mt5-httpapi

SuspiciousAudited by ClawScan on May 13, 2026.

Overview

This is a coherent MetaTrader integration, but it can control live financial trades and may be exposed with optional or no authentication, so it needs careful review before use.

Install only if you intend to let an agent interact with MT5 trading accounts. Use a demo account first, set a strong API token, avoid public exposure, review the external GitHub stack before running it, and require manual confirmation before any live trade is placed, modified, or closed.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

An agent using this skill against a live account could open, alter, or close trades and cause financial loss if it misunderstands the user or market conditions.

Why it was flagged

The skill teaches the agent to use mutating trading operations. The visible instructions include checks, but do not establish an explicit human-approval gate or risk limit before live account changes.

Skill content
place/modify/close orders, manage positions ... GET for reading, POST for creating, PUT for modifying, DELETE for closing/canceling.
Recommendation

Use a demo or paper account by default, require explicit approval for every trade, set maximum lot/position limits, and disable mutating endpoints unless the user specifically authorizes them.

What this means

Anyone who can reach an unauthenticated API could potentially view account data or control trades for the configured broker account.

Why it was flagged

The setup stores broker account credentials and allows the API bearer token to be empty, creating broad delegated authority over a trading account if configured insecurely.

Skill content
Broker credentials — accounts.<broker>.<account_name> ... password: "your_password" ... `api_token` empty = open to anyone on the network.
Recommendation

Always set a strong API token, keep broker credentials out of shared files, restrict network access, and use least-privilege or demo trading accounts where possible.

What this means

If exposed publicly or if the token is leaked, remote parties could access account data and trading controls across configured terminals.

Why it was flagged

The optional tunnel can expose the same backend that routes to every terminal over the public internet, while authentication is optional elsewhere in the setup.

Skill content
Public Access via Cloudflare Tunnel ... To expose the API publicly ... service: http://nginx:80 ... a single backend covers every terminal.
Recommendation

Avoid public exposure unless necessary; if used, require a strong token, Cloudflare Access or equivalent identity controls, IP allowlisting, TLS, and separate accounts per risk boundary.

What this means

The static scan did not analyze the external repository, VM image, or installer behavior that will actually run.

Why it was flagged

The runnable implementation is pulled from an external repository and performs large automatic downloads during setup; this is purpose-aligned but not reviewable from the included instruction-only package.

Skill content
git clone https://github.com/psyb0t/mt5-httpapi ... make up ... First run downloads tiny11 (~4 GB), installs Windows ... then sets up Python + MT5 automatically.
Recommendation

Review the external repository and compose files before running, pin versions or checksums where possible, and install in an isolated environment first.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

A forgotten running service could continue exposing trading functions after the immediate task is complete.

Why it was flagged

The API is designed to run as a persistent service. This is disclosed and expected, but it keeps trading controls available until the user stops or secures the stack.

Skill content
make up          # start
make down        # stop ... 8888 | HTTP API entry (nginx, all terminals)
Recommendation

Stop the stack when not in use, disable public tunnels by default, and periodically verify which ports and services are running.