gate-mcp-installer

Warn

Audited by Snyk on Mar 5, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The install script and SKILL/README explicitly configure and query the public Gate MCP endpoint (https://api.gatemcp.ai/mcp) and run mcporter list gate --schema (scripts/install-gate-mcp.sh and SKILL.md/README), meaning the agent fetches and reads untrusted remote tool schemas which can influence subsequent tool use and actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The installer script performs runtime installation (npm i -g mcporter) and configures/queries the Gate MCP endpoint https://api.gatemcp.ai/mcp (via mcporter list --schema), which fetches remote tool/schema data that can directly influence agent behavior and executes remote-provided code, so https://api.gatemcp.ai/mcp is a runtime external dependency that can control prompts/execute code.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 5, 2026, 01:29 PM