OpenMM
v0.1.0Open-source market making for AI agents. Multi-exchange trading, grid strategies, and real-time market data. CLI + MCP + Skills.
⭐ 0· 307·1 current·1 all-time
byAngelos Kappos@adacapo21
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
The name/description (multi-exchange market making, grid strategies, market data) matches the declared install (npm @3rd-eye-labs/openmm → openmm CLI) and the plugin/tooling. Required binary 'openmm' and the Node package dependency are coherent with the stated purpose. The code implements CLI calls and OpenClaw tools that match trading and market‑data functionality.
Instruction Scope
SKILL.md instructs installing the CLI, exporting exchange API keys to environment variables or plugin config, and running CLI commands or an MCP server. This is expected for a trading skill, but the docs also show running 'npx @qbtlabs/openmm-mcp' (which downloads and executes code at runtime) and examples that embed API keys in an MCP server config — both actions deserve caution because they execute remote packages or place credentials into processes that could be forwarded. The OpenClaw plugin registers both read-only tools and optional write tools (create/cancel orders, start/stop grids). Those write tools are marked optional and require allowlisting per the README, which is appropriate, but you must ensure they remain disabled unless explicitly allowed.
Install Mechanism
The install uses npm packages (@3rd-eye-labs/openmm and @qbtlabs/* plugins). npm installs are normal for this use case but carry supply‑chain risk (unlike a vetted OS package). The package.json uses 'latest' in dependencies (potentially mutable). The SKILL.md also suggests running 'npx' for an MCP server — npx fetches and runs a package on-demand which increases transient execution risk. No suspicious download URLs or extract-from-HTTP artifacts are present.
Credentials
Exchange API keys and a Bitget passphrase are the only sensitive secrets referenced, and they are proportionate to a trading skill. The top-level registry entry lists no required env vars, but subskills and plugin configs explicitly require exchange credentials — this is reasonable. The project warns to avoid withdrawal permissions and to not commit .env files, which aligns with least privilege practices. You should still use keys restricted to trading and read access only.
Persistence & Privilege
The skill does not request always:true or any elevated platform privileges. It registers an OpenClaw plugin that can persist configuration (plugin config holds API keys) which is normal for a plugin, and the optional trading tools require allowlisting. No evidence the skill attempts to modify other skills or system-wide agent settings.
Assessment
This package is coherent for trading use, but handle credentials and runtime installs carefully:
- Only provide API keys with the minimum permissions required (read + trade; disable withdrawals).
- Keep order-placing and strategy-starting tools disabled unless you explicitly allow them in your agent config; the plugin marks these as optional and documents allowlisting — follow that.
- Prefer pinning package versions instead of using 'latest' to reduce supply-chain/upgrade risk. Audit the npm packages (@3rd-eye-labs/openmm, @qbtlabs/*) and their GitHub sources before installing.
- Be cautious when running 'npx' (MCP server example) because npx downloads and executes package code at run time. Run it only in a trusted environment or after auditing the package.
- Store API keys in a secure secrets store if possible, or ensure plugin-config storage is protected; never commit .env files or credentials to source control.
- If you need higher assurance, review the upstream GitHub repositories and npm package contents (verify maintainers, inspect package code and release history) before installing on any production account or using real funds.
If you want, I can list the exact places in the code and docs that handle credentials and the tool registration lines that perform CLI execs so you can review them in detail.Like a lobster shell, security has layers — review code before you run it.
latestvk975w8ewc1bpcefhmyjp5s44yn81t0g9market-makingvk975w8ewc1bpcefhmyjp5s44yn81t0g9openmmvk975w8ewc1bpcefhmyjp5s44yn81t0g9tradingvk975w8ewc1bpcefhmyjp5s44yn81t0g9
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📈 Clawdis
Binsopenmm
Install
Node
Bins: openmm
npm i -g @3rd-eye-labs/openmm