Ganidhuz-FoxX

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill is visibly built for X/Twitter browsing, but it exports real Firefox session cookies and gives open-ended logged-in browser control that should be reviewed before use.

Only install this if you intentionally want OpenClaw to use your logged-in X/Twitter session. Prefer a separate Firefox profile and X account, inspect plans before execution, avoid mutating click/fill/type steps unless you explicitly requested them, and delete or tightly protect exported cookie and storage-state files after use.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

This can expose browser session material and gives the skill reusable access to the user's logged-in X/Twitter session; the temporary database copy may contain more than just X/Twitter cookies.

Why it was flagged

The script accesses Firefox's local session-cookie store, copies the entire cookie database to a predictable /tmp file, and then filters X/Twitter cookies for export.

Skill content
DB="$PROFILE_PATH/cookies.sqlite"
TMP_DB="/tmp/foxx-cookies-copy.sqlite"
...
cp "$DB" "$TMP_DB"
...
WHERE host LIKE '%twitter%' OR host LIKE '%x.com%'
Recommendation

Use a dedicated Firefox profile and preferably a dedicated X account, protect and delete secrets/x-cookies.json and /tmp/foxx-cookies-copy.sqlite after use, and do not run this on a profile containing sensitive unrelated sessions.

What this means

A plan could do more than fetch tweets: it could potentially post, like, follow, message, or change account settings as the logged-in user if such steps are provided.

Why it was flagged

After injecting session cookies, a plan can navigate to arbitrary URLs and perform interactive browser actions without a built-in read-only mode, domain restriction, or approval check for mutating actions.

Skill content
initial_url = plan.get("url", "about:blank")
...
context.add_cookies(cookie_data.get("cookies", []))
...
if action == "click" ... if action == "fill" ... if action == "type" ... if action == "press"
Recommendation

Review every plan before running it, restrict use to x.com/twitter.com, and require explicit human approval for any click, fill, type, or press step that could change account state or publish content.

What this means

Running the export step can unexpectedly close active Firefox windows, interrupt work, or lose unsaved form/tab state.

Why it was flagged

The cookie export script terminates Firefox processes automatically; the documentation says to close Firefox first, but the script does not prompt before killing it.

Skill content
pkill -f firefox 2>/dev/null && sleep 2 || true
Recommendation

Close Firefox manually before running the script, or modify the script to prompt before killing processes.

What this means

The user will fetch and run third-party code/browser binaries during setup.

Why it was flagged

The setup uses manual, unpinned installation of a Python package and browser components; this is purpose-aligned but depends on current upstream package sources.

Skill content
Playwright: `pip install playwright && playwright install firefox`
Recommendation

Install in a virtual environment, pin or verify package versions where possible, and avoid running setup in a sensitive production environment.

What this means

A user may treat this as a low-risk API substitute even though it grants logged-in session authority.

Why it was flagged

The description frames real-session cookie automation as a way around bot blocks, which may understate the account/session risk of handing browser cookies to automation.

Skill content
Browse X/Twitter using a real logged-in Firefox session via cookie injection... no API key, no bot blocks.
Recommendation

Treat the skill as full logged-in account automation and confirm that its use fits your security expectations and platform/account rules.