Falcon
Analysis
Falcon is coherent for a Twitter/X integration, but it deserves review because write actions use a full Twitter auth cookie and can perform public account actions through a third-party API without a technical confirmation gate.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
cmd_tweet() { ... require_cookie ... api_post "/twitter/tweets/create" "$json" }Once the write command is invoked, the script sends the post request directly; the artifact does not show an interactive confirmation inside the tool.
"Bash(/home/user/Documents/Falcon/falcon:*)"
The included local settings file broadly allowlists any Falcon CLI invocation, which would cover both read and write subcommands if those permissions are honored.
Source: unknown; Homepage: none
The artifact provenance is limited, which matters more because the skill can handle a Twitter/X session cookie.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
TWITTER_COOKIE env var: Twitter auth cookie (required for write/engagement commands)
A Twitter auth cookie is a high-impact session credential that can authorize account actions, and it is needed for the skill's write and engagement features.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
BASE_URL="https://api.twexapi.io" ... --arg cookie "$TWITTER_COOKIE" ... '{tweet_content: $text, cookie: $cookie}' ... api_post "/twitter/tweets/create"The script places the Twitter auth cookie into a JSON request body sent to the external TwexAPI service for write actions.
