Trusted Reviews is supported by its audience. If you purchase through links on our site, we may earn a commission.Learn more.

How to remove third-party apps from your Twitter account

In This Article

In This Article

Twitter allows you to link third-party services and applications to your account in a range of different ways. Let’s look at how to manage and remove these apps’ posting permissions.

In some cases, fake or malicious app connectors can be used to post spam from your account, follow accounts that you wouldn’t normally, or extract some of your personal data. You can see more details about this in our “is Twitter safe” guide.

While the system’s well enough locked down to avoid the most serious potential damage, such as resetting your password, you shouldn’t give any level of access to your account to any third party that you don’t trust.

Similarly, it’s important to periodically check your connected apps for anything that doesn’t need to be there. Twitter gives you plenty of control over these apps, but the list of these is buried pretty deeply in the microblogging network’s menus.

As ever, we’d also always recommend web users invest in robust antivirus and a reliable VPN to protect their privacy on top of the measures detailed below.

Up your cybersecurity with NordVPN – Now 62% off plus a random gift of either 3 months or 1 year extra subscription with every purchase.

Save 81% on a VPN with SurfShark

Surfshark has dropped the price of its VPN to £1.94 a month. Head over to Surfshark now to pay a one time price of £46.44 for 24 months of Surfshark and save 81%.

The Short Version

From a desktop browser: Open Twitter’s settings page

Step1

Open Twitter in your browser

Open Twitter in your browser

When logged in via a desktop browser, open your your Twitter home page, look at the menu pane on the left and click More.

Step2

Open Settings

An extra set of options with concertina out. From these, select Settings and privacy. You can also go directly to your account settings by visiting https://twitter.com/settings/account

Step3

Select Security, then Apps

From the settings screen, click Security and account access in the second pane, and then click Apps and sessions in the third pane

Step4

Select Connected apps

The third pane will change to show the Apps and sessions menu. From here, click Connected apps to view the list. You can go here directly by visiting https://twitter.com/settings/connected_apps

Step5

Select the app you wish to remove

Click on the name of any app you wish to examine or remove. The name, description, home page link, date added and permissions will be displayed. Click the red link at the bottom reading Revoke app permissions to remove its access to your account.

Step6

Repeat as needed

This will change to Report application if successful. You only need to click that if the app was added without your permission or knowledge. Otherwise, click the back arrow (←) by the app’s name to go back to list and remove any others.

Twitter apps of this kind are generally low-risk, particularly as successive changes have added further restrictions to what these apps can actually. However, it’s important to keep a regular eye on any external service with access to your accounts.

Save 81% on a VPN with SurfShark

Surfshark has dropped the price of its VPN to £1.94 a month. Head over to Surfshark now to pay a one time price of £46.44 for 24 months of Surfshark and save 81%.

There are even more complicated and powerful ways of linking apps to your Twitter account, but as most of these require you to register as a developer and generate an API key, it’s unlikely that you’ll add any of these without realising. Unless you know exactly what you’re doing, avoid anything that requires to you set up accounts or generate keys in the Twitter Developer portal!

Troubleshooting

Don’t worry. Next time you use the service, you’ll be prompted to reconnect your Twitter account.

No. The odds are that you don’t use it any more, and you want to give as few things as possible access to your account.

Revoke the app’s permissions as described above then click Report application. You’ll be taken to Twitter’s API Policy Support page, then select I need to report an API policy violation from the How can we help pull-down. Select the most appropriate option from “I would like to report a bad app” and “I’d like to report a possible API violation regarding surveillance or user privacy”, provide your email address (optionally) and any details you’d like to share about the app’s activity.

You might like…

K.G. Orphanides is a writer and developer whose areas of expertise include internet security, VPNs, Linux for the desktop, small-scale game development, software preservation and computer audio techno…

Founded in 2003, Trusted Reviews exists to give our readers thorough, unbiased and independent advice on what to buy.

Today, we have millions of users a month from around the world, and assess more than 1,000 products a year.

Editorial independence means being able to give an unbiased verdict about a product or company, with the avoidance of conflicts of interest. To ensure this is possible, every member of the editorial staff follows a clear code of conduct.

We also expect our journalists to follow clear ethical standards in their work. Our staff members must strive for honesty and accuracy in everything they do. We follow the IPSO Editors’ code of practice to underpin these standards.

Why trust our journalism?

Founded in 2003, Trusted Reviews exists to give our readers thorough, unbiased and independent advice on what to buy.

Today, we have millions of users a month from around the world, and assess more than 1,000 products a year.

Editorial independence means being able to give an unbiased verdict about a product or company, with the avoidance of conflicts of interest. To ensure this is possible, every member of the editorial staff follows a clear code of conduct.

We also expect our journalists to follow clear ethical standards in their work. Our staff members must strive for honesty and accuracy in everything they do. We follow the IPSO Editors’ code of practice to underpin these standards.