Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Auto Tweet Publish

v1.0.0

Post, search, like, retweet, bookmark, and manage a Twitter/X account via a local twikit-based API server on port 19816. Use when the user asks to tweet, sea...

0· 75·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description match the actual code and SKILL.md: a local FastAPI server that uses the open-source twikit library to control an X account. Credentials are stored in a local config.json (username/password/cookies), which is coherent with the stated design.
Instruction Scope
Instructions stay within the declared purpose (start the local server, curl localhost endpoints). They do instruct the user to store username/password and optional TOTP in config.json and to save cookies.json locally — this is necessary for login but is a local sensitive-data handling decision the user should be aware of.
Install Mechanism
This is an instruction-only skill with bundled Python source and a requirements.txt for pip dependencies (twikit, fastapi, uvicorn, pydantic). There is no install spec that writes arbitrary binaries. One minor inconsistency: curl_httpx_shim.py imports curl_cffi but curl_cffi is not listed in requirements.txt; the shim is optional (main.py falls back to httpx) so this appears to be an implementation detail rather than malicious behavior.
Credentials
The skill requests no environment variables or external cloud credentials. It requires local credentials (username/password in config.json) which is proportionate to the ability to log into and operate an X account. No unrelated tokens or secrets are requested.
Persistence & Privilege
The skill does not force installation (always:false), does not modify other skills or system-wide configs, and keeps cookies/credentials in its own directory. It runs as a local server bound to 127.0.0.1 per SKILL.md/main.py.
Assessment
This skill appears to implement exactly what it claims — a local, auditable twikit-based controller for an X account — but if you plan to install/run it please consider the following before proceeding: - Credentials: The program expects a config.json containing your username, password (and optionally TOTP secret). Those are stored on disk in the skill directory; ensure file permissions are tight (owner-only) and avoid storing high-value or primary-account credentials if you are unsure. - Cookies: Cookies are saved locally (cookies.json). Protect that file similarly because it can grant session access. - Review code & dependencies: The code is included, so inspect it or run it in a sandbox/container. Verify third-party packages (twikit, fastapi, uvicorn, pydantic). Note the curl_cffi-based shim (curl_httpx_shim.py) uses TLS impersonation to avoid Cloudflare 403; this is consistent with its goal but is a network-layer workaround — if you have policies against TLS impersonation libraries, review or omit the shim. - Least privilege: Run the server as a non-privileged user and avoid running as root. Bind to localhost only (the code already does), and consider firewall rules if needed. - Operational caution: Rate limiting is implemented, but still double-check scheduled/automated actions before enabling to avoid accidental posting from a compromised environment. If you are not comfortable storing credentials on disk or cannot review the code, consider using a vetted, official client or running this in an isolated environment. Otherwise the skill is internally coherent and behaves as described.

Like a lobster shell, security has layers — review code before you run it.

latestvk971hdwapy8xx41wravgt0thqx83cmq9

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🐦 Clawdis
OSmacOS · Linux

Comments