Bytesagain X Manager

AdvisoryAudited by Static analysis on Apr 14, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the user follows the schedule, the skill can publish tweets and like posts publicly on the account without reviewing each action, creating reputational, policy, and possible usage-cost risk.

Why it was flagged

The documentation encourages unattended recurring public likes and posts from the X account. Mention replies have an approval flow, but scheduled posts and likes do not show the same per-action confirmation.

Skill content
Recommended Cron Schedule ... `0  9,13,17,21 * * *  like` ... `5  10 * * *     post --index 0` ... `5  15 * * *     post --index 1` ... `5  20 * * *     post --index 2`
Recommendation

Keep post and like commands manual unless this automation is explicitly desired; add a dry-run mode, per-post approval, hard rate caps, and a clear rollback/disable procedure before using cron.

What this means

Using behavior intended to appear human or avoid detection can violate platform rules and could result in account restriction or loss of trust.

Why it was flagged

The artifact explicitly frames randomized delays as avoiding bot detection, not merely as rate limiting. That is a stealth/abuse-oriented instruction for public social-media automation.

Skill content
Bot-detection avoidance: multiple sends staggered 30–90s randomly
Recommendation

Remove anti-detection framing and implement transparent rate limiting/backoff that complies with X automation policies.

What this means

Anyone or any process with these environment variables could post, like, or reply as the configured X account and send Telegram bot messages.

Why it was flagged

These credentials are purpose-aligned for X posting, xAI draft generation, and Telegram approval messages, but the X token grants write authority over the account.

Skill content
`X_ACCESS_TOKEN` ... `account-specific, Read+Write`; `XAI_API_KEY` ... `TG_TOKEN` ... `TG_CHAT` ... required
Recommendation

Use a dedicated X app/account where possible, grant only the needed scopes, store env vars securely, and rotate/revoke tokens if the skill is removed or no longer trusted.

What this means

Stale or manipulated pending reply data could remain on disk and later be used for a public reply, and users may not find it through the documented /tmp state path.

Why it was flagged

Public mention text and AI-generated draft replies are persisted under the user's home directory and later reused to send replies. This differs from the /tmp pending file documented in SKILL.md, making retention and review boundaries unclear.

Skill content
PENDING_FILE = os.path.expanduser("~/.local/share/x-manager/pending-replies.json") ... "original": tweet["text"], "draft_reply": f"@{author_name} {draft}" ... reply_text = p["draft_reply"]
Recommendation

Document the actual state path, make `status` read the same queue, expire pending replies, show the exact reply before sending, and provide a cleanup command.

What this means

It is harder to verify the maintainer, dependency expectations, and credential requirements before granting account access.

Why it was flagged

The registry/provenance metadata is incomplete for a skill that actually requires sensitive credentials and runs local scripts. The behavior is disclosed in SKILL.md, but the registry contract is weaker than expected.

Skill content
Source: unknown; Homepage: none; Required env vars: none; Primary credential: none; Install specifications: No install spec
Recommendation

Verify the publisher independently, review the scripts before use, and require the package to declare its credentials, dependencies, source, and version consistently.