gate-mcp-cursor-installer

Warn

Audited by Socket on Apr 2, 2026

3 alerts found:

Anomalyx3
AnomalyLOW
scripts/mcp-fragments/cursor/gate-dex.json

Best assessment: This snippet is not evidence of malware by itself—it’s a network-auth configuration. However, it hardcodes an API key (`MCP_AK_8W2N7Q`) directly in the distributed configuration, which is a significant supply-chain credential leakage risk. The bearer token is runtime-injected (`${GATE_MCP_TOKEN}`), which is safer, but outbound authenticated traffic to a third-party domain is inherently higher risk if any sensitive payload handling occurs elsewhere in the codebase.

Confidence: 78%Severity: 63%
AnomalyLOW
SKILL.md

SUSPICIOUS: The skill's core purpose matches installing Gate MCPs in Cursor, and the endpoints/install sources are same-org and mostly consistent. However, default installation of all Gate skills, mutable-branch cloning, unpinned installs, and a hardcoded DEX API key make the footprint broader and riskier than a simple MCP installer should be.

Confidence: 84%Severity: 68%
AnomalyLOW
scripts/mcp-fragments/cursor/gate-main-npx.json

The fragment itself contains no overt malicious logic, but it creates a high-impact risk path: it executes an externally resolved CLI via npx and passes API credentials into that process environment. The fragment should be reviewed for (a) strict dependency/version pinning and integrity verification for "gate-mcp", and (b) secure secret handling to avoid credential leakage through logs/source control or the executed tool’s behavior.

Confidence: 60%Severity: 62%
Audit Metadata
Analyzed At
Apr 2, 2026, 12:24 AM
Package URL
pkg:socket/skills-sh/gate%2Fgate-skills%2Fgate-mcp-cursor-installer%2F@ec5492642c98dfd8c57283b9e4ed36924753451e