Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Twitter Intelligence & Automation — Read, Search, Write & Post (Text & Media)
v1.0.2Searches and reads X (Twitter): profiles, timelines, mentions, followers, tweet search, trends, lists, communities, and Spaces. Publishes posts, likes/unlike...
⭐ 0· 40·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description (read/search/post/engage on X) aligns with the code and runtime instructions: the clients call api.aisa.one endpoints and implement read, OAuth-based post, and engagement flows. Required binaries (curl, python3) and the single declared env (AISA_API_KEY) are consistent with the stated purpose.
Instruction Scope
Runtime instructions explicitly direct the agent to call https://api.aisa.one endpoints and, for posting, to upload local workspace media files to the relay. That's coherent for a posting/engagement skill, but it means the skill will transmit user workspace files and OAuth flows to an external relay service—verify you trust that endpoint before sending sensitive files.
Install Mechanism
No install spec — instruction-only with included Python scripts. Nothing is downloaded from arbitrary URLs during install; risk from installation is low. The presence of runnable scripts increases surface area at runtime but is expected for this skill's purpose.
Credentials
The declared required env is AISA_API_KEY which matches the provider. However, runtime code reads/uses additional environment variables that are not declared in requires.env (e.g., TWITTER_RELAY_BASE_URL and TWITTER_RELAY_TIMEOUT). TWITTER_RELAY_BASE_URL can be set to redirect relay calls to an arbitrary host, which is a notable divergence from the manifest. Also note: POST calls include the API key in the JSON body as well as Authorization header, so the AISA_API_KEY will be transmitted to the relay service for POST actions.
Persistence & Privilege
always is false and the skill does not request elevated platform privileges. It will run autonomously by default (disable-model-invocation is false), which is normal — there is no hidden permanent presence or modification of other skill configs.
What to consider before installing
This skill appears to implement the advertised Twitter/X read, post, and engagement flows via the AIsa relay and only requests one credential (AISA_API_KEY), which is expected. Before installing: (1) Confirm you trust the AIsa service (api.aisa.one) and its privacy/retention rules because the skill will send OAuth tokens and any media files you provide to that relay. (2) Be aware that the code accepts TWITTER_RELAY_BASE_URL from the environment (not declared in the manifest) — an attacker or misconfiguration could redirect requests to another host, so verify that env var is not set to an unexpected value. (3) Avoid uploading sensitive local files through this skill and consider using a dedicated/limited API key and rotating it after testing. (4) If you need higher assurance, review the included Python scripts (they are present in the bundle) or run them in a controlled environment first. If you want me to highlight exact lines where TWITTER_RELAY_BASE_URL is read or where the API key is added to POST bodies, say so and I will point them out.Like a lobster shell, security has layers — review code before you run it.
latestvk971azvq8v00wk74t38gfxantx84d5jj
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🐦 Clawdis
Binscurl, python3
EnvAISA_API_KEY
Primary envAISA_API_KEY
