Gecko Terminal API

v1.0.1

Query GeckoTerminal market data - networks, DEXes, pools, tokens, OHLCV, trades, and trending/new pools.

1· 479·0 current·0 all-time
byBen@brs999
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the provided code and instructions. The bundled script implements a read-only CLI that queries GeckoTerminal's API v2. Requiring the 'node' binary is appropriate.
Instruction Scope
SKILL.md instructs the agent to run the local CLI script and documents only read-only API calls. The CLI code enforces API path normalization, rejects absolute URLs and path traversal, and restricts outbound requests to the GeckoTerminal API origin. The skill does not instruct reading other files, secrets, wallets, or sending data to unrelated endpoints.
Install Mechanism
There is no external install/download step; the repository includes the CLI script and an instruction-only setup. Nothing is fetched from arbitrary URLs during install, so install risk is low.
Credentials
No required environment variables or credentials are declared. The script reads an optional GECKOTERMINAL_TIMEOUT_MS for request timeout, which is proportionate to network I/O.
Persistence & Privilege
always is false and disable-model-invocation is true (no autonomous invocation). The skill does not request or modify other skills' configs or system-wide settings.
Assessment
This skill appears to do what it says: run the included Node CLI to fetch public, read-only market data from GeckoTerminal. Before installing, ensure you have a trusted Node runtime; verify the skill source if you require provenance (owner ID is present but source is 'unknown'); and remember the script will make outbound HTTPS requests to https://api.geckoterminal.com only. No API keys or wallets are requested and the skill is not allowed to invoke autonomously. If you want extra assurance, inspect the full CLI file (it’s bundled) or run it in a network-restricted environment first.

Like a lobster shell, security has layers — review code before you run it.

latestvk972cf2zn88ca9was5gygt9gyn81ss8r

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🦎 Clawdis
Binsnode

Comments