GoldRush MCP Skill

Use this skill to run GoldRush MCP operations through uxc using a fixed stdio endpoint.

Reuse the uxc skill for generic protocol discovery, output parsing, and auth/error handling rules.

Prerequisites

Core Workflow

Endpoint candidate inputs before finalizing:

  1. Verify protocol/path from official source and probe:
    • Official source: https://goldrush.dev/docs/goldrush-mcp-server
    • probe candidate endpoint with:
      • uxc --inject-env GOLDRUSH_API_KEY=$GOLDRUSH_API_KEY "npx -y @covalenthq/goldrush-mcp-server@latest" -h
    • cold start can take longer on first run because npx may need to download the package
  2. Configure credential for repeatable auth:
    • uxc auth credential set goldrush-mcp --auth-type bearer --secret-env GOLDRUSH_API_KEY
    • uxc auth credential set goldrush-mcp --auth-type bearer --secret-op op://Engineering/goldrush/api-key
  3. Use fixed link command by default:
    • command -v goldrush-mcp-cli
    • If missing, create it:
      • uxc link goldrush-mcp-cli "npx -y @covalenthq/goldrush-mcp-server@latest" --credential goldrush-mcp --inject-env GOLDRUSH_API_KEY={{secret}}
    • goldrush-mcp-cli -h
  4. Inspect operation schema before execution:
    • goldrush-mcp-cli getAllChains -h
    • goldrush-mcp-cli multichain_balances -h
    • goldrush-mcp-cli transactions_for_address -h
    • goldrush-mcp-cli historical_portfolio_value -h
  5. Prefer read-only discovery first, then expand into broader wallet-history or NFT scans.

Capability Map

GoldRush also exposes MCP resources such as config://supported-chains, config://quote-currencies, and status://all-chains. Inspect the live server after auth setup for the current full tool and resource list.

Recommended Usage Pattern

  1. Start with one focused read goal:
    • multichain balances for a wallet
    • recent transfers for an address
    • historical portfolio value over time
    • NFT ownership or token approval review
  2. Run -h on the specific tool before the first real call.
  3. Prefer a single wallet and chain first before running wide history scans.
  4. Parse the JSON envelope first, then inspect data.

Guardrails

References