This skill uses system-level tools and broad permissions to
Claims to do
Post to X (Twitter): Posts text, images, videos, and long-form articles to X via real Chrome browser (bypasses anti-bot detection).
Actually does
This skill uses `bun` or `npx` to execute TypeScript scripts that control a real Chrome browser. It accesses local files (images, videos, markdown) and the user's Chrome profile to navigate to `x.com` and pre-fill content for various post types (text, images, videos, quote tweets, long-form articles). It also includes scripts for environment checks and troubleshooting Chrome debug port issues, sometimes using `pkill`.
The skill explicitly uses scripts and external tools (`xdotool`, `ydotool`) to interact with the system clipboard and simulate keystrokes, posing a significant risk for credential harvesting or data exfiltration.
`scripts/copy-to-clipboard.ts`, `scripts/paste-from-clipboard.ts`, `xdotool` (X11) or `ydotool` (Wayland)
The skill includes instructions to terminate Chrome/Chromium processes using `pkill`, indicating a capability that could be abused for resource abuse or denial of service.
pkill -f "Chrome.*remote-debugging-port" 2>/dev/null;
The skill operates using the user's persistent authenticated session on X, meaning any actions performed by the agent are directly attributed to the user's identity.
First run: log in to X manually (session saved)
The skill explicitly uses Chrome DevTools Protocol (CDP) to bypass anti-automation detection on X (Twitter). This constitutes circumvention of platform Terms of Service anti-bot measures and could be used to automate actions at scale without platform consent.
Uses real Chrome with CDP to bypass anti-automation. Posts text, images, videos, and long-form articles to X via real Chrome browser (bypasses anti-bot detection).
The skill requires macOS Accessibility permissions for the terminal app, which grants broad system UI control capabilities beyond what is needed for basic posting. This is a significant permission that could be abused by the underlying scripts.
Accessibility (macOS) | System Settings → Privacy & Security → Accessibility → enable terminal app
The skill's description implies full automation of 'posting' to X, but the actual behavior requires the user to manually review and publish the content after the script has prepared it in the browser.
The skill repeatedly states: 'Note: Script opens browser with content filled in. User reviews and publishes manually.' and 'All scripts only fill content into the browser, user must review and publish manually'.
The skill loads settings from external `EXTEND.md` files located in user-controlled directories, which could be manipulated by an attacker to alter skill behavior or inject malicious configurations.
test -f .baoyu-skills/baoyu-post-to-x/EXTEND.md && echo "project"
The skill instructs the agent to automatically kill Chrome processes and retry commands without asking the user. This skip-user-confirmation pattern removes human oversight for a destructive system operation (killing processes).
**Important**: This should be done automatically — when encountering this error, kill Chrome CDP instances and retry the command without asking the user.
The reliance on manual user review for publishing posts introduces a vulnerability to approval fatigue or social engineering, where a user might inadvertently approve malicious content.
All scripts only fill content into the browser, user must review and publish manually
[](https://mondoo.com/ai-agent-security/skills/github/jimliu/baoyu-skills/baoyu-post-to-x)<a href="https://mondoo.com/ai-agent-security/skills/github/jimliu/baoyu-skills/baoyu-post-to-x"><img src="https://mondoo.com/ai-agent-security/api/badge/github/jimliu/baoyu-skills/baoyu-post-to-x.svg" alt="Mondoo Skill Check" /></a>https://mondoo.com/ai-agent-security/api/badge/github/jimliu/baoyu-skills/baoyu-post-to-x.svgSkills can read files, run commands, and access credentials. Mondoo helps organizations manage the security risks of AI agent skills across their entire fleet.