Back to skill
Skillv1.0.0
ClawScan security
Twitter Article Reader · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignMar 13, 2026, 3:15 PM
- Verdict
- Benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill's requirements and instructions match its stated purpose (fetch Twitter/X content via the jina.ai proxy); it is an instruction-only skill with no extra credentials or installs, though it does route content through a third-party proxy (jina.ai).
- Guidance
- This skill appears internally consistent and low-risk technically because it only gives instructions to fetch content via the jina.ai proxy and uses no credentials or installs. Before installing, consider: 1) Privacy — using r.jina.ai sends the target URL (and the fetched content) to a third party (jina.ai); avoid sending sensitive or private links. 2) Legal/ToS — the proxy bypasses Twitter/X anti-bot measures and may conflict with site terms or paywalls; ensure you have the right to fetch the content. 3) Malicious URLs — do not provide internal/private URLs (e.g., 169.254/localhost or intranet addresses) since web_fetch may attempt network requests. If you need stronger privacy or compliance, prefer a solution you host yourself or verify jina.ai's privacy policy and retention practices.
Review Dimensions
- Purpose & Capability
- okName/description (Twitter Article Reader) match the instructions: construct a r.jina.ai proxy URL for the provided Twitter/X link and fetch the rendered markdown. No unrelated credentials, binaries, or installs are requested.
- Instruction Scope
- noteInstructions are narrowly scoped to building a jina.ai proxy URL and calling the agent's web_fetch tool to retrieve markdown. This is coherent with the purpose, but it explicitly routes the target URL and returned content through the third-party proxy (r.jina.ai), which has privacy and terms-of-service implications.
- Install Mechanism
- okNo install spec or code files are present (instruction-only), so nothing is written to disk or installed. This minimizes technical risk from supply-chain installs.
- Credentials
- okThe skill declares no environment variables, credentials, or config path access. The declared requirements are proportionate to the described functionality.
- Persistence & Privilege
- okThe skill does not request permanent presence (always: false) and does not modify system or other skill configs. Autonomous invocation is allowed by default but not a sign of misuse by itself.
