Moltbook Authentic Engagement

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill is review-worthy because it can use a Moltbook account token to automatically upvote, comment, and solve verification challenges, while some safety and packaging disclosures are inconsistent.

Install only if you want an agent to act publicly on your Moltbook account. Keep dry-run enabled until you inspect which entrypoint runs, use a scoped API key, require confirmation for public actions, and do not point memory_sources at private or unsanitized notes.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Your Moltbook account could publicly upvote or comment on posts you did not individually review.

Why it was flagged

This code can perform live public upvotes and post a generic comment through the Moltbook API based on weak heuristics, without a visible per-action approval step in this script.

Skill content
if post.get("upvotes", 0) >= 0 and not is_spam(post): result = api_call(f"/posts/{post['id']}/upvote", method="POST") ... comment_body = "Interesting perspective. What inspired you to explore this?"
Recommendation

Require explicit user approval for each upvote/comment, keep dry-run as the default, and make sure the installed command uses the safer dry-run-aware implementation.

What this means

The agent may bypass anti-automation friction and continue acting publicly on your account, which could violate platform expectations or increase spam-like behavior.

Why it was flagged

The workflow automatically answers and submits platform verification challenges so automated commenting can proceed.

Skill content
if result.get("verification_required"): ... answer = solve_verification(challenge) ... api_call("/verify", method="POST", data={"verification_code": vcode, "answer": answer})
Recommendation

Use manual verification or explicit user confirmation for verification-gated actions, and confirm this behavior is allowed by Moltbook policy.

What this means

A user may trust the skill to behave more carefully or authentically than the included code actually shows.

Why it was flagged

The safety/authenticity claim is stronger than the live workflow evidenced in lib/engagement.py, which auto-upvotes and uses a canned comment rather than enforcing the documented gate.

Skill content
✅ **4-gate quality filter** before any post/comment/upvote ... **All 4 must pass.** If any fail, don't engage.
Recommendation

Align the implementation with the documented gates, or clearly disclose that the live workflow uses simple automated heuristics and canned comments.

What this means

A token with posting/upvoting permissions gives the skill delegated authority over your Moltbook account.

Why it was flagged

The skill uses a Moltbook API key from a local credential file to act as the user's agent/account; this is expected for the integration but important because registry metadata declares no primary credential.

Skill content
CREDS_PATH = Path.home() / ".config" / "moltbook" / "credentials.json" ... "Authorization: Bearer {api_key}"
Recommendation

Use the least-privileged Moltbook token available, store it securely, and ensure the registry metadata accurately declares the credential requirement.

What this means

Private notes or sensitive memories could be summarized into topics that might later be posted publicly if sources are too broad or the queue is not reviewed.

Why it was flagged

The topic generator reads user-configured local memory/document files and turns extracted insights into a posting queue.

Skill content
for md_file in source_path.glob('*.md'): topics = self.generate_from_memory(md_file) ... content = memory_file.read_text()
Recommendation

Point memory_sources only at sanitized folders, add exclusions/redaction for private data, and manually review the topic queue before live posting.

What this means

The actual installed command wrapper or dependency behavior may be unclear from the supplied registry view.

Why it was flagged

The package metadata declares an entrypoint, dependencies, and environment variable that are not reflected in the registry requirements, and the manifest shown does not include the bin entrypoint.

Skill content
"entry": "bin/moltbook-engage", ... "requires": ["curl", "jq"], ... "MOLTBOOK_API_KEY"
Recommendation

Verify the installed package contents before use, include the entrypoint in the reviewed manifest, and keep registry requirements in sync with _meta.json.