Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Social Reply Bot

v1.1.0

Reddit & X/Twitter auto-reply bot for ecommerce/SaaS growth. Finds relevant posts about AI customer service, Amazon FBA, Shopify — posts genuine AI-generated...

0· 123·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The skill is a Reddit/X auto-reply bot and the code implements that. However the registry metadata declares no required env vars or credentials, while the runtime and scripts require ANTHROPIC_API_KEY and the browse CLI and expect you to log into Reddit/X. The metadata omission is an incoherence a user should notice.
!
Instruction Scope
SKILL.md and code instruct the agent/user to: run a remote installer via curl | bash, log into live Reddit/X accounts in a shared browser session, and the code will perform account warmup (karma farming) and automated posting. The installer and scripts also create a LaunchAgent to run daily without additional prompts. These are within the skill's stated purpose but expand its scope into persistent, autonomous actions on your real accounts.
!
Install Mechanism
The installer clones a GitHub repo and runs pip/npm installs (moderate risk), but SKILL.md also suggests curl https://raw.githubusercontent.com/... | bash (high-risk pattern). install.sh edits and loads a macOS LaunchAgent plist (writes files and registers scheduled runs). The code does not download from obscure hosts, but running remote install scripts and auto-registering scheduled jobs raises risk.
!
Credentials
Although the registry lists no required env vars, the code and SKILL.md require ANTHROPIC_API_KEY and a logged-in browser session. The installer reads ANTHROPIC_API_KEY from .env and injects it into the LaunchAgent plist — storing a secret in filesystem/scheduled-job config increases exposure. The browse CLI will use your browser's session cookies, giving the skill the ability to post as you.
!
Persistence & Privilege
install.sh creates and loads a LaunchAgent so the bot runs daily at 10:05 AM (persistence). This modifies per-user system configuration (~/Library/LaunchAgents) and writes a plist containing the API key (via sed replacement). While not 'always:true' in registry, the installer grants substantial persistence and autonomous execution on the host.
What to consider before installing
Before installing, consider the following: - The package metadata omits ANTHROPIC_API_KEY but the code requires it — you will need to add an API key to .env. Treat that key as sensitive. - The installer suggests running curl | bash against raw.githubusercontent content. Don't run remote install scripts without reviewing them locally first. Instead: git clone the repo, inspect install.sh and plist, then run steps manually. - install.sh injects your ANTHROPIC_API_KEY into a LaunchAgent plist and loads it. That stores the key on disk in a scheduled job. Inspect the plist file before loading; avoid embedding secrets in LaunchAgents (use environment-only retrieval if possible). - The bot uses browser automation and requires you to be logged into Reddit/X in the controlled Chrome session; it will post as your account and can perform 'warmup' (karma farming) and automated replies — this may violate Reddit/X terms and risk account suspension. Consider using throwaway/test accounts or not enabling warmup behavior. - If you proceed: (1) clone the repo and audit files (especially install.sh and the plist template) locally; (2) do not run curl | bash; (3) avoid injecting real production credentials into the plist — keep them in a secure env file and consider restricting file permissions; (4) disable or review LaunchAgent scheduling if you don't want persistence; (5) run first in a sandbox/test account to confirm behavior. Given the metadata omissions, automatic persistence, and secret handling, I recommend caution — the code is coherent with its stated purpose but contains practices that can expose credentials and autonomously act on your real social accounts.

Like a lobster shell, security has layers — review code before you run it.

automationvk972arxas54wq12agtf5z1gbh9837skyecommercevk972arxas54wq12agtf5z1gbh9837skykarmavk972arxas54wq12agtf5z1gbh9837skylatestvk972arxas54wq12agtf5z1gbh9837skyredditvk972arxas54wq12agtf5z1gbh9837skysocial-mediavk972arxas54wq12agtf5z1gbh9837skytwittervk972arxas54wq12agtf5z1gbh9837sky

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments