Hummingbot Deploy

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

The skill appears to deploy the stated Hummingbot stack, but it sets up high-impact trading access for AI agents using weak defaults and unpinned remote installation steps.

Use this only if you intentionally want to deploy Hummingbot and connect it to your AI agent. Before running it, review the remote scripts, pin versions where possible, replace all default credentials, keep the API off untrusted networks, and install the MCP component only when you are comfortable giving the agent access to your Hummingbot trading infrastructure.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

If connected to exchange credentials later, the agent-accessible Hummingbot API could affect real trading activity or deployed strategies.

Why it was flagged

The skill's purpose is disclosed, but installing MCP gives AI-agent tooling access to a trading API capable of placing or managing trading strategies. The artifacts do not clearly define approval gates, account limits, or containment for that delegated authority.

Skill content
**Hummingbot API** (Required): Your personal trading server that exposes a standardized REST API for trading, fetching market data, and deploying bot strategies across many CEXs and DEXs. ... **Hummingbot MCP** (Optional): MCP server that helps AI agents ... interact with Hummingbot API.
Recommendation

Install the MCP component only if you explicitly want your AI agent to access Hummingbot, and configure trading/account permissions and approvals conservatively.

What this means

Anyone who can reach the deployed service may be able to use the default credentials unless the user changes them.

Why it was flagged

The non-interactive setup writes weak default credentials for the API and broker. For a networked trading service, default admin credentials are a material access-control concern even though they are disclosed.

Skill content
API_USER=admin
API_PASS=admin
CONFIG_API_PASS=admin
... BROKER_API_USER=admin
BROKER_PASSWORD=password
Recommendation

Change all default usernames and passwords before exposing the service, and avoid deploying it on a network interface reachable by untrusted users.

What this means

The script that actually runs during installation could change after review, affecting what is installed or configured.

Why it was flagged

The instructions execute a remote script directly from the GitHub main branch rather than using a pinned version or the reviewed local file. This creates a provenance gap for installation-time code.

Skill content
bash <(curl -s https://raw.githubusercontent.com/hummingbot/skills/main/skills/hummingbot-deploy/scripts/install_mcp.sh)
Recommendation

Review the fetched script before running it, prefer a pinned commit or release tag, and avoid piping remote scripts directly into bash for high-impact trading infrastructure.

What this means

A future image update could change the MCP server behavior or security properties without the user noticing.

Why it was flagged

The MCP server image is pulled using the mutable latest tag, so the deployed container may not match a reviewed or reproducible version.

Skill content
MCP_IMAGE="hummingbot/hummingbot-mcp:latest"
...
docker pull "$MCP_IMAGE"
Recommendation

Pin the MCP Docker image to a specific version or digest and review release notes before upgrading.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

After restart, the agent may have ongoing access to the configured Hummingbot MCP server whenever the user allows MCP tools.

Why it was flagged

The script adds a persistent MCP server configuration to the selected agent CLI. This is purpose-aligned, but it means the Hummingbot tool remains available after the initial setup.

Skill content
$AGENT_CLI mcp add hummingbot -- $DOCKER_CMD
Recommendation

Confirm the MCP entry in your agent's configuration and remove it when you no longer want agent access to Hummingbot.