Mixpost

PassAudited by ClawScan on May 10, 2026.

Overview

The visible artifacts describe a coherent, instruction-only Mixpost API helper, but it uses a Mixpost token that can read and change social media workspace content.

Install this only if you want the agent to work with your Mixpost workspace. Use a scoped token if possible, protect the environment variables, and require explicit approval before publishing, scheduling, uploading, updating, or deleting content. The provided SKILL.md view is marked truncated, so review the full skill text before installing.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could help delete media or change workspace resources if the user asks it to use these API examples.

Why it was flagged

The skill documents authenticated API calls that can delete Mixpost media. This is aligned with social media management, but it is a high-impact action if run against the wrong workspace or items.

Skill content
### Delete media

```bash
curl -X DELETE "$MIXPOST_URL/api/$MIXPOST_WORKSPACE_UUID/media"
Recommendation

Require explicit confirmation before delete, update, schedule, or publish actions, and double-check workspace UUIDs and item IDs before running commands.

What this means

Anyone or any agent process with this token could potentially access or modify Mixpost workspace content according to the token's permissions.

Why it was flagged

The skill requires a bearer access token for Mixpost API calls. This is expected for the integration, but the token may grant read/write access to a social media management workspace.

Skill content
export MIXPOST_ACCESS_TOKEN="your-access-token"
Recommendation

Use the least-privileged token Mixpost supports, keep it out of logs and shared files, and revoke or rotate it when no longer needed.