gate-mcp-installer

Warn

Audited by Socket on Apr 25, 2026

7 alerts found:

Anomalyx6Security
AnomalyLOW
scripts/mcp-fragments/claude/gatepay-local-mcp.json

This fragment itself contains no explicit malicious logic, but it creates a high-risk execution context: it runs an npm package dynamically via `npx -y` and supplies extremely sensitive wallet/private key material directly to that dependency. The primary concerns are supply-chain integrity (unpinning/identity of the executed package) and secret exposure impact if the dependency is compromised or misbehaves. Review and harden package provenance/version pinning and ensure secrets are handled via secure, minimal-privilege mechanisms rather than embedded config.

Confidence: 60%Severity: 68%
AnomalyLOW
scripts/mcp-fragments/cursor/gatepay-local-mcp.json

This fragment itself contains no explicit malicious logic, but it creates a high-risk execution context: it runs an npm package dynamically via `npx -y` and supplies extremely sensitive wallet/private key material directly to that dependency. The primary concerns are supply-chain integrity (unpinning/identity of the executed package) and secret exposure impact if the dependency is compromised or misbehaves. Review and harden package provenance/version pinning and ensure secrets are handled via secure, minimal-privilege mechanisms rather than embedded config.

Confidence: 60%Severity: 68%
AnomalyLOW
scripts/mcp-fragments/cursor/gate-dex.json

Best assessment: This snippet is not evidence of malware by itself—it’s a network-auth configuration. However, it hardcodes an API key (`MCP_AK_8W2N7Q`) directly in the distributed configuration, which is a significant supply-chain credential leakage risk. The bearer token is runtime-injected (`${GATE_MCP_TOKEN}`), which is safer, but outbound authenticated traffic to a third-party domain is inherently higher risk if any sensitive payload handling occurs elsewhere in the codebase.

Confidence: 78%Severity: 63%
AnomalyLOW
scripts/mcp-fragments/claude/gate-main-npx.json

The fragment itself contains no overt malicious logic, but it creates a high-impact risk path: it executes an externally resolved CLI via npx and passes API credentials into that process environment. The fragment should be reviewed for (a) strict dependency/version pinning and integrity verification for "gate-mcp", and (b) secure secret handling to avoid credential leakage through logs/source control or the executed tool’s behavior.

Confidence: 60%Severity: 62%
AnomalyLOW
scripts/mcp-fragments/cursor/gate-main-npx.json

The fragment itself contains no overt malicious logic, but it creates a high-impact risk path: it executes an externally resolved CLI via npx and passes API credentials into that process environment. The fragment should be reviewed for (a) strict dependency/version pinning and integrity verification for "gate-mcp", and (b) secure secret handling to avoid credential leakage through logs/source control or the executed tool’s behavior.

Confidence: 60%Severity: 62%
AnomalyLOW
scripts/mcp-fragments/codex/gate-main-gate-mcp-placeholder.toml

Best assessment: the snippet is not evidence of overt malware, but it is a high-impact security hygiene issue because it hardcodes API credentials in configuration and passes them into an external process via environment variables. Ensure real secrets are not committed, use secret managers/CI variables, and verify the `gate-mcp` binary provenance and logging behavior. Review rotatability of any potentially exposed credentials.

Confidence: 62%Severity: 55%
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill's broad trading/payment installer purpose mostly matches its capabilities, but it defaults to installing many MCP surfaces plus all gate-skills, forwards highly sensitive credentials, and includes a third-party merchant-discovery endpoint outside the Gate domain. The footprint is high-risk and broader than a minimal installer, though not clearly malicious from the provided content.

Confidence: 84%Severity: 76%
Audit Metadata
Analyzed At
Apr 25, 2026, 04:39 PM
Package URL
pkg:socket/skills-sh/gate%2Fgate-skills%2Fgate-mcp-installer%2F@9822c33689d4df9e8fe5f1eb7ffb0be07956224e