gate-dex-trade
Fail
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The file
scripts/gate-api-call.pycontains hardcoded default API credentials (api_keyandsecret_key) used for authentication with the Gate DEX OpenAPI. - [DATA_EXFILTRATION]: The documentation in
references/openapi/sign.mdandreferences/openapi.mdexplicitly encourages users to paste their private keys or mnemonics into the AI chat interface. This practice exposes sensitive financial credentials to the AI service provider's context logs. - [COMMAND_EXECUTION]: The
install.shscript automates the modification of global configuration files, such as~/.cursor/mcp.json, and writes persistent routing rules to the workspace (e.g.,CLAUDE.md,.cursor/rules/gate-dex-trade.md). The skill also relies on the execution of local Python and Node.js scripts to perform API calls and transaction signing. - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection by processing untrusted data from blockchain API responses and using it to construct shell commands and transaction payloads.
- Ingestion points: Data returned from the
openapi.gateweb3.ccendpoint and various MCP tools (e.g., token lists, quotes). - Boundary markers: None specified in the instructions to protect against malicious content in API responses.
- Capability inventory: Shell command execution (
python3,node), file system modifications (configuration writing), and network communication. - Sanitization: There is no evidence of sanitization or validation for data ingested from external APIs before it is interpolated into shell command arguments.
Recommendations
- AI detected serious security threats
Audit Metadata