This repo must never contain real X/Twitter, xAI, or password-manager secrets.
If the issue can be discussed publicly without exposing credentials, open a GitHub issue:
https://github.com/clawSean/openclaw-x-twitter-kit/issues
If the report includes credential leakage, exploitable token handling, or private account data, do not open a public issue. Use GitHub private vulnerability reporting if enabled, or contact the repo owner through GitHub and keep details minimal until a private channel is established.
~/.xurlor copies of it- OAuth2 Client Secrets
- OAuth1 Consumer Secrets / Access Token Secrets
- OAuth callback URLs containing
code=orstate=values - access tokens, refresh tokens, bearer tokens, or xAI API keys
.envfiles with real values- verbose API logs containing Authorization headers
- Revoke or rotate the credential immediately in the provider console.
- Remove the secret from the working tree and history if it was committed.
- Re-run
scripts/ci-check.sh. - Mention that rotation happened in the public issue/PR, but do not paste the old secret.
This kit provides helper scripts, templates, and OpenClaw skill guidance. It is not a full auth server, credential vault, or compliance layer. Host applications remain responsible for encrypted token storage, user consent, legal/privacy requirements, and production monitoring.
Public/mutating X actions should require clear user intent and explicit approval unless the operator creates a separate standing policy.