{"id":"bhattsameer-bombers","name":"Bombers","homepage":null,"repo_url":"https://github.com/bhattsameer/Bombers","category":"security","subcategories":[],"tags":["sms","email","whatsapp","twitter","instagram","spam","abuse","archived","python","collections","fake-sms","temporary-sms"],"what_it_does":"“Bombers” is an archived Python collection linking to multiple scripts/tools for SMS/Email/WhatsApp/Twitter/Instagram spamming/bombing and “fake/temporary SMS” utilities intended to bypass phone-based verification. It primarily functions as an index of other repositories and some referenced local scripts (e.g., SMS_bomber.py, Email_bomber.py, Twitter_bomber.py).","use_cases":["Security research and defensive testing (e.g., studying spam/bomber tooling patterns)","Red-team exercises in controlled environments with explicit authorization","Educational review of how spam/bombing scripts are structured (non-operational analysis)"],"not_for":["Launching spam, harassment, “bombing” messages, or DoS attacks","Bypassing SMS/phone verification or impersonating users"],"best_when":null,"avoid_when":null,"alternatives":["Use legitimate messaging/notification providers and their APIs (e.g., Twilio, SendGrid, WhatsApp Business Platform)","If the goal is testing, use approved load/spam simulation tools designed for authorized QA and rate-limit validation (not message-bombing)","For email deliverability testing, use tools like MailHog/Mailpit (local) or seed-list testing services"],"af_score":24.0,"security_score":9.5,"reliability_score":8.8,"package_type":"skill","discovery_source":["openclaw"],"priority":"high","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-03-29T18:03:35.015631+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":["python"],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":[],"oauth":false,"scopes":false,"notes":"No documented authentication mechanism for a service/API. The referenced scripts appear to be client-side utilities; any auth would be per-target platform or embedded in the scripts (not documented here)."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Open-source archive/collection; no pricing model for users of a service is described."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":24.0,"security_score":9.5,"reliability_score":8.8,"mcp_server_quality":0.0,"documentation_accuracy":15.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":100.0,"rate_limit_clarity":0.0,"tls_enforcement":0.0,"auth_strength":10.0,"scope_granularity":0.0,"dependency_hygiene":20.0,"secret_handling":20.0,"security_notes":"The README describes functionality consistent with spam/abuse and bypassing phone verification (fake/temporary SMS utilities). That is a high-risk area. The repository as provided shows no security architecture, no authentication model, no evidence of TLS/secure transport requirements, and no guidance on safe handling of credentials or operational safeguards.","uptime_documented":0.0,"version_stability":15.0,"breaking_changes_history":10.0,"error_recovery":10.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["No stable, documented programmatic interface (no REST/SDK/MCP) to drive functionality safely and consistently.","Repository is marked archived/read-only; linked scripts appear heterogeneous in quality and “working/not working” status.","Content is an index of potentially abusive tooling; using it operationally may violate laws/platform policies. Use only for defensive/authorized analysis."]}}