection: Suppressing content that receives suspicious engagement patterns (too fast, from accounts that always engage together)
  • Spam scoring: Reducing distribution of posts/messages that score high on spam classifiers
  • Account quality signals: Factoring account "health" (acceptance rate, report rate, engagement authenticity) into content distribution
  • New account throttling: Limiting what new accounts can do in their first 1-4 weeks

The Scale of the Problem

LinkedIn's own numbers (from transparency reports):

  • H1 2023: 86.5M fake accounts stopped at registration, 9.2M removed after creation
  • H2 2023: Numbers remained in similar ranges
  • 2024: LinkedIn reported investing significantly more in AI-powered detection, claiming to block 99.6% of spam and fake accounts before they reach users

7. Community Horror Stories

Common Reddit/Community Reports

From r/linkedin, r/sales, r/LinkedInLunatics:

  • "Used Dux-Soup for 3 months, woke up to permanent ban": Multiple users report that LinkedIn bans came with no warning — just a login screen asking for ID verification, followed by a permanent restriction notice. Years of connections, recommendations, and content gone.

  • "My agency used automation for clients, 15 accounts banned in one week": Marketing agencies that run automation for multiple clients are particularly vulnerable. LinkedIn appears to detect patterns across accounts managed from the same infrastructure.

  • "Got restricted for using my own Chrome extension": Developers report that even personal-use automation (like a script to export their own connections) triggered restrictions.

  • "Connection request jail for 6 months": Users report being unable to send ANY connection requests for months after exceeding limits, even after the formal restriction period ends.

  • "Lost my Premium subscription AND got banned": LinkedIn restricts accounts regardless of payment status. Users have reported losing Premium or Sales Navigator subscriptions mid-billing-cycle due to automation detection, with no refund.

  • "Sent 200 identical InMails, account flagged as spam": Even using LinkedIn's own InMail feature (which you pay for), sending templated messages at volume triggers spam detection.

The "I Didn't Even Use Automation" Problem

Multiple users report being falsely flagged:

  • Recruiters who legitimately send many connection requests getting restricted
  • Sales professionals who manually message many new connections getting rate-limited
  • Job seekers who apply to 50+ jobs in a day getting temporarily restricted

This suggests LinkedIn's detection casts a wide net, catching some legitimate heavy users alongside actual bots.


8. The Current State (2025)

What Still Works (With Risk)

  • Cloud-based tools with dedicated IPs (Expandi, Waalaxy) still function but with increasingly tight limits
  • Manual + semi-automated hybrid approaches (using tools for targeting but manually sending) are harder to detect
  • LinkedIn's own tools (Sales Navigator, Campaign Manager) for legitimate outreach remain the "safest" option
  • Content scheduling tools (Hootsuite, Buffer, Taplio) are generally tolerated as long as they use official APIs

What's Increasingly Risky

  • Chrome extension-based automation — LinkedIn's detection of DOM manipulation has improved significantly
  • Engagement pods — Algorithmic suppression makes them counterproductive
  • AI-generated comments at scale — Detection is improving rapidly
  • Cold outreach automation — Acceptance rates have dropped industry-wide as users become more selective

The Fundamental Tension

LinkedIn exists in a contradictory position:

  • Its business model depends on engagement and connections (more activity = more data = better ads)
  • But automated activity degrades the user experience, driving away the premium users who pay for subscriptions
  • LinkedIn's response has been to channel automation into its own paid products (Sales Navigator, Campaign Manager, LinkedIn Ads) while cracking down on third-party automation
  • This creates a two-tier system: you can automate, but only if you pay LinkedIn to do it through their platforms

Recommendations for Legitimate Users

  1. Don't use automation tools — the risk/reward ratio has shifted dramatically against automation
  2. If you must automate, use LinkedIn's own tools — Sales Navigator + Campaign Manager give you scale within LinkedIn's rules
  3. Focus on content — LinkedIn's algorithm rewards genuine content creation far more than automated outreach
  4. Manual personalization beats templated volume — 10 genuinely personalized messages outperform 100 automated ones
  5. Protect your account — A LinkedIn account with years of connections and content is genuinely valuable. The cost of losing it far exceeds any short-term gain from automation.

Sources & Further Reading

  • hiQ Labs, Inc. v. LinkedIn Corp., No. 17-16783 (9th Cir. 2022)
  • LinkedIn Transparency Reports (published quarterly at about.linkedin.com)
  • Brian Krebs, "LinkedIn's Fake Profile Problem" (KrebsOnSecurity, 2022)
  • Stanford Internet Observatory, "AI-Generated LinkedIn Profiles" (2022)
  • Various Reddit communities: r/linkedin, r/sales, r/LinkedInLunatics, r/socialmedia
  • LinkedIn Professional Community Policies and User Agreement
  • Troy Hunt, "The LinkedIn Data Scrape" (HaveIBeenPwned blog, 2021)
  • Various news coverage: The Verge, TechCrunch, Wired, BBC

This report is compiled from publicly available information through mid-2025. The automation/detection landscape evolves rapidly — tools and countermeasures described here may have changed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment