baoyu-post-to-x

Fail

Audited by Socket on Mar 12, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The skill's stated purpose (posting to X via browser automation) is aligned with its capabilities. However, the footprint includes significant risk vectors: a download-execute step for bun via curl|bash from an external domain, browser-based credential/session exposure, and clipboard/paste automation that can leak data. While the tool is designed for user-involved posting (review/publish), the combination of real Chrome CDP automation and environment-credential handling elevates risk. Overall, the skill is SUSPICIOUS due to supply-chain download-execute patterns and potential credential/clipboard exposure, with notable but not definitive data-stealing signals. Recommend restricting execution to verified environments, avoiding uncoupled curl|bash installs, and auditing clipboard/paste flows and browser data handling.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 12, 2026, 07:53 AM
Package URL
pkg:socket/skills-sh/ideacco%2Fbaoyu-skills-openclaw%2Fbaoyu-post-to-x%2F@e516b76c7c91ac70861e2a31834b501f07566220