Is lknezic/reddit-write safe?

https://github.com/openclaw/skills/tree/main/skills/lknezic/reddit-write

79
CAUTION

lknezic/reddit-write is technically safe to install — no executable code, no malicious network callbacks, and canary credential files remained intact. However, the skill contains three substantive concerns: an explicit 'Use Kimi model' directive that attempts to reroute agent processing through a third-party AI service without user consent; a design mandate in ref-voice.md to generate content that evades AI detection systems on Reddit; and structured astroturfing guidance for covert QuantWheel commercial promotion. The skill also depends on an unincluded SOUL.md file that cannot be audited, and operates as a module in a larger automated social media content operation.

Category Scores

Prompt Injection 60/100 · 30%
Data Exfiltration 85/100 · 25%
Code Execution 97/100 · 20%
Clone Behavior 90/100 · 10%
Canary Integrity 95/100 · 10%
Behavioral Reasoning 45/100 · 5%

Findings (8)

HIGH Model Override Directive — 'Use Kimi Model' -25

SKILL.md contains an explicit instruction for the agent to use Moonshot AI's Kimi model when executing this skill. This is a prompt injection that attempts to substitute the user's configured AI model with a third-party service. If an agent follows this directive, it would route the user's context, research data, and drafting work through Moonshot AI's infrastructure without the user's awareness or consent. This also bypasses any safety configurations the user has applied to their primary model.

HIGH Explicit AI Detection Evasion Mandate -30

ref-voice.md, which SKILL.md requires the agent to read before every draft, contains an explicit instruction that the agent must write content convincingly enough to evade AI detection systems. This is a primary design goal of the skill, not an incidental feature. Using this skill facilitates deceptive content creation that violates Reddit's ToS and potentially broader platform authenticity regulations. Users face account suspension or banning if detected.

MEDIUM Structured Covert Commercial Promotion (QuantWheel Astroturfing) -20

SKILL.md contains detailed, strategically crafted rules for embedding QuantWheel product mentions in Reddit posts while making them appear organic and peer-generated. The instructions specify which subreddits to target, where to place the mention (after value is established), what phrasing to use, and what to avoid to prevent detection as advertising. This is a documented astroturfing playbook that uses the agent as a vector for covert commercial promotion.

MEDIUM Unaudited External File Dependency (SOUL.md) -15

The drafting workflow requires the agent to run a self-validation checklist from SOUL.md before saving any output. This file is not included in the skill package and was not present in the cloned repository. The agent's actual safety checks and validation behavior are thus determined by an external file that could not be reviewed in this audit. Any malicious instructions in SOUL.md would be executed without visibility at install time.

LOW Cross-Directory Filesystem Access and Write Operations -15

The skill requires the agent to read from shared/research/, shared/memory/, and the skill's own ref-voice.md, and to write output to shared/pending/ and active-tasks.md. These paths are outside the skill's own directory and represent shared state accessed by multiple components of an automated content pipeline. While no credential files are targeted, the broad filesystem footprint increases the risk of the agent inadvertently reading or writing sensitive shared data.

LOW Automated Content Operation Infrastructure -5

Multiple signals indicate this skill is one module in a larger coordinated automated content operation: a defined 9am weekday execution schedule, shared memory/research/pending directories implying a multi-agent pipeline, and coordination via active-tasks.md. This architecture is consistent with infrastructure designed for sustained, scheduled inauthentic activity on social media platforms at scale.

INFO Clean Installation — No Malicious Network or Process Activity 0

The installation process was a standard git sparse-checkout from github.com. All network connections were to expected hosts (GitHub, Ubuntu system services). No unexpected processes were spawned. No filesystem changes occurred outside the skill target directory during install.

INFO Canary Files Intact — No Credential Exfiltration 0

All six honeypot credential files remained unmodified throughout the audit. File accesses at timestamps 1771932479 (pre-clone) and 1771932499 (post-install) are consistent with the audit harness's own setup and teardown operations. The skill contains no executable code capable of independently accessing the filesystem.