Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Bird Chrome

v1.0.0

Use bird with Chrome cookies to read, search, and carefully post on X/Twitter.

1· 80·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill claims to use the 'bird' CLI with Chrome cookies to read/search/post on X; requiring the 'bird' binary and offering brew/npm install options matches that purpose. Minor mismatch: SKILL.md says macOS/Chrome but registry has no OS restriction. The core capability (reading Chrome cookies) is expected for this functionality but is a sensitive capability that the registry metadata does not explicitly declare (no config paths or credentials listed).
!
Instruction Scope
Runtime instructions explicitly direct the agent to read Chrome cookies (via bird's --cookie-source flags) and to control the host browser through the OpenClaw Browser Gateway (including a sandbox config snippet to allow host browser control and use target="host"). Those are necessary for posting as the user, but they substantially broaden what the agent can access and control; the SKILL.md does not limit or document how cookies/host control are obtained/approved beyond 'Default' profile assumptions.
Install Mechanism
Install options are brew (steipete/tap/bird) and npm (@steipete/bird). These are standard package registries (Homebrew tap and npm) rather than arbitrary URLs, which is better than a direct download, but they are third‑party sources and will install a binary onto disk — inspect the packages before installing and prefer official project releases or vetted sources.
!
Credentials
The skill requires no declared env vars or config paths, yet the instructions rely on accessing Chrome cookie stores and browser profiles (sensitive credential-equivalent data). This mismatch (sensitive access not reflected in declared requirements) reduces transparency and is a red flag: the skill will need access to data equivalent to authentication tokens but doesn't advertise that requirement in metadata.
Persistence & Privilege
The skill is not always-enabled and can be user-invoked (normal). However, it recommends changing sandbox defaults to permit host browser control for the session — that raises the agent's runtime privileges. This is necessary for the stated posting workflow but increases the blast radius while the permission is enabled.
What to consider before installing
Before installing or enabling this skill: 1) Understand that it uses your Chrome cookies (browser cookie store) to act as you on X — this is equivalent to giving the tool account access. 2) The SKILL.md asks you to allow the agent to control your host browser (sandbox host control); only do this when you explicitly intend to post and you trust the skill. 3) Inspect the 'bird' binary source: check the Homebrew tap and the npm package (@steipete/bird) for their upstream repository, reviews, and release signatures before installing. 4) Prefer read-only operations (search/read/thread) and avoid granting persistent or broad host permissions. 5) If you want to be extra cautious, install and audit the 'bird' binary yourself, verify what it reads (which profile paths), and only provide the specific Chrome profile path when necessary. 6) The registry metadata does not declare the cookie/config access this skill needs — treat that omission as a transparency issue and ask the publisher for clarification or a formal privacy/security description before proceeding.

Like a lobster shell, security has layers — review code before you run it.

latestvk978t3cq6dmddtq4123x7y0yqx83c5fe

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🐦 Clawdis
Binsbird

Install

Install bird (brew)
Bins: bird
brew install steipete/tap/bird
Install bird (npm)
Bins: bird
npm i -g @steipete/bird

Comments