Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
X(Twitter) Post Automation
v1.0.0Automates the process of identifying trends on X (Twitter), generating opinionated/engaging content, and posting it. Use when asked to post to X, run X automation, or check trends for content creation.
⭐ 2· 5.6k·48 current·53 all-time
byHarsh Maniya@harshhmaniya
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's stated purpose (identify X trends, generate and post tweets) matches the SKILL.md instructions (use a browser to read timeline/trends and post). However, no credentials or API tokens are declared — the design implicitly depends on an authenticated Chrome session (OpenClaw extension) to perform posting. That implicit dependency is plausible but not explicitly declared, which is a mismatch users should know about.
Instruction Scope
Runtime instructions direct the agent to open the user's X timeline, read many posts, analyze top tweets, compose opinionated content, and perform an authenticated 'Post' action. This grants the skill the ability to act as the user (post publicly) and to read user-specific, potentially private feed content. The SKILL.md also requires notifying the user via 'primary channel (Telegram/Webchat)' without declaring how to access those channels. The agent is given broad, high-impact actions (posting on the user's behalf) that must be clearly consented to by the human operator.
Install Mechanism
Instruction-only skill with no install spec and no code files — lowest installation risk. Nothing is downloaded or written to disk by an installer.
Credentials
The skill declares no required environment variables or credentials but expects access to an authenticated Chrome session and to external notification channels. Those are effectively credentials (browser cookies/session) and messaging endpoints that are not listed in requires.env. The absence of explicit credentials is not malicious by itself, but it hides the fact that the skill expects an authenticated browser context and unspecified notification hooks.
Persistence & Privilege
always:false and user-invocable:true — normal. The skill writes candidate drafts and logs to memory (memory/x-daily-candidates.log, memory/x-automation-logs.md), which is expected for this workflow. Be aware that stored drafts and logs may contain sensitive data and will persist in agent memory unless the user clears them.
What to consider before installing
Before installing, understand that this skill automates actions as your logged-in X account by using a connected Chrome session (OpenClaw extension). That means it can read your timeline and post publicly on your behalf — a significant privilege. The skill does not declare any API keys or notification credentials yet references Telegram/Webchat notifications, so ask the author how notifications are implemented. Recommendations: 1) Only enable this if you trust the skill source (source/homepage unknown). 2) Require a human confirmation step before any post (do not allow fully autonomous posting). 3) Verify and limit the OpenClaw extension/tab permissions and ensure the browser session you expose is appropriate. 4) Audit and periodically clear the memory/log files the skill writes (drafts, logs). 5) If you need notifications, require explicit, documented webhook/credential configuration (and do not embed secrets in memory). 6) Prefer running in a disposable/sandboxed account until you’re comfortable with behavior. If you want more assurance, request the skill author to declare required env vars, provide a source repo/homepage, and add an explicit 'ask before posting' step in SKILL.md.Like a lobster shell, security has layers — review code before you run it.
latestvk979zr5r9ngepk390enw6y0tgn80jkcw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
