X (Twitter) Search by Desearch

v1.0.1

Search X (Twitter) in real time. Find posts by keyword, user, or hashtag. Get a user's timeline, replies, retweeters, or fetch specific posts by ID or URL. S...

1· 891·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill advertises X/Twitter search functionality and requires a single DESEARCH_API_KEY. The bundled script calls https://api.desearch.ai endpoints and implements the advertised commands (search, timeline, retweeters, etc.), so the declared capability matches the required artifact and env var.
Instruction Scope
SKILL.md and the script only instruct the agent to call Desearch endpoints and format results; there are no instructions to read unrelated files, other environment variables, or to transmit data to unexpected endpoints. All network calls target api.desearch.ai as expected.
Install Mechanism
No install spec is provided (instruction-only skill with a small included CLI script). Nothing is downloaded from arbitrary URLs and no installers/run-on-install actions are present.
Credentials
Only DESEARCH_API_KEY is required and it is used to authorize requests to desearch.ai. No unrelated secrets, tokens, or config paths are requested. The amount of environment access is proportional to the skill's function.
Persistence & Privilege
The skill does not request always:true or any elevated platform privileges. It does not modify other skills or system-wide settings. Normal autonomous invocation is allowed (platform default).
Assessment
This skill sends your queries and the DESEARCH_API_KEY to desearch.ai rather than calling X/Twitter directly — only install if you trust that service and its privacy/usage policies. Keep DESEARCH_API_KEY secret and scoped appropriately. Review rate limits, billing, and the Desearch website (https://desearch.ai) before use. If you need stricter guarantees, inspect the code yourself or run the included script in an isolated environment; there are no other requested credentials or unexpected behaviors in the provided files.

Like a lobster shell, security has layers — review code before you run it.

latestvk973vevx22d1rj75mb6eve47t581r9yb

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

𝕏 Clawdis
EnvDESEARCH_API_KEY

Comments