Back to skill
Skillv1.0.1

ClawScan security

Threads Skills · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousApr 17, 2026, 6:20 AM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The SKILL.md's instructions match a Threads automation tool, but the bundle contains no code and the runtime steps ask the agent to control your browser, delete cookies, and read/write local config files — behaviors that warrant caution before installing.
Guidance
This package is instruction-only: it does not include the scripts it tells you to run. Before using/installing: - Review the upstream GitHub repository (homepage) and inspect the referenced scripts (scripts/cli.py, chrome_launcher.py, reply_assistant.py, filter-comment.py) — do not run unknown scripts. - Be aware these tools control Chrome via CDP and can access your logged-in sessions, cookies, and browser state. If you proceed, run them in an isolated browser profile or VM and back up important cookies/profile data first. - The skill will delete cookies (delete-cookies) and write/read files under your home directory (~/.threads*). Confirm where state and credentials are stored and whether API keys or tokens might be written in plaintext. - Understand what the 'uv' binary is on your system (examples use 'uv run ...') and only install it from a trusted source. On macOS the skill suggests installing tkinter via Homebrew; only install packages you trust. - If you need the automation, clone the GitHub repo and audit scripts for network calls, credential handling, and file I/O before granting any API keys or running commands. Given the missing code and the sensitivity of browser/session operations, proceed only after manual review and with isolation (separate profile/VM) — do not blindly grant this skill access to your primary browser profile or secrets.

Review Dimensions

Purpose & Capability
noteThe name/description (Threads automation) align with the runtime commands (Chrome CDP, posting, liking, searching). However the skill bundle contains no code files; the instructions expect local scripts (scripts/cli.py, chrome_launcher.py, etc.) that are not provided in the package. The declared required binaries (python3, uv) correspond to examples, but 'uv' is uncommon and not explained.
Instruction Scope
concernThe instructions direct the agent to launch Chrome's debug port and run local scripts that will interact with the browser, delete cookies (delete-cookies), manage account data, and read/write files under the home directory (e.g., ~/.threads/replied_posts.json, ~/.threads-filter-comment.json, and temporary JSON files). They also reference optional AI API credentials (api_url / api_key / model) for the filter step. These actions can expose or modify browser session data and local files; while coherent with an automation tool, they are sensitive operations and the skill gives broad discretion to run arbitrary local scripts.
Install Mechanism
noteThere is no install spec in the bundle (instruction-only), so nothing is written by the skill itself — lowest install risk. However the README instructs installing tkinter on macOS via 'brew install python-tk' and using a mysterious 'uv' binary to run scripts; these external dependencies and the missing code repository must be obtained separately (homepage points to a GitHub repo).
Credentials
concernThe skill declares no required environment variables, yet the instructions reference optional AI credentials (api_url/api_key) and persistent local config files that may store secrets. The skill will read and write files under the user home (config and replied-posts cache) and may interact with browser cookies and sessions — operations that are sensitive but not explicitly surfaced as required credentials in the registry metadata.
Persistence & Privilege
notealways:false (good). The skill expects to persist state locally (e.g., ~/.threads/replied_posts.json and ~/.threads-filter-comment.json) and will control a running Chrome instance via CDP. Autonomous invocation is allowed (default) — combined with browser control this increases possible impact, but autonomous invocation alone is the platform default and not a standalone flag.