Twitter API Integration (Web Reversed )

PassAudited by VirusTotal on May 12, 2026.

Findings (1)

The skill bundle is classified as suspicious due to critical vulnerabilities and high-risk capabilities. The most severe issue is the presence of hardcoded Twitter `AUTH_TOKEN` and `CT0` credentials in `twitter_api/demo_langchain_tools.py`, which represents a significant information leak. Additionally, `twitter_api/config/settings.py` contains a hardcoded proxy URL with credentials. While these are vulnerabilities (leaking the skill's own credentials) rather than direct malicious attacks against the user's system, they are severe security flaws. Furthermore, the `ProfileAPI` and `SubscriptionAPI` expose highly sensitive actions like `change_password`, `delete_phone`, and `create_subscription` (with `payment_method_id`), which, if misused by an AI agent (e.g., via prompt injection), could lead to account compromise or financial loss. A minor issue is the hardcoded local path `C:\Users\IFLW016\Desktop\GanClaw_Workspace\_shared\social_ops` in `scripts/analyze_signal.py`, which affects portability.