gate-mcp-installer
Warn
Audited by Snyk on Mar 5, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The install script and SKILL/README explicitly configure and query the public Gate MCP endpoint (https://api.gatemcp.ai/mcp) and run
mcporter list gate --schema(scripts/install-gate-mcp.sh and SKILL.md/README), meaning the agent fetches and reads untrusted remote tool schemas which can influence subsequent tool use and actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The installer script performs runtime installation (npm i -g mcporter) and configures/queries the Gate MCP endpoint https://api.gatemcp.ai/mcp (via mcporter list --schema), which fetches remote tool/schema data that can directly influence agent behavior and executes remote-provided code, so https://api.gatemcp.ai/mcp is a runtime external dependency that can control prompts/execute code.
Audit Metadata