SurfAgent X

v1.2.0

X platform skill for SurfAgent, covering route-aware workflows, proof rules, blockers, and when to use the X adapter over raw browser control.

0· 62·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description describe X-specific navigation, posting, verification, and adapter usage; the SKILL.md content strictly documents route-aware flows, proof rules, and adapter verbs consistent with that purpose.
Instruction Scope
Runtime instructions focus on using an X adapter and browser-operations (account verification, composer inspection, visual snapshots, timeline/thread extraction). They do not instruct reading arbitrary local files, unrelated environment variables, or sending data to external endpoints.
Install Mechanism
Instruction-only skill with no install spec and no code files — nothing is written to disk or fetched during install.
Credentials
No environment variables, credentials, or config paths are requested. The guidance implicitly depends on an existing browser session/adapter but does not ask for unrelated secrets.
Persistence & Privilege
always is false and defaults are used. The skill does not request permanent presence or modify other skills or system-wide settings.
Assessment
This skill is an instruction-only guide for using an X adapter and is internally consistent. Before installing, confirm how your agent's browser-operations and X adapter are implemented and what credentials or session cookies they use—those components (not this SKILL.md) are what actually interact with accounts. If you allow autonomous agent actions, the agent can perform browser operations using whatever logged-in sessions exist, so ensure only intended account sessions and adapter implementations are available to the agent. If you want extra assurance, review the actual adapter implementation and the browser-operations skill (not included here) to see how it handles session storage, screenshots, and network calls.

Like a lobster shell, security has layers — review code before you run it.

latestvk97fkj993xg1zb9nrmr0f4jwf984jm71

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

𝕏 Clawdis

Comments