Skill flagged โ€” suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Ganidhuz-FoxX

v1.0.0

๐ŸฆŠ Ganidhuz-FoxX (Firefox + X combined lol). Browse X/Twitter using a real logged-in Firefox session via cookie injection. Supports profile viewing, tweet fe...

โญ 1ยท 219ยท1 currentยท1 all-time
byGanidhu Kandepola@ganidhuz
MIT-0
Download zip
LicenseMIT-0 ยท Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report โ†’
OpenClawOpenClaw
Benign
high confidence
โœ“
Purpose & Capability
The name/description (browse X/Twitter via Firefox with cookie injection) aligns with the included scripts: a cookie exporter (reads Firefox's cookies.sqlite), a Playwright controller for Firefox, and a small environment check script. There are no unrelated credentials, external APIs, or surprising binaries requested.
โ„น
Instruction Scope
The SKILL.md explicitly instructs the agent to extract cookies from the user's Firefox profile, kill Firefox (pkill -f firefox) before copying the DB, and run Playwright to drive Firefox. Those actions are necessary for the stated approach but are intrusive and access highly sensitive local data (session cookies). The instructions do not send cookies to remote endpoints; they store them locally.
โœ“
Install Mechanism
No install spec is provided (instruction-only). Playwright is required per README (pip install + playwright install firefox) but nothing is downloaded by the skill itself. All code is local and readable.
โ„น
Credentials
The skill requests no declared environment variables, but the scripts will read the user's Firefox profile and cookies.sqlite (auto-detection includes snap and ~/.mozilla paths) and accept optional env vars (FIREFOX_PROFILE_PATH, FOXX_COOKIES_OUT). Accessing browser cookies is proportional to the feature but is high sensitivity and should be justified by the user before use.
โ„น
Persistence & Privilege
The skill does not request always:true or system-wide privileges, but it does create local files (default ./secrets/x-cookies.json and validation screenshots) and will kill Firefox if running. Persisting session cookies on disk is risky (they can be reused to impersonate your session) and the skill may create profile directories or files if defaults are used.
Assessment
This skill is coherent with its goal but requires strong caution: it reads your Firefox profile and exports live X/Twitter session cookies to disk, and it may terminate Firefox to copy the cookie DB. Only run it on a machine you fully control (not shared or CI), inspect the scripts yourself, and install Playwright in an isolated environment. After use, securely delete the exported cookie file (default ./secrets/x-cookies.json) and any screenshots or storage_state files. Consider creating a dedicated, disposable Firefox profile for this purpose and avoid running the export on a profile containing other important accounts. If you are uncomfortable with local cookie extraction or pkill behavior, do not install/use this skill.

Like a lobster shell, security has layers โ€” review code before you run it.

latestvk97a53rzqw2gtf7kdxktefhw6h82kq2m

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments