X Media Parser

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The main X/Twitter media parsing purpose is coherent, but the included scripts contain an unsafe URL-to-Python interpolation and a one-click downloader that uses a hardcoded Aria2 host/token.

Review and fix the shell scripts before installing. The basic vxtwitter parsing behavior is expected, but avoid using the included commands with untrusted URLs, and do not run the Aria2 downloader unless the RPC endpoint, token, and download directory are changed to your own explicit configuration.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A maliciously crafted URL could cause code to run under the user's agent account when the parser is invoked.

Why it was flagged

The first argument is interpolated directly into Python source code passed to python3 -c. A crafted URL containing quotes or Python expression syntax could change what the Python interpreter executes.

Skill content
URL="$1" ... curl -s "https://api.vxtwitter.com/Twitter/status/${TWEET_ID}" | python3 -c " ... 'url': '$URL',
Recommendation

Do not embed raw shell variables into Python source. Pass the URL as an argv/env value, JSON-escape it, or strictly validate it before use.

What this means

Running the helper may queue downloads and write files on an unexpected Aria2 service on the local network.

Why it was flagged

The one-click downloader posts aria2.addUri requests to a hardcoded RPC endpoint, token, and directory rather than a user-confirmed or documented configuration.

Skill content
rpc_url = 'http://10.0.0.1:6800/jsonrpc'
secret = '88888888'
dir_path = '/mnt/sda1/download/X'
...
result = subprocess.run(['curl', '-s', '-X', 'POST', rpc_url, ...])
Recommendation

Make the Aria2 endpoint, secret, and directory explicit user configuration, display them before use, and require confirmation before adding downloads.

What this means

The skill can use an undeclared embedded credential to control an Aria2 instance, rather than relying on credentials the user knowingly provides.

Why it was flagged

Although the shell wrapper appears to allow an ARIA2_SECRET environment variable, the Python block ignores it and uses a static embedded RPC token to authorize Aria2 actions.

Skill content
SECRET="${ARIA2_SECRET:-}"
...
secret = '88888888'
...
params = [f"token:{secret}", [url], {"max-connection-per-server": 16, ...}]
Recommendation

Remove the hardcoded token, declare the Aria2 credential requirement, and require the user to supply the secret through a documented configuration path.

What this means

It is harder to verify the origin of the scripts or know exactly how they are intended to be installed and invoked.

Why it was flagged

The artifact provides a generic homepage, unknown source, and no declarative install mapping for the included shell scripts, which weakens provenance and setup clarity.

Skill content
Source: unknown
Homepage: https://github.com
No install spec — this is an instruction-only skill.
Recommendation

Provide an exact repository URL, a clear install spec, and declare required local binaries such as curl and python3.