BNBot

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

BNBot appears to automate Twitter/X as advertised, but it gives an agent broad power to act through your logged-in browser account with limited documented approval and boundary controls.

Install only if you are comfortable letting this npm package and Chrome extension act through your X/Twitter browser session. Verify the actual binary being run, use a separate browser profile or test account when possible, require manual confirmation before any public or destructive action, and run the background daemon only while you need it.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent mistake or unsafe prompt could publicly post, engage with accounts, follow/unfollow users, publish articles, or delete content from the user's account.

Why it was flagged

These commands can publish, engage, follow/unfollow, and delete using the user's account, but the skill does not require an explicit confirmation step for these high-impact actions.

Skill content
`bnbot post-tweet --text "..."` ... `bnbot follow-user [--username <handle>]` ... `bnbot delete-tweet [--tweetUrl <url>]` ... `bnbot publish-article [--publish]`
Recommendation

Require explicit user approval before any posting, deletion, follow, retweet, reply, or publish command; prefer draft-only modes where available.

What this means

Installing and connecting it can let the agent act with the same privileges as the logged-in X account.

Why it was flagged

The skill uses the user's logged-in Chrome/X session rather than a clearly scoped API credential; the artifacts do not define per-command permission boundaries for that account access.

Skill content
BNBot operates through a real browser session via Chrome Extension ... Open https://x.com in Chrome ... turn on **OpenClaw**
Recommendation

Use only with an account/browser profile you are willing to delegate, review the extension permissions, and disconnect or log out when finished.

What this means

The agent could fail or invoke an unintended local `bnbot` command if the installed package does not provide the same binary name.

Why it was flagged

The declared/verified binary is bnbot-cli, but the instructions run bnbot. That creates command provenance ambiguity for a tool that can control a social account.

Skill content
requires: bins: [bnbot-cli] ... bins: [bnbot-cli] ... All tools are executed via the `bnbot` CLI
Recommendation

The package should align its declared and executed binary names; users should verify `which bnbot`/`bnbot --version` and trust the npm package and Chrome extension publisher before connecting an account.

What this means

If the local bridge is exposed or weakly authenticated, other local software or browser contexts might be able to interact with a channel that controls account actions or returns scraped account data.

Why it was flagged

The CLI/agent communicates with the Chrome extension through a local WebSocket service, but the artifacts do not document authentication, origin checks, localhost binding, or data boundaries.

Skill content
start the WebSocket daemon: `nohup bnbot serve > /tmp/bnbot.log 2>&1 &` ... `lsof -i :18900` ... turn on **OpenClaw**
Recommendation

Run it only on trusted machines, confirm the daemon binds only to localhost and uses access controls, and stop it when not actively using the skill.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

The account-control bridge may remain running after the intended task and continue logging to /tmp.

Why it was flagged

The background daemon is disclosed and purpose-aligned, but it persists after setup and no stop/lifecycle guidance is provided.

Skill content
`nohup bnbot serve > /tmp/bnbot.log 2>&1 &` ... `If empty, restart it`
Recommendation

Start the daemon only when needed, learn how to terminate it, and remove logs if they may contain sensitive output.

What this means

Users may overtrust the automation and underestimate reputation, moderation, or account-enforcement consequences.

Why it was flagged

The safety and ban-avoidance wording is not backed by documented safeguards in the artifacts and may lead users to underestimate account or platform-policy risk.

Skill content
description: The safest and most efficient way to automate Twitter/X ... Grow your Twitter without API bans.
Recommendation

Treat these as marketing claims, review X/Twitter rules yourself, and use conservative limits and manual review.