twitter

Fail

Audited by Socket on Feb 19, 2026

4 alerts found:

Obfuscated Filex2AnomalySecurity
Obfuscated FileHIGH
README.md

Overall, the provided description indicates a focused, cookie-based automation tool with reasonable security practices (secure storage, HTTPS, user-provided credentials). While no direct malicious indicators are present in the fragment, the reliance on local cookie storage and browser automation introduces meaningful risk in typical user environments. A cautious security posture requires thorough auditing of storage permissions, secure logging practices, minimization of cookie exposure in memory, and ensuring supply-chain integrity of the OpenClaw component and browser automation stack. Recommend code review of: cookie serialization/deserialization, file I/O permissions, logging, error handling, and the exact browser automation/SRC boundaries to confirm there are no hidden data exfiltration paths or unintended side channels.

Confidence: 98%
Obfuscated FileHIGH
SKILL.md

Functionally benign for its stated purpose: automating Twitter/X via a local Playwright CDP session using user-provided cookies. The primary risk is local: centralized storage and automatic refresh of high-privilege session cookies and reliance on a CDP port create a significant attack surface if the host is compromised or the CDP port is exposed. No evidence in the provided README of external exfiltration, obfuscation, or deliberate backdoors, but the implementation should enforce strict file permissions, bind CDP to localhost, offer optional encryption of stored cookies, and warn users about backups/cloud sync and secure deletion to mitigate credential theft risks.

Confidence: 98%
AnomalyLOW
lib/twitter-automation.js

This module is an automation helper to post tweets and extract cookies using Playwright via a local CDP endpoint. It does not contain classic obfuscated malware (no eval, no remote exfiltration domains), but it exposes sensitive authentication cookies to stdout and performs actions (posting) on behalf of those cookies. That behavior can enable account takeover or credential leakage if used improperly or in untrusted contexts. Treat it as sensitive: do not run with untrusted .temp-action.json files, do not expose the CDP endpoint publicly, and avoid capturing its stdout to insecure logs.

Confidence: 90%Severity: 60%
SecurityMEDIUM
example-cookies-orion.json

This artifact is a high-risk credential leakage: exported session and CSRF-like tokens for .x.com in cleartext that allow authenticated access and likely account takeover if reused. The blob itself is not executable malware, but its presence in files, repos, or logs constitutes an urgent security incident. Immediate mitigation: revoke/rotate affected tokens, remove the file from all stores, audit access to the environment that exported it, and remediate any processes that can read browser cookie stores.

Confidence: 75%Severity: 82%
Audit Metadata
Analyzed At
Feb 19, 2026, 10:58 AM
Package URL
pkg:socket/skills-sh/SecureSkills-io%2Ftwitter-skill%2Ftwitter%2F@e5ae70355543f6078baebd248afb89d9d82b4db3