Twitter Niche Analyzer

v1.0.0

Analyze and identify trending or underserved Twitter niches to inform marketing, content strategies, and skill development using search and browser tools.

0· 56·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description match the instructions: the skill uses web_search and browser navigation to discover niches and evaluate engagement. It does not request unrelated binaries, credentials, or config paths.
Instruction Scope
Instructions direct the agent to navigate X (x.com), run live searches, and take snapshots (snapshot(aria=true)) and to spawn sessions for deeper research. This is within the stated purpose (collecting public content and metrics) but means the agent will scrape public pages; the user should be aware of platform terms-of-service, rate limits, and that snapshots may capture public profile content.
Install Mechanism
No install spec and no code files are present—this is instruction-only, so nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no environment variables, credentials, or config paths. There is no apparent need for secrets or external credentials to perform the stated public-web analysis.
Persistence & Privilege
always is false and there are no privileged persistence mechanisms. The skill can be invoked autonomously (platform default), which is expected for this kind of agent capability.
Assessment
This skill appears internally consistent and lightweight, but before installing consider: (1) it will browse and snapshot public X pages—ensure that behavior aligns with your privacy and legal policies and X's terms of service; (2) never provide account credentials to this skill unless you explicitly need posting or private-data access and you trust the source; (3) spawning many sessions or aggressive searching can hit rate limits—monitor usage; (4) if you require auditability, enable logs so you can see what pages the agent visited and what data it captured.

Like a lobster shell, security has layers — review code before you run it.

latestvk97famyvr9ada20z8qfc5ra90s83vfxz

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments