Tweet Composer
v1.0.0Score and optimize tweets based on X's real open-source ranking algorithm. Analyzes draft tweets against the actual ranking code — not generic tips. Use when...
⭐ 0· 785·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's name/description (score and optimize tweets using X's ranking rules) matches what it includes: an embedded references/algorithm-rules.md and guidance for scoring. It does not request unrelated credentials, binaries, or system access.
Instruction Scope
Runtime instructions are limited and explicit: read the included references/algorithm-rules.md, evaluate a draft against the rules, and produce a scorecard. The instructions do not ask the agent to read arbitrary system files, access environment variables, or transmit data to external endpoints.
Install Mechanism
No install spec or code is provided; the skill is instruction-only and ships documentation files. There are no download URLs or extract steps that would write or execute remote code.
Credentials
The skill requires no environment variables, credentials, or config paths. The documentation references X's open-source algorithm but provides the derived rules locally rather than asking for API keys.
Persistence & Privilege
always:false and no install/actions that modify agent or system config. The skill does not request persistent presence or elevated privileges.
Assessment
This skill is instruction-only and self-contained: it reads the included rules document and returns a score/suggestions without asking for credentials or installing code. That makes it low-risk from a security perspective. Two practical notes before installing: (1) The scoring is the author's interpretation of the open-source algorithm (weights were reportedly redacted), so treat scores as heuristic recommendations rather than exact reproduction of X's ranking. (2) Ensure your agent does not have other skills or connectors that would automatically post to X on its behalf — the Tweet Composer itself doesn't post, but an agent with outbound posting permissions could use its suggestions to publish content. If you care about provenance, prefer skills with a known source/homepage; absence of a public repo or homepage is not a security problem by itself but reduces transparency.Like a lobster shell, security has layers — review code before you run it.
latestvk970gwejm0nsa6b5pdyk64pxxh81sesj
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
