Mia Twitter Stealth

MaliciousAudited by ClawScan on May 10, 2026.

Overview

This skill is designed to automate Twitter/X account actions while hiding from bot detection and using raw account session tokens.

Do not install this skill for a real X/Twitter account. It is explicitly built to hide automation from bot-detection systems, asks for raw account tokens, and references unreviewed external tooling.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Using it could put the user's X/Twitter account at risk of restriction or ban and may enable spam-like or abusive activity.

Why it was flagged

The skill's stated goal is to evade a platform's bot-detection controls rather than simply automate a disclosed user workflow.

Skill content
Twitter/X automation with advanced stealth techniques to avoid bot detection.
Recommendation

Do not use skills that advertise evading platform detection; prefer official APIs and automation that complies with the service's rules.

What this means

The agent could create posts, replies, likes, and follows from the user's account, potentially harming reputation or violating platform rules.

Why it was flagged

These examples authorize public account actions and multi-target liking/following, which are high-impact social-media mutations when paired with stealth automation.

Skill content
mia-twitter post "Hello world"

mia-twitter reply <tweet-id> "Great post!"

mia-twitter like --search "AI agents" --limit 10

mia-twitter follow --search "founder" --limit 5
Recommendation

Avoid installing unless every account action is explicitly user-approved, rate-limited by enforceable code, and compliant with the platform's automation policies.

What this means

Providing these values may grant broad control over the user's X/Twitter account to an unreviewed automation flow.

Why it was flagged

The skill requires raw X/Twitter session or auth values, but the registry metadata declares no credentials or required environment variables.

Skill content
- X_AUTH_TOKEN env var
- X_CT0 env var
Recommendation

Do not provide raw session tokens to this skill; use narrowly scoped, revocable OAuth credentials only with reviewed code and clear handling rules.

What this means

A logged-in automation session may persist beyond a single task and continue to support stealthy account activity.

Why it was flagged

Persistent browser/session storage combined with automatic backoff when flagged is designed to keep automated account activity viable after detection signals.

Skill content
Session Persistence
- Cookie storage
- LocalStorage persistence
- User data directory

Cooldown Management
- Rate limit tracking
- Automatic backoff
- 24h cooldown if flagged
Recommendation

Reject or remove persistence-based stealth automation unless storage paths, cleanup, and user-controlled session revocation are clearly implemented and reviewed.

What this means

The actual command implementation is unknown, so users cannot verify what code would receive their tokens or control their account.

Why it was flagged

The artifact provides no reviewed implementation or installation source even though SKILL.md tells users to run a `mia-twitter` command with account credentials.

Skill content
No install spec — this is an instruction-only skill.
Recommendation

Do not run an unreviewed external CLI for account automation; require source code, pinned dependencies, and a transparent install path before use.