Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Social Reply Bot
v1.1.0Reddit & X/Twitter auto-reply bot for ecommerce/SaaS growth. Finds relevant posts about AI customer service, Amazon FBA, Shopify — posts genuine AI-generated...
⭐ 0· 123·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The skill is a Reddit/X auto-reply bot and the code implements that. However the registry metadata declares no required env vars or credentials, while the runtime and scripts require ANTHROPIC_API_KEY and the browse CLI and expect you to log into Reddit/X. The metadata omission is an incoherence a user should notice.
Instruction Scope
SKILL.md and code instruct the agent/user to: run a remote installer via curl | bash, log into live Reddit/X accounts in a shared browser session, and the code will perform account warmup (karma farming) and automated posting. The installer and scripts also create a LaunchAgent to run daily without additional prompts. These are within the skill's stated purpose but expand its scope into persistent, autonomous actions on your real accounts.
Install Mechanism
The installer clones a GitHub repo and runs pip/npm installs (moderate risk), but SKILL.md also suggests curl https://raw.githubusercontent.com/... | bash (high-risk pattern). install.sh edits and loads a macOS LaunchAgent plist (writes files and registers scheduled runs). The code does not download from obscure hosts, but running remote install scripts and auto-registering scheduled jobs raises risk.
Credentials
Although the registry lists no required env vars, the code and SKILL.md require ANTHROPIC_API_KEY and a logged-in browser session. The installer reads ANTHROPIC_API_KEY from .env and injects it into the LaunchAgent plist — storing a secret in filesystem/scheduled-job config increases exposure. The browse CLI will use your browser's session cookies, giving the skill the ability to post as you.
Persistence & Privilege
install.sh creates and loads a LaunchAgent so the bot runs daily at 10:05 AM (persistence). This modifies per-user system configuration (~/Library/LaunchAgents) and writes a plist containing the API key (via sed replacement). While not 'always:true' in registry, the installer grants substantial persistence and autonomous execution on the host.
What to consider before installing
Before installing, consider the following:
- The package metadata omits ANTHROPIC_API_KEY but the code requires it — you will need to add an API key to .env. Treat that key as sensitive.
- The installer suggests running curl | bash against raw.githubusercontent content. Don't run remote install scripts without reviewing them locally first. Instead: git clone the repo, inspect install.sh and plist, then run steps manually.
- install.sh injects your ANTHROPIC_API_KEY into a LaunchAgent plist and loads it. That stores the key on disk in a scheduled job. Inspect the plist file before loading; avoid embedding secrets in LaunchAgents (use environment-only retrieval if possible).
- The bot uses browser automation and requires you to be logged into Reddit/X in the controlled Chrome session; it will post as your account and can perform 'warmup' (karma farming) and automated replies — this may violate Reddit/X terms and risk account suspension. Consider using throwaway/test accounts or not enabling warmup behavior.
- If you proceed: (1) clone the repo and audit files (especially install.sh and the plist template) locally; (2) do not run curl | bash; (3) avoid injecting real production credentials into the plist — keep them in a secure env file and consider restricting file permissions; (4) disable or review LaunchAgent scheduling if you don't want persistence; (5) run first in a sandbox/test account to confirm behavior.
Given the metadata omissions, automatic persistence, and secret handling, I recommend caution — the code is coherent with its stated purpose but contains practices that can expose credentials and autonomously act on your real social accounts.Like a lobster shell, security has layers — review code before you run it.
automationvk972arxas54wq12agtf5z1gbh9837skyecommercevk972arxas54wq12agtf5z1gbh9837skykarmavk972arxas54wq12agtf5z1gbh9837skylatestvk972arxas54wq12agtf5z1gbh9837skyredditvk972arxas54wq12agtf5z1gbh9837skysocial-mediavk972arxas54wq12agtf5z1gbh9837skytwittervk972arxas54wq12agtf5z1gbh9837sky
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
