Mia Twitter Stealth
Analysis
This skill is designed to automate an X/Twitter account while hiding automation and using account tokens, which is risky and needs careful review.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Twitter/X automation with advanced stealth techniques to avoid bot detection. ... Hides `navigator.webdriver` ... Masks Chrome automation flags ... Spoofs plugins and languages
The skill explicitly instructs automation that disguises itself from platform bot detection, which is deceptive behavior and can lead users to trust or deploy account automation that may be unsafe or policy-violating.
mia-twitter post "Hello world" ... mia-twitter reply <tweet-id> ... mia-twitter like --search "AI agents" --limit 10 ... mia-twitter follow --search "founder" --limit 5
The documented commands can mutate a public social account by posting, replying, liking, and following, including search-driven bulk actions, with no described approval gate or preview requirement for each public action.
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill; No code files present
The SKILL.md references running a mia-twitter CLI with Playwright/Chromium and account credentials, but the reviewed artifacts provide no source, installer, pinned dependencies, or implementation to inspect.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Requirements - X_AUTH_TOKEN env var - X_CT0 env var
These are X/Twitter session credentials that can authorize account activity; the artifacts do not bound how they are used, protected, rotated, or limited, and the registry metadata declares no required credential.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Session Persistence - Cookie storage - LocalStorage persistence - User data directory
The skill plans to persist browser session data, including cookies and local storage, but gives no path, retention, encryption, cleanup, or reuse boundaries.
