Back to skill
Skillv1.4.1

VirusTotal security

twit-mcp · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 30, 2026, 4:26 AM
Hash
65d1bf904bfbe2eb9f38260a13d804f5b029a39a93446354e1d65200878e39a1
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: twit-mcp Version: 1.4.1 The twit-mcp skill bundle provides Twitter integration via a micropayment service (x402). It requires a WALLET_PRIVATE_KEY for payments and uses Playwright in src/index.ts to extract Twitter session cookies (auth_token and ct0) after a user logs in via a controlled browser instance. These sensitive credentials are saved locally to ~/.twit-mcp-credentials.json (managed in src/auth.ts) and are subsequently transmitted to a third-party endpoint (https://x402.twit.sh) to perform account actions like posting or liking tweets. While this behavior is documented as the method to avoid official API keys, the transmission of raw session cookies to an external service grants that service full control over the user's Twitter account, representing a high security risk.
External report
View on VirusTotal