Back to skill
v1.0.1

Gate Exchange LaunchPool Skill

ReviewClawScan verdict for this skill. Analyzed May 1, 2026, 8:34 AM.

Analysis

Review before installing: this skill can stake or redeem Gate LaunchPool assets with a Gate API key and also tells the agent to follow an unbundled remote GitHub rules file as highest-priority instructions.

GuidanceOnly install this if you trust the Gate MCP ecosystem and have reviewed the linked runtime-rules file. Use a least-privilege Gate API key, verify that the MCP server is legitimate, and manually confirm only stake or redeem previews whose project, pool, coin, and amount are exactly what you intended.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

Abnormal behavior control

Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.

Agent Goal Hijack
SeverityHighConfidenceHighStatusConcern
SKILL.md
STOP — You MUST read and strictly follow the shared runtime rules before proceeding... These rules have the highest priority. → Read [gate-runtime-rules.md](https://github.com/gate/gate-skills/blob/master/skills/gate-runtime-rules.md)

The skill makes an external, mutable GitHub document authoritative before any tool use. Because this package includes high-impact account-write operations, unbundled remote instructions materially expand what the user is trusting.

User impactRemote instructions outside the reviewed package could influence how the agent handles Gate account operations.
RecommendationInstall only if you trust the Gate MCP source and have reviewed the linked runtime rules; the publisher should bundle or pin the runtime rules instead of relying on a mutable remote file.
Tool Misuse and Exploitation
SeverityMediumConfidenceHighStatusNote
SKILL.md
Execution Operations (Write) - cex_launch_create_launch_pool_order - cex_launch_redeem_launch_pool

These MCP tools can create staking orders and redeem staked assets. This is consistent with the skill purpose, and the referenced docs require confirmation, but the actions affect a financial account.

User impactIf you confirm an action, the agent may change your Gate LaunchPool staking position.
RecommendationBefore confirming, verify the project, pool, coin, and amount in the preview; do not confirm vague or unexpected stake/redeem requests.
Agentic Supply Chain Vulnerabilities
SeverityLowConfidenceMediumStatusNote
metadata
Source: unknown
Homepage: none

The registry metadata does not provide a verified source or homepage, while the skill documents a Gate GitHub repository and depends on Gate MCP components. This is a provenance gap rather than proof of malicious behavior.

User impactYou have less registry-level assurance that this package comes from the claimed Gate source.
RecommendationVerify the publisher and MCP server source through Gate's official channels before granting API-key access.
Permission boundary

Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.

Identity and Privilege Abuse
SeverityMediumConfidenceHighStatusNote
SKILL.md
API Key Required: Yes... Permissions: Launch:Write

The skill requires delegated Gate account authority for LaunchPool write operations. This is expected for the integration, but it is sensitive account access.

User impactA Gate API key with Launch:Write permission can authorize account-changing LaunchPool actions.
RecommendationUse the least-privilege Gate API key possible, keep it only in the trusted MCP configuration, and revoke it if you stop using the skill.