frigatebird

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill is coherent but needs review because it can run an external npm tool that uses your X browser session cookies to read, post, follow, and automate account changes.

Review this carefully before installing. If you use it, run it only with a dedicated X account or isolated browser profile, inspect and pin the npm package, and require explicit confirmation before any post, reply, follow, unfollow, retweet, like, article, or batch list change.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If misused, the tool or agent could act through an existing X session and access or change the user's account.

Why it was flagged

The skill explicitly relies on X session cookies, auth tokens, and browser profiles, while the metadata declares no credentials or config paths; this is high-impact account access without clear boundaries for which session data is used.

Skill content
running against X via browser session cookies ... Auth/cookies: `--auth-token`, `--ct0`, `--cookie-source`, `--chrome-profile`, `--firefox-profile`
Recommendation

Use a separate test X account or dedicated browser profile, avoid passing main-session tokens unless you fully trust the package, and require explicit approval before any account action.

What this means

An agent could accidentally or autonomously post, reply, follow/unfollow, retweet, like, or make bulk list changes on the user's X account.

Why it was flagged

The skill exposes public posting and account mutation commands, including batch list automation, but does not define confirmation, dry-run, rate, or scope limits for these high-impact actions.

Skill content
Mutation flows: `frigatebird tweet "<text>"` ... `reply` ... `article` ... Feature Coverage ... `like`, `retweet`, `follow`, `unfollow` ... `batch`
Recommendation

Confirm every mutation with the user, preview exact text and affected accounts/lists, and avoid batch operations unless the user explicitly approves the input file and intended changes.

What this means

The actual npm package code was not available in the artifacts, so users cannot verify from this submission how it handles cookies, profiles, or account actions.

Why it was flagged

The skill directs users to install or execute an external npm package, but the provided review context has no code files, no install spec, no homepage, and an unknown source; this matters because the package is meant to handle browser-session credentials and account mutations.

Skill content
Global install: `npm install -g frigatebird`; Local use: `npx frigatebird <command>`
Recommendation

Inspect and pin the npm package version before use, prefer a local reviewed install over ad-hoc npx execution, and verify its source and credential handling.