Graph Polymarket MCP

PassAudited by ClawScan on May 10, 2026.

Overview

This appears to be a disclosed, read-only Polymarket data server, but users should protect their Graph API key and keep the optional HTTP/SSE endpoint local or secured.

Before installing, confirm you trust the npm/GitHub source, use a dedicated Graph API key, and monitor quota usage. Prefer the built-in read-only tools over custom GraphQL unless needed, and do not expose the HTTP/SSE endpoint to untrusted networks without access controls.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Your Graph API key will be sent to The Graph service and used for queries made by the agent.

Why it was flagged

The skill uses the user's Graph API key to call The Graph Gateway. This is expected for the subgraph tools and is disclosed, but it is still credential use that can consume quota.

Skill content
const apiKey = process.env.GRAPH_API_KEY; ... const url = `https://gateway.thegraph.com/api/${apiKey}/deployments/id/${ipfsHash}`;
Recommendation

Use a dedicated Graph API key with limited billing exposure, monitor query usage, and avoid sharing the key in prompts or logs.

What this means

The agent could run broader public-data queries than expected or use more of the Graph API quota.

Why it was flagged

The skill intentionally exposes a broad custom GraphQL query tool. It is limited to configured Polymarket subgraphs and appears read-only, but an agent can issue broad queries using the user's API key.

Skill content
"query_subgraph" ... description: "Execute a custom GraphQL query against a Polymarket subgraph" ... query: z.string().describe("GraphQL query string")
Recommendation

Use the specialized tools when possible, and only allow custom GraphQL queries when you understand the data scope and quota impact.

What this means

If the endpoint is exposed beyond localhost, other clients may be able to invoke the tools and consume API quota.

Why it was flagged

The optional HTTP/SSE transport exposes the MCP tools over a local server. This is disclosed and purpose-aligned, but the artifacts do not describe authentication for remote exposure.

Skill content
The SSE transport (`--http` / `--http-only`) starts a local HTTP server on port 3851 (configurable via `MCP_HTTP_PORT` env var).
Recommendation

Keep the SSE endpoint bound to localhost or place it behind firewall, authentication, or other access controls for remote deployments.