twitter-x-posts

v1.1.1

When the user wants to create X (Twitter) post copy, threads, or optimize for X platform. Also use when the user mentions "X post," "X thread," "Twitter post...

0· 95·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
Posts externally
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the SKILL.md content: all instructions, output formats, and heuristics are about producing publish-ready X posts, threads, and image specs. It does not request unrelated capabilities (cloud creds, OS tools, or posting APIs).
Instruction Scope
SKILL.md stays on-topic (character limits, thread structure, hooks/CTAs, image specs, output format). It does not instruct the agent to read files, access environment variables, call external endpoints, or transmit user data beyond producing post copy.
Install Mechanism
No install spec and no code files — the skill is instruction-only so nothing is written to disk or downloaded at install time.
Credentials
The skill requires no environment variables, credentials, or config paths. There are no requests for unrelated secrets or access.
Persistence & Privilege
Flags: always=false and no special privileges. The skill does not request permanent presence or modify other skills or system settings.
Assessment
This skill is a copywriting guide for X and appears internally consistent. Before installing, note: (1) it is source-unknown and has no homepage or author metadata — if provenance matters, prefer verified authors; (2) it only generates copy and does NOT itself post to X or manage accounts, so you’ll need a separate authenticated integration to publish; (3) platform rules and limits can change (character limits, Premium features, ranking signals), so verify current X documentation if you rely on exact numbers for automation.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cs2b357cd16eghcd0h92ern847mby

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments