Link Midjourney Instagram

PassAudited by VirusTotal on May 10, 2026.

Overview

Type: OpenClaw Skill Name: link-midjourney-instagram Version: 1.0.0 The skill 'link-midjourney-instagram' automates image generation and social media posting via Playwright, requiring shell execution and handling of sensitive credentials (Instagram login, API keys) stored in a .env file. While the SKILL.md instructions are consistent with the stated purpose and include security warnings (e.g., against committing session data), the inherent risks of browser automation and credential management, combined with the absence of the actual implementation code (main.py), warrant a suspicious classification.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

An agent run could publish images and captions to the user's Instagram account before the user separately reviews the exact outputs.

Why it was flagged

The skill directs the agent to execute the full automation, and the documented behavior includes public Instagram posts without an artifact-backed confirmation or review guard.

Skill content
then post each PNG as its own Instagram web post ... 執行 pipeline(給 agent 用 `exec`) ... `python main.py`
Recommendation

Use `--skip-instagram` for dry runs, require explicit approval of generated images and captions before posting, and document a confirmation step.

What this means

If the repository code or local credential files are mishandled, the user's Instagram or Midjourney accounts could be accessed or used.

Why it was flagged

The skill requires direct Instagram credentials and stores reusable Midjourney/Instagram browser sessions, granting the automation durable account authority.

Skill content
`.env` 內需 `INSTAGRAM_USERNAME`、`INSTAGRAM_PASSWORD` ... session 會存到 `browser_data/midjourney/` ... `browser_data/instagram/`
Recommendation

Use dedicated low-risk accounts where possible, avoid storing main account passwords, protect and rotate credentials, and inspect the runnable code before adding secrets.

What this means

Users must trust external or local code and packages not assessed in this skill review before granting account credentials and posting authority.

Why it was flagged

The skill tells users or agents to install dependencies and run repository code, but the supplied artifact set contains only SKILL.md, so the code and dependencies that handle credentials and posting are not reviewable here.

Skill content
repository root ... 含有 `main.py` ... `pip install -r requirements.txt` ... `python main.py`
Recommendation

Provide the runnable code and dependency lockfiles for review, pin dependencies, document provenance, and verify `main.py` and `requirements.txt` before use.

What this means

Generated images or post content may leave the local/browser environment for third-party captioning.

Why it was flagged

If vision captioning is enabled by existing provider keys, generated images may be sent to Gemini or OpenAI for captioning; this is disclosed and purpose-aligned but should be understood.

Skill content
若設了 `GEMINI_API_KEY`/`GOOGLE_API_KEY` 且未明確關閉,預設會開 vision ... `VISION_CAPTION_PROVIDER=openai` 搭配 `OPENAI_API_KEY`
Recommendation

Disable vision captioning or remove provider keys if you do not want images sent to an external vision API, and review the provider's data policy.