Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Last 30 Days (Lite)

v1.0.0

Research any topic across Reddit, X/Twitter, and the web from the last 30 days. Synthesizes findings into actionable insights or copy-paste prompts.

2· 3.3k·11 current·11 all-time
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill's functionality (Brave web search + Reddit + X/Twitter) matches its description. However the registry metadata marks the bird binary as required while the SKILL.md calls bird 'optional but recommended' — a minor inconsistency but not fatal.
!
Instruction Scope
Instructions ask the agent to run web_search/web_fetch and run 'bird search'. web_fetch will retrieve arbitrary URLs (expected for this task). The SKILL.md explicitly states 'Bird requires X/Twitter cookies (already configured)' — it thus assumes access to local browser/cookie state but does not instruct how cookies are sourced or declare those paths. That implicit access is out-of-band and concerning.
Install Mechanism
This is an instruction-only skill with no install spec or code files, so nothing is automatically written to disk by the skill itself (low install risk).
!
Credentials
No environment variables or config paths are declared, yet the skill depends on bird and 'already configured' X/Twitter cookies. Expecting access to user cookies (secrets) without declaring them is disproportionate and opaque. The skill should declare where credentials/cookies are expected and what access is required.
Persistence & Privilege
The skill does not request always:true and does not declare modifications to other skills or system settings. Autonomous invocation is allowed but is the platform default (not flagged alone).
What to consider before installing
This skill appears to do what it says, but it implicitly relies on the bird CLI + existing X/Twitter cookies that are not declared. Before installing: (1) confirm whether you want the agent to use your local X cookies (bird may read cookie files or other local config) — if not, do not install or remove bird; (2) ask the author which file(s) or paths bird needs and whether cookies or tokens are read/stored, and request explicit declaration of required config paths or env vars; (3) if you must use it, run bird in a sandboxed account or environment with only the credentials you intend to expose; (4) remember web_fetch retrieves arbitrary URLs (might fetch sensitive content if given links) — review outputs for accidental data leakage. If the author clarifies where bird expects cookies and updates the manifest to declare those config paths, this assessment could move to benign.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

📅 Clawdis
Binsbird
latestvk970gba3sfq2nvx56kpwmsppdx7zzete
3.3kdownloads
2stars
1versions
Updated 20h ago
v1.0.0
MIT-0

last30days 📅

Research any topic using recent (last 30 days) discussions from Reddit, X/Twitter, and the web. Returns synthesized insights and actionable prompts.

Overview

The AI world reinvents itself monthly. This skill keeps you current by researching what people are actually saying right now - not what worked six months ago.

What it does:

  • Searches the web, Reddit, and X/Twitter with freshness filters (last 30 days)
  • Finds real practitioner experiences, not just SEO content
  • Synthesizes findings into actionable insights
  • Generates copy-paste prompts based on current best practices

Best for:

  • Prompt research (what techniques actually work for ChatGPT, Midjourney, Claude, etc.)
  • Trend discovery (what's viral, what people are recommending)
  • Product feedback (what do real users think about X?)
  • Fast-moving topics where recency matters

Requirements:

  • Brave Search (built into Clawdbot)
  • bird CLI for X/Twitter (optional but recommended)
  • No extra API keys needed

Usage

When user asks for recent info on a topic, or uses "/last30days [topic]":

Step 1: Web Search (Brave with freshness)

web_search(query="[topic]", freshness="pm", count=5)
  • pm = past month
  • Also try: pd (24h), pw (week)

Step 2: Reddit Search

web_search(query="site:reddit.com [topic]", freshness="pm", count=5)

Focus on r/ClaudeAI, r/ChatGPT, r/LocalLLaMA, r/MachineLearning, r/StableDiffusion, etc.

Step 3: X/Twitter Search

bird search "[topic]" -n 10 --plain

Look for practitioners sharing real experiences, not just engagement bait.

Step 4: Deep Dive (optional)

For promising URLs, use web_fetch to get full content:

web_fetch(url="https://reddit.com/...", maxChars=10000)

Step 5: Synthesize

Combine findings into:

  1. Key patterns - What are people actually doing that works?
  2. Common mistakes - What should be avoided?
  3. Tools/techniques - Specific methods mentioned
  4. Copy-paste prompt (if applicable) - Ready-to-use prompt incorporating best practices

Output Format

## 📅 Last 30 Days: [Topic]

### What's Working
- [Pattern 1]
- [Pattern 2]

### Common Mistakes
- [Mistake 1]

### Key Techniques
- [Technique with source]

### Sources
- [URL 1] - [brief description]
- [URL 2] - [brief description]

### Ready-to-Use Prompt (if applicable)

[Generated prompt based on findings]

Examples

  • /last30days Midjourney v7 prompting
  • /last30days Claude Code best practices
  • /last30days what are people saying about M4 MacBook
  • /last30days Suno music prompts that actually work

Notes

  • No extra API keys needed (uses Brave + bird)
  • Bird requires X/Twitter cookies (already configured)
  • Focus on signal over noise - prioritize upvoted content and verified practitioners

Comments

Loading comments...