Twitter Listen Comment

PassAudited by VirusTotal on May 11, 2026.

Findings (1)

The skill is classified as suspicious due to a significant indirect prompt injection vulnerability in `scripts/twitter_listen_comment.py`, where unsanitized tweet content is directly embedded into prompts sent to the OpenClaw agent. This could allow a malicious tweet to hijack the agent's browser session and perform unauthorized actions. Additionally, the skill requires a `TWITTER_TOKEN` to be sent to a third-party, non-official API endpoint (`https://ai.6551.io/open/twitter_search`), which introduces a risk of credential exposure. While these behaviors are functional for the stated purpose of Twitter automation, the lack of input sanitization and reliance on external third-party infrastructure pose meaningful security risks.