baoyu-post-to-x

Warn

Audited by Socket on May 12, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
SKILL.md

SUSPICIOUS: The skill's core behavior matches its stated purpose of posting to X via local browser automation, so it is not fundamentally deceptive. However, it enables real-world public posting, uses anti-detection browser automation, includes automatic process-kill behavior, and is distributed through a personal/transitive install path. No clear credential harvesting or third-party exfiltration is evident, but the operational and trust risks are medium.

Confidence: 100%Severity: 60%
AnomalyLOW
scripts/x-utils.ts

This code is a high-capability local automation helper: it launches/controls Chrome via CDP, reads sensitive Twitter/X authentication cookies (auth_token/ct0) to check session persistence, and performs clipboard copy/paste by executing companion Bun scripts. While the fragment does not show network exfiltration or explicit malware behavior, it meaningfully increases privacy/security exposure through sensitive cookie access and clipboard manipulation, and it executes OS commands and external processes (npx/bun). Treat as a security-sensitive component requiring review of the companion clipboard scripts and audit of the caller’s trust boundaries for profileDir and clipboard inputs.

Confidence: 100%Severity: 60%
Audit Metadata
Analyzed At
May 12, 2026, 03:01 AM
Package URL
pkg:socket/skills-sh/jimliu%2Fbaoyu-skills%2Fbaoyu-post-to-x%2F@8df511db75ffdce56df2f5b2911d203c6a203894