gate-exchange-activitycenter
Pass
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches the
gate-clibinary from the vendor's official GitHub repository atgithub.com/gate/gate-cli/releases. These downloads are verified via checksums in the included installation script. - [COMMAND_EXECUTION]: Executes shell commands via the
gate-clibinary to query activity types and listings. The skill uses a preflight--helpcheck pattern to ensure correct flag usage as defined in the vendor's execution specification. - [COMMAND_EXECUTION]: The
setup.shscript manages tool installation and may utilizesudoto place the binary in/usr/local/binif the local user directory is not available, which is a standard procedure for CLI installations. - [DATA_EXFILTRATION]: Uses
GATE_API_KEYandGATE_API_SECRETenvironment variables to authenticate with Gate Exchange APIs. The skill instructions explicitly prohibit the agent from requesting these secrets directly from the user in chat. - [PROMPT_INJECTION]: Indirect prompt injection surface identified through the ingestion of external activity data.
- Ingestion points: Activity titles and descriptions fetched via
gate-cli cex activity listfrom the Gate API. - Boundary markers: The skill uses strict Markdown table templates for output which limits the potential for control character injection.
- Capability inventory: The skill is strictly read-only and does not possess write or execution capabilities that could be triggered by data ingestion.
- Sanitization: Activity data is filtered for specific fields (
master_one_line,url,type_name) before display.
Audit Metadata