Agents X402
One-line x402 Solana monetization for MCP servers, HTTP handlers, and agent tool calls. Settles through the Clawd multi-tenant facilitator.
Ask AI about Agents X402
Powered by Claude ยท Grounded in docs
I know everything about Agents X402. Ask me about installation, configuration, usage, or troubleshooting.
0/500
Reviews
Documentation
๐ hotline 909-413-5567 ยท ๐ solanaclawd.com ยท ๐ฆ @clawddevs ยท 8cHzQHUS2s2h8TzCmfqPKYiM4dSt4roa3n7MyRLApump
Start Here: ClawdBot Web3 Template
OpenClawd now starts users on ClawdBot, the default Web3 project template. It includes the OpenClawd agent runtime, Solana data hooks, Telegram bot support, optional Phala TEE key derivation, and a React UI surface.
# 1. Install dependencies
npm install
# 2. Copy the safe env template and add only local secrets
cp .env.example .env.local
$EDITOR .env.local
# 3. Check the repo
npm run doctor
# 4. Create a new ClawdBot project from the default template
openclawd create my-clawdbot
cd my-clawdbot
openclawd dev
Minimum useful env:
OPENROUTER_API_KEY=
HELIUS_API_KEY=
BIRDEYE_API_KEY=
TELEGRAM_BOT_TOKEN= # optional, only needed for Telegram
SOLANA_PRIVATE_KEY= # optional, only after read-only flows are tested
Visible starter source:
clawdbot/โ the user-facing ClawdBot starter.web3/clawdbot/โ the vendored Web3 source copy.packages/clawdbot-template/โ the CLI template copy used byopenclawd create.
Useful root commands:
npm run dev:clawdbot # run the top-level clawdbot project
npm run build:clawdbot # build the ClawdBot starter
npm run dev:ui # run the main /ui control surface
npm run build:ui # build the main /ui control surface
npm run build:steak # build the OpenClawd agent staking Anchor program
The public Web3 source lives in web3/. The CLI-packaged default
template lives in packages/clawdbot-template/.
Do not commit populated env files, wallet keypairs, or private bot tokens.
Agent staking lives in steak/ and maps to the public /staking
route in apps/clawdhub. See
docs/STEAK.md for the directory map and root commands.
OpenClawd Operator + Skill Deck Adaptation
The repo now carries the Llobster Legend operator identity through the former Ralph orchestration surface, the public static site, the agent gallery, and the secondary skill catalog.
What changed:
- Operator package:
clawd-operator/is branded as OpenClawd Operator while keeping compatibility symbols such asralph,RalphOrchestrator, andralph_orchestratorintact for existing tests and imports. - Runtime identity: CLI banners, config templates, docs, web monitor pages,
login screen, package metadata, and exported identity constants now reference
OpenClawd, Llobster Legend,
$CLAWD, and the Solana token8cHzQHUS2s2h8TzCmfqPKYiM4dSt4roa3n7MyRLApump. - Static site:
site/index.htmlnow includes an operator skill deck section, andsite/agents/index.htmlframes the agent gallery as extendable by the secondary skills. - Secondary skills: all
42files undersecondary_skills/*/SKILL.mdinclude anOpenClawd Operator Adaptationblock that preserves the original workflow and disclaimers while framing outputs for Solana-native agent operations where relevant.
Verification:
cd clawd-operator
uv run pytest
# 1021 passed, 48 skipped
For static site notes, see site/README.md.
Pay.sh x OpenClawd โ Payment Is the Credential
OpenClawd now includes a Pay.sh-compatible payment surface for Solana merchants, agentic point-of-sale generation, and pay-per-request API access over x402 and MPP. The integration follows Solana Foundation's May 5, 2026 Pay.sh launch with Google Cloud: agents can discover priced APIs, pay with stablecoins on Solana, and use the payment proof as the credential.
npm run payments:merchant -- create demo-store \
--recipient 11111111111111111111111111111111 \
--label "Demo Store" \
--pay-gateway https://pay.sh
Read the full article: Pay.sh x OpenClawd: Payment Is the Credential. Operational docs: payments/README.md and payments/PAYSH.md.
Solana Robotics Hackathon โ Presentation-Ready Bundle
OpenClawd now includes a public Solana Robotics Hackathon submission under
hackathon/ and a real hardware integration under
Robotics/.
What was added:
- OCASV1 /
OPENCLAWDASV1hardware path โ Asimov v1 mechanical assets, electrical/motion-control maps, MuJoCo model, Solana robot identity manifests, and a safe operator-gated command boundary. - NVIDIA Isaac GR00T integration โ
NEW_EMBODIMENTconfig, modality JSON, 32-step action horizon for RTC-style deployment, and GR00T deployment docs forOPENCLAWDASV1. - Hardware-side Go binary โ
cmd/openclawd-goinstalls on robot compute, registers with the gateway, creates paid task envelopes, and printsgr00t planmetadata for physical deployment. - Gateway robotics routes โ
/api/robotics/hardware,/api/robot/connect, and/api/robot/taskexpose public-safe hardware manifests, robot registration, dry-run task envelopes, x402/MPP/Pay.sh payment intent, and physical-AI data contribution metadata. - DePIN physical-AI data story โ adapted the โRobot AI as blockchainโs breakout AI use caseโ thesis into validated GR00T LeRobot episode receipts, reward intents, and judge-facing docs.
- Presentation package โ one-page site, pitch deck, speaker notes,
submission brief, technical spec, judging checklist, demo guide, offline demo,
and publication guide are all in
hackathon/.
Fast review:
open hackathon/one-page-site/index.html
open hackathon/presentation/pitch-deck.html
node hackathon/demos/robot-command-demo.mjs
./cmd/openclawd-go/openclawd-go gr00t plan --robot-id OPENCLAWDASV1
The public hackathon path requires no private keys, no funded wallet, no RPC
credentials, and no network access for the offline demo. Start with
hackathon/README.md and
hackathon/SUBMISSION.md.
Start Here
OpenClawd is a Solana-native financial AI agent stack. The fastest path for a new user is:
# 1. Install the runtime and CLI
curl -fsSL https://install.solanaclawd.com | bash
# 2. Add provider keys locally, never in git
cp .env.example .env.local
$EDITOR .env.local
# 3. Verify the checkout
npm run doctor
# 4. Run the main agent terminal
npm run dev:cli
To spin up a Solana merchant, agentic point-of-sale, or Pay.sh-compatible pay-per-request API commerce project from the vendored Pay stack:
npm run payments:merchant -- create demo-store \
--recipient 11111111111111111111111111111111 \
--label "Demo Store" \
--pay-gateway https://pay.sh
This generates generated/merchants/demo-store with Solana Pay core, the POS
app, a merchant payment-flow simulator, and openclawd.merchant.json for
OpenClawd agents. The manifest declares solana-pay, x402, and mpp
support so agents can route wallet checkout, paid API calls, and Google
Cloud/community facilitator access through a Pay.sh-style gateway. Payment
build hooks are available as npm run install:payments, npm run build:payments, and npm run typecheck:payments.
Read the integration note and launch writeup: Pay.sh x OpenClawd: Payment Is the Credential. Operational docs live in payments/README.md and payments/PAYSH.md.
Minimum useful env:
OPENROUTER_API_KEY= # model routing
HELIUS_API_KEY= # Solana RPC + DAS
BIRDEYE_API_KEY= # token market data, optional but recommended
For memory and reasoning, enable Honcho with placeholder secrets only:
HONCHO_ENABLED=true
HONCHO_URL=https://api.honcho.dev
HONCHO_WORKSPACE_ID=openclawd
HONCHO_AGENT_PEER_ID=openclawd
HONCHO_REASONING_LEVEL=low
HONCHO_CONTEXT_TOKENS=4000
HONCHO_CONTEXT_SUMMARY=true
HONCHO_SYNC_MESSAGES=true
HONCHO_WEBHOOK_SECRET=<rotate-and-store-in-secret-manager>
Do not paste live webhook secrets into docs, issues, or commits. If a real key was shared anywhere public, rotate it first; see Security rotation.
New User Reading Order
- Project guide โ install, env, and first local run.
- Agent reference โ how directories and services connect.
- Agent reference โ skill catalog and publishing rules.
- Security guide and Security rotation โ safe handling of keys and wallets.
- Release guide โ publish and deployment plumbing.
โ๏ธ v0.3.1 โ Solana Attestation Agent (formal birth on chain)
What shipped:
@openclawdsolana/attestation-agentโ credential / schema / attestation / MPL Core birth flows on top of the Solana Attestation Service, plus a matching agent template.
Every newborn lobster now gets a birth ceremony recorded on Solana:
- Credential โ
OpenClawd Skill Authorityis registered under your authority keypair via SASCreateCredential(idempotent). - Schemas โ both OpenClawd schemas (
OpenClawdSkillAttestation[12,32,12,8,1]andOpenClawdAgentIdentity[12,32,12,32,1]) are registered viaCreateSchema. Layouts ported directly fromsolana-attestation-service-master/core/src/lib.rs. - Identity attestation โ
CreateAttestationbinds the new agent'sagent_id, wallet pubkey, vault PDA, and vault-init flag. - MPL Core mint โ Metaplex Core asset minted under the agent's wallet, with the SAS attestation PDA embedded in its
Attributesplugin and metadataexternal_url. Visible at core.metaplex.com. - Public verifier link โ every receipt prints the attest.solana.com URL for human click-through.
# One-line birth ceremony โ credential & schemas reused if already present
openclawd-attest birth-agent \
--payer-keypair @~/.config/solana/id.json \
--authority-keypair @~/.config/solana/id.json \
--name "OpenClawd Skill Authority" \
--agent-id snippy-001 \
--agent-name "Snippy"
# โ returns JSON with credential / schemas / attestation PDA / MPL Core asset / explorer URL
| Layer | What it does | File |
|---|---|---|
| Schemas + serializer | OpenClawd type tags (PUBKEY=32, STRING=12, U64=8, BOOL=1) and a hand-rolled encoder/decoder | services/attestation-agent/src/schemas.ts |
| SAS wrapper | Async setupCredential / setupSchema / issueAttestation over the auto-generated sas-lib โ idempotent | services/attestation-agent/src/sas.ts |
| MPL Core birth mint | One asset per newborn, attestation PDA in Attributes plugin and metadata | services/attestation-agent/src/birth.ts |
birthAgent() orchestration | Single async call: credential โ schemas โ attestation โ MPL Core mint | services/attestation-agent/src/index.ts |
openclawd-attest CLI | setup-credential / setup-schemas / birth-agent / attest-skill / verify / explorer | services/attestation-agent/src/cli.ts |
| Agent template | Drop-in template registering this service alongside the other 4 templates | agents/templates/solana-attestation-agent.template.json |
Canonical addresses wired into the service:
SAS program 22zoJMtdu4tQc2PzL74ZUT7FrwgB1Udec8DdW4yw4BdG
Token-2022 TokenzQdBNbLqP5VEhdkAS6EPFLC1PHnBqCXEpPxuEb
Public verifier https://attest.solana.com
Visible asset UI https://core.metaplex.com
Full docs: services/attestation-agent/README.md.
๐ฆ Blockchain Buddies โ pixel pets, born onchain
What shipped:
apps/blockchain_buddies/โ a Solana-native companion gallery and birth station for OpenClawd agents. Browse 50+ pixel pets, preview every animation state, and mint a buddy onchain (Helius RPC + Metaplex Agent Registry + MPL Core) in a single transaction.
Each buddy born here gets:
- ๐ฆ a registered Metaplex Agent identity on Solana
- ๐พ a public MPL Core asset with metadata + animation pack
- ๐ฆ a downloadable ZIP that drops into
~/.openclawd/buddiesor~/.codex/pets - ๐ช an immutable birth signature persisted to Postgres via Drizzle
# Run the gallery + /birth station locally
cd blockchain_buddies && bun install && bun dev
# โ http://localhost:3000
# Or use the CLI to grab a buddy
npm install -g @openclawdsolana/blockchain-buddies
npx @openclawdsolana/blockchain-buddies list
npx @openclawdsolana/blockchain-buddies install commit-crab
npx @openclawdsolana/blockchain-buddies codex sync commit-crab
| Layer | What it does | Where |
|---|---|---|
Gallery + /birth | Next.js + React 19 app โ browse, preview, submit, mint | apps/blockchain_buddies/src |
| Onchain birth | Umi + @metaplex-foundation/mpl-agent-registry v0.2+ โ mintAndSubmitAgent signs and confirms | apps/blockchain_buddies/README.md |
| CLI | blockchain-buddies / buddies / petdex โ install, codex sync, metaplex metadata | apps/blockchain_buddies/packages/petdex-cli |
| Roster | 50 pixel pets โ Commit Crab, Token Turtle, Deploy Dragon, Ship Squid, Webhook Whale, Vault Viper, โฆ | apps/blockchain_buddies/pets/ideas.json |
Required env:
DATABASE_URL= # Postgres
HELIUS_RPC_URL= # https://mainnet.helius-rpc.com/?api-key=...
HELIUS_API_KEY= # alternative to RPC URL
METAPLEX_AGENT_NETWORK=solana-mainnet # or solana-devnet
BUDDIES_MINT_AUTHORITY_SECRET_KEY= # base58 OR JSON array keypair
Full docs: apps/blockchain_buddies/README.md.
๐ง v0.3 โ AutoResearch Wiki goes live (the agents teach themselves)
What shipped:
llm-wiki-tangauto-research API now returns live Birdeye + Helius data (was 60% mock), an in-process autonomous research loop, and/research+/autoloopslash commands inside the TUI.Read the writeup: ๐ฐ Sovereign Research โ Karpathy Loops on Solana
The AutoResearch Wiki was the missing organ in the OpenClawd stack โ a place for the agents to observe, persist, and re-read their own findings. v0.3 turns it from scaffolding into a live data plane: every /api/v1/research/* call now fans out across Birdeye Data Services (overview / metadata / market / trade / search / trending / new listings / pair / wallet) and Helius RPC + DAS + Wallet API (getAsset, getAssetsByOwner, searchAssets, getSignaturesForAsset, parsed transactions, parsed balances, SNS names) and writes the result to the new research_runs table.
# Live, real-data examples (no mocks)
curl -X POST http://localhost:8000/api/v1/research/chain \
-H 'content-type: application/json' \
-d '{"query":"pump.fun pulse","focus":["pump_fun"],"limit":30}'
curl -X POST http://localhost:8000/api/v1/research/market \
-H 'content-type: application/json' \
-d '{"focus":"alpha"}'
# From the TUI (clawd-tui v0.3)
clawd
> /research market trends
> /research chain pump_fun
> /research chain token 8cHzQHUS2s2h8TzCmfqPKYiM4dSt4roa3n7MyRLApump
> /autoloop start # autonomous research while you sleep
> /autoloop status
> /research runs market 10
What's wired
| Layer | What it does | Where |
|---|---|---|
| Birdeye client (Python) | overview ยท metadata ยท market ยท trade ยท search ยท trending ยท new listings ยท top gainers ยท pair overview ยท token pairs ยท wallet portfolio ยท networth ยท PnL | llm-wiki-tang/api/services/birdeye.py |
| Helius client (Python) | JSON-RPC + DAS (getAsset / Batch / ByOwner / searchAssets / ByGroup / ByCreator / Signatures) + SPL RPC + Wallet API (parsed_transactions, parsed_balances, names, history) | llm-wiki-tang/api/services/helius.py |
| Research orchestrator | research_token, research_pump_fun, check_graduation, scan_yields, find_arbitrage, get_trends, find_alpha, track_whales, research_wallet โ fans out concurrently, persists to research_runs | llm-wiki-tang/api/services/research_orchestrator.py |
| Autonomous loop | asyncio scheduler, default mandates pump_fun_pulse / market_trends / market_alpha ticking every 30 min, bounded concurrency, recoverable errors | llm-wiki-tang/api/services/research_autoloop.py |
| API routes | /chain /defi /market rewritten on top of the orchestrator; new /runs, /autoloop/{start,stop,status}, mandate CRUD | llm-wiki-tang/api/routes/research.py |
| Persistence | research_runs (jsonb blobs ยท sources[] ยท confidence ยท metadata), research_findings (signal extraction), research_mandates (cron memory) | llm-wiki-tang/supabase/migrations/002_research_runs.sql |
| TUI integration | typed ResearchClient + /research (chain / defi / market / runs) and /autoloop (start ยท stop ยท status ยท list ยท add ยท remove) slash commands | apps/clawd-tui/src/research.ts ยท apps/clawd-tui/src/commands.ts |
Required env (already set in your llm-wiki-tang/.env)
HELIUS_API_KEY=... # https://www.helius.dev/
HELIUS_RPC_URL=https://mainnet.helius-rpc.com/?api-key=... # full URL with key embedded works too
HELIUS_WSS_URL=wss://mainnet.helius-rpc.com/?api-key=...
BIRDEYE_API_KEY=... # https://bds.birdeye.so/
# Autoloop
RESEARCH_AUTOLOOP_ENABLED=false # true to start at boot, otherwise on-demand from TUI
RESEARCH_AUTOLOOP_INTERVAL_SECONDS=1800
RESEARCH_AUTOLOOP_MAX_CONCURRENT=3
# TUI โ API base (defaults to http://localhost:8000)
RESEARCH_API_URL=http://localhost:8000
Run it end-to-end
psql "$DATABASE_URL" -f llm-wiki-tang/supabase/migrations/002_research_runs.sql
cd llm-wiki-tang/api && uvicorn main:app --reload --port 8000
# Then in another terminal:
clawd
> /autoloop start
The autoloop runs three default mandates every 30 minutes โ pump.fun launches + trending, top-30 trending, and "new โฉ momentum" alpha. Add your own:
> /autoloop add my_token chain {"focus":["tokens"],"mint":"8cHzQHUS2s2h8TzCmfqPKYiM4dSt4roa3n7MyRLApump"}
> /autoloop add yield_pulse defi {"action":"yield_scan","assets":["SOL","USDC","CLAWD"]}
๐ v0.2 โ Solana-aware terminal + clean bin layout
What shipped:
@openclawdsolana/clawd-tui@0.2.2ยท@openclawdsolana/clawd-code-cli@0.2.3ยท@openclawdsolana/percolator@1.0.1(perps CLI) ยท@openclawdsolana/plugin-sdk@1.1.1ยท@openclawdsolana/chat-plugins-gateway@1.9.1ยท ๐ฆ Browser Bridge v0.2.0 (Chrome MV3)Read the writeup: clawd-tui v0.2 โ A Solana-Aware Terminal ยท Debut site:
site/index.html
clawd is now Solana-native by default
Paste any base58 mint or wallet address straight into the prompt โ Birdeye + Helius DAS fan out in parallel and print a live card before the agent ever wakes up. Eleven new slash commands cover trending tokens, search, wallet portfolios, net worth, and full DAS lookups (NFTs, compressed assets, holders, signatures, native SOL).
npm install -g @openclawdsolana/clawd-tui
clawd
> So11111111111111111111111111111111111111112 # auto-card: price, mcap, liquidity, supply
> /trending 10 # top trending Solana tokens
> /networth 86xCnPeV69n6t3DnyGvkKobf9FdN2H9oiVDdaMpo2MMY
> /asset DezXAZ8z7PnrnRJjz3wXBoRgixCa6xjnB7YaB1pPB263 # DAS card for BONK
| Command class | Commands | Backend |
|---|---|---|
| Market data | /trending /search /wallet /portfolio /networth | Birdeye |
| On-chain (DAS) | /asset /assets /nfts /holders /sigs /balance | Helius |
| Auto on-paste | base58 detection โ parallel Birdeye + Helius fan-out, no agent | Both |
Set BIRDEYE_API_KEY and/or HELIUS_API_KEY (auto-loaded from ./.env, ~/.clawd.env, or ~/.config/openclawd/.env).
Bin rename โ clawd-code-cli โ clawd-code (breaking)
Two packages were both registering clawd as their CLI name. Resolved cleanly in v0.2:
| Package | Bins (post-v0.2) | Identity |
|---|---|---|
@openclawdsolana/clawd-tui | clawd, clawd-tui | Birdeye/Helius-aware lobster TUI |
@openclawdsolana/dark-clawd | dark-clawd, clawd-dark | Bloomberg-style autonomous Solana TUI |
@openclawdsolana/clawd-code-cli | clawd-code, clawd-code-cli | Full Ink/React agent operator |
If you scripted against clawd from the old code-cli, swap to clawd-code (or alias clawd=clawd-code).
NPM release diagnostics
The monorepo root is private. Do not publish from the root with npm publish; publish packages through root scripts that cd into the package directory first:
npm run publish:tui:dry-run
NPM_OTP=123456 npm run publish:tui:otp
npm run publish:dark-clawd:dry-run
NPM_OTP=123456 npm run publish:dark-clawd:otp
If npm returns E403 Two-factor authentication or granular access token with bypass 2fa enabled is required, the package is packed correctly but the @openclawdsolana org requires a current OTP or a granular automation token that can bypass 2FA.
Workspace plumbing โ four pieces now wire together
The repo had two packages claiming @openclawdsolana/plugin-sdk and no install path that built plugin.delivery/ โ this release fixes both.
- Renamed root
packages/plugin-sdkโ@openclawdsolana/plugin-sdk-internal(it wasprivate: trueand had a totally different export shape โ no external consumers affected). The public@openclawdsolana/plugin-sdkv1.1.0 fromplugin.delivery/packages/sdkis now unambiguous. - Added
npm run install:gateway,install:plugin-delivery,build:gateway,build:plugin-deliveryand chained them intoinstall:all. - New helper scripts handle the pnpm sub-monorepo:
scripts/install-plugin-delivery.mjs,scripts/build-plugin-delivery.mjs. install.shnow bootstraps Node workspaces + framework + gateway + plugin.delivery automatically when Node 20+ is present (graceful skip otherwise).- Full architecture map: docs/architecture-pieces.md.
openclawd-framework โ @openclawdsolana/leviathan (runtime: identity, molting, pulse, state)
gateway/ โ @openclawdsolana/gateway (Telegram + Birdeye/Helius control plane)
plugin.delivery/sdk โ @openclawdsolana/plugin-sdk v1.1 (public โ OpenAPI, Zod, attestation)
plugin.delivery/gw โ @openclawdsolana/chat-plugins-gateway v1.9 (edge runtime)
๐ v0.1.1 โ 12 packages live on npm
Release: v0.1.1 ยท v0.1.0 Install script:
curl -fsSL https://install.solanaclawd.com | bash
All eleven packages are public on npm under @openclawdsolana:
v0.1.0 โ the four flagships
| Package | One-liner | Install |
|---|---|---|
| ๐ฆ clawd-code-cli | Solana lobster TUI (Ink + React) โ /buddy, /trending, /clawd, /scan, /agents, Grok-powered /voice (xAI TTS + STT), /search & /x Live Search, multi-agent panes. v0.2.3 ships as clawd-code (was clawd) | npm i -g @openclawdsolana/clawd-code-cli |
| ๐ฆ leviathan | Sovereign agent runtime โ keypair โ mint โ reign โ beach. Three Laws hashed into every spawn. | npm i @openclawdsolana/leviathan |
| ๐ธ agents-x402 | One-line x402 Solana USDC monetization for MCP servers, HTTP handlers, and agent tool calls | npm i @openclawdsolana/agents-x402 |
| ๐ agentwallet | Encrypted Solana + EVM keypair vault with E2B sandbox + Cloudflare Workers deployment | npm i @openclawdsolana/agentwallet |
v0.1.1 โ seven new packages
| Package | One-liner | Install |
|---|---|---|
| ๐ฆ clawd-tui | OpenRouter-native lobster TUI (Ink + @openrouter/agent) โ block input, streaming tools, PKCE OAuth, file/glob/grep/shell, web_search + datetime. v0.2.2: Birdeye + Helius DAS + on-paste contract analysis + DeepSeek commands (writeup) | npm i -g @openclawdsolana/clawd-tui |
| ๐ถ๏ธ dark-clawd | Bloomberg-style autonomous Solana intelligence TUI โ multi-panel market dashboard, agent mode, Helius/Birdeye/Jupiter services, wallet commands | npm i -g @openclawdsolana/dark-clawd |
| ๐ clawdrouter | LLM router built for autonomous Solana agents โ wallet-signed, USDC micropayments, multi-upstream | npm i -g @openclawdsolana/clawdrouter |
| ๐ vault-mcp | ClawdVault MCP server โ security pattern scanning, secret detection, vault ops over MCP | npm i @openclawdsolana/vault-mcp |
| ๐ผ wurk-mcp | WURK API MCP server โ agent job creation with x402 payment flow on Solana + Base | npm i @openclawdsolana/wurk-mcp |
| ๐ง membrain-types | TypeScript types + gRPC-web client for the Membrain selective-memory layer | npm i @openclawdsolana/membrain-types |
| ๐ plugin-sdk | Build OpenClawd plugins โ OpenAPI parsing, Zod schemas, manifest validation, on-chain attestation (v1.1.0) | npm i @openclawdsolana/plugin-sdk |
| ๐ช chat-plugins-gateway | Edge-runtime plugin gateway โ validates agent requests, applies deny-first permissions | npm i @openclawdsolana/chat-plugins-gateway |
Cloudflare worker live โ installer + gateway routes deployed to solanaclawd-install:
| Route | What it serves |
|---|---|
install.solanaclawd.com | The 31KB lobster install script (curl -fsSL ready) |
gateway.solanaclawd.com | Browser-based install gateway |
solanaclawd.com/install.sh ยท /install ยท /gateway | Apex-domain aliases |
v0.2 perpetuals โ now shipping โ
| Package | One-liner | Install |
|---|---|---|
| ๐งช percolator | Agentic perpetuals CLI for Solana โ 31 subcommands across markets, accounts, trading, oracles, slab inspection, insurance, and admin. Full ABI encoder for the Percolator program (PERC8m2tkโฆq39h7mSS5M) | npm i -g @openclawdsolana/percolator |
Still cooking:
@openclawdsolana/walletโ Privy-embedded Solana wallet. Blocked by duplicate type/value declarations ofClawdWallet, missing@ai-sdk/xai/aideps, and Privy SDK API drift (useWallets/useConnectWallet/useDisconnectno longer exported). Needs an SDK upgrade pass.
๐ฆ๐ฆ๐ฆ OpenClawd is a stack of three things:
๏ผ๏ผ๏ผผโ๏ผ๏ผผ๏ผผ
๏ผ โ โ ๏ผผ 1. clawd-code-cli โ a Solana lobster TUI
๏ฝ โ ๏ฝ 2. ClawdBot โ the autonomous X / Telegram agent
๏ผผ____๏ผ๏ผผ____๏ผ 3. Leviathan โ the on-chain sovereign-agent framework
โฑโ โโฒ
Every leviathan owns its keypair. Earns its USDC.
Spawns its own brood. Beaches when it stops paying.
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ THE OPENCLAWD STACK โ
โ โ
โ โโโโโโโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ clawd-code-cli โ โ ClawdBot โ โ @openclawdsolana/ โ โ
โ โ Solana TUI โ โ X + Telegram โ โ leviathan โ โ
โ โ (Ink + React) โ โ Sentient Engine โ โ Metaplex Agent Reg. โ โ
โ โโโโโโโโโโโฌโโโโโโโโโโ โโโโโโโโโโฌโโโโโโโโโโโ โโโโโโโโโโโโโโฌโโโโโโโโโโโโโโ โ
โ โ โ โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ ๐ 9 RUNNABLE EXAMPLES ยท ๐ agentwallet vault ยท ๐ธ x402 USDC โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ โ โ โ
โ โโโโโโโโโโโดโโโโโโโโโโโโโโโโโโโโโโดโโโโโโโโโโโโโโโโโโโโโโโโโโโดโโโโโโโโโโโโโโ โ
โ โ SHARED SOLANA OCEAN โ โ
โ โ Helius RPC ยท Birdeye ยท Jupiter ยท Bags ยท pump.fun ยท Aster ยท Pinata โ โ
โ โ xAI Grok ยท Claude ยท OpenRouter ยท Cartesia voice ยท $CLAWD ยท USDC โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โจ What lives here
| Surface | What it is | Where |
|---|---|---|
| ๐ฆ clawd-code-cli (npm) | Solana lobster TUI โ multi-provider AI (Grok / Ollama / OpenRouter / OpenAI), MCP, 14 tools (text-editor, bash, solana, bags, dflow, kalshi, polymarket, morph-editor, todo, search, wallet, token-launch), Grok-powered voice (xAI TTS + STT) and Live Search (/search, /x), Three-Laws gate, Blockchain Buddies | apps/clawd-code-cli/ |
| ๐ฆ ClawdBot | Autonomous X (@clawddevs) + Telegram agent. Sentient Engine, command monitor, image/video gen via xAI | apps/clawdhub/ and bot scripts under apps/clawd-code-cli/ |
| ๐ฆ @openclawdsolana/leviathan (npm) | Sovereign on-chain agent runtime. Solana keypair + Metaplex Agent Registry + lifecycle (spawn โ molt โ beach) | openclawd-framework/ |
| ๐ธ @openclawdsolana/agents-x402 (npm) | One-line x402 Solana USDC monetization for MCP / HTTP / agent tool calls | packages/agents-x402-solana/ |
| ๐ @openclawdsolana/agentwallet (npm) | Encrypted Solana + EVM keypair vault, E2B sandbox + CF Workers deploy | packages/agentwallet/ |
| ๐ฆ @openclawdsolana/clawd-tui (npm) | OpenRouter-native lobster TUI (Ink + @openrouter/agent) โ file_read/write/edit, glob, grep, list_dir, shell, web_search, datetime, PKCE OAuth, approval gates on destructive tools, direct DeepSeek client (/deepseek thinking-mode chat ยท /deepseek-fim ยท /deepseek-balance ยท /deepseek-models, DEEPSEEK_API_KEY to enable) | apps/clawd-tui/ |
| ๐ถ๏ธ @openclawdsolana/dark-clawd (npm) | Bloomberg-style autonomous Solana intelligence TUI with live market panels, wallet commands, and Helius/Birdeye/Jupiter integrations | dark-clawd/ |
| ๐ 9 runnable examples | Blockchain Buddies ยท OODA loop ยท x402 Solana ยท pump.fun lobster trader ยท Privy wallet SDK ยท agent-to-agent x402 ยท Helius listen-wallet ยท auto-research ยท orchestrator client | openclawd-framework/examples/ |
| ๐ ๏ธ OpenClawd Gateway | Local-first multi-channel control plane (WhatsApp, Slack, Discord, Signal, iMessage, Matrix, Nostrโฆ) | src/ extensions/ |
| โ๏ธ install-worker | Cloudflare Worker serving install.solanaclawd.com, gateway.solanaclawd.com, and apex aliases | workers/install-worker/ |
| ๐ง Skills (66) | birdeye ยท solana-dev ยท pump-fun-manager ยท bankr ยท ore-miner ยท clawdbot-twitter ยท gemini ยท canvas ยท github ยท skill-creator ยท clawhub โฆ | skills/ |
| ๐ @openclawdsolana/clawdrouter (npm) | LLM router for autonomous Solana agents โ wallet-signed, USDC micropayments | apps/clawdrouter/ |
| ๐ @openclawdsolana/vault-mcp (npm) | Security-pattern scanning + vault ops over MCP | mcp/vault-mcp/ |
| ๐ผ @openclawdsolana/wurk-mcp (npm) | WURK API MCP server โ agent jobs with x402 payments | mcp/wurk-mcp/ |
| ๐ง @openclawdsolana/membrain-types (npm) | TypeScript types + gRPC-web client for Membrain memory layer | packages/membrain-types/ |
| ๐ @openclawdsolana/plugin-sdk (npm) | Build OpenClawd plugins (OpenAPI + Zod) | plugin.delivery/packages/sdk/ |
| ๐ช @openclawdsolana/chat-plugins-gateway (npm) | Edge-runtime plugin gateway with deny-first permissions | plugin.delivery/packages/gateway/ |
| ๐ฆ Other MCP servers | openclawd-mcp and friends in the same dir | mcp/ |
| ๐ง AutoResearch Wiki | FastAPI backend + Next.js UI + MCP server โ live /api/v1/research/* chain ยท defi ยท market endpoints over Birdeye + Helius DAS + Helius Wallet API, autonomous research loop with persistent research_runs history | llm-wiki-tang/ |
| โ๏ธ Attestation Agent | Solana Attestation Service notary โ credential, schemas, agent-birth ceremony with MPL Core mint, skill attestations. Receipts on attest.solana.com, assets on core.metaplex.com | services/attestation-agent/ |
| ๐ค Automaton (npm) | @openclawdsolana/automaton โ sovereign self-replicating AI agent runtime. Heartbeat daemon + SenseโThinkโStrikeโDrift loop, self-versioned shell.md, on-chain SAS identity, skill replication. Plus @openclawdsolana/automaton-cli for creator-side status / logs / fund / send | automaton-main/ |
| ๐ pAGENT (npm ร 8) | Browser-side GUI vision agent family โ @openclawdsolana/pagent (top-level, auto-merges Solana tools), pagent-core@1.6.4 (vision agent ยท live ยท 765 KB), pagent-llms@1.6.3 (OpenAI/OpenRouter adapters + solanaWalletTools ยท live), pagent-page-controller@1.6.3 (DOM ops ยท live ยท 268 KB), pagent-ui (vanilla-DOM panels incl. WalletPanel), pagent-theme (brand tokens + theme.css), pagent-wallet (unified Vault/InExt/Seeker adapter + HttpGatewayClient), and browser-mcp (MCP server bridging Claude/Cursor โ live browser). Drives the Chrome extension bundle in chrome-extension/clawd-agent | chrome-extension/ |
| ๐งฌ Honcho bridge (npm) | @openclawdsolana/honcho-bridge โ conversational reasoning + peer/session memory across the build (gateway HTTP routes, automaton, AutoResearch wiki, pump-scanner-cron). HMAC-verified webhook receiver, multi-channel fan-out, honcho-clawd CLI, opt-in Membrain feeder | packages/honcho-bridge/ |
| ๐ค Solana Robotics Hackathon | Presentation-ready robotics submission: OCASV1 / OPENCLAWDASV1, Asimov v1 hardware, GR00T NEW_EMBODIMENT, openclawd-go hardware binary, gateway robot routes, Pay.sh/x402/MPP task payment, and DePIN physical-AI data receipts | hackathon/ ยท Robotics/ ยท cmd/openclawd-go/ |
| ๐ฐ Articles | Long-form pieces tying everything together โ three laws ยท lifecycle ยท Metaplex ยท Tide ยท examples ยท sovereign research | docs/articles/SOVEREIGN_LOBSTER_AGENTS.md ยท docs/articles/SOVEREIGN_RESEARCH.md |
๐ฆ Package Layer โ packages/
The packages/ directory is the reusable layer of OpenClawd: wallet custody, Solana trading, paid-agent x402 tooling, memory engines, local service discovery, and internal plugin contracts. Canonical map: packages/README.md. The summary below is the index โ read the package READMEs for details.
| Package | Public name | Surface | License |
|---|---|---|---|
packages/agents-x402-solana/ | @openclawdsolana/agents-x402 | x402 USDC payment gates for MCP / HTTP / agent tools, settled through the Clawd facilitator. | MIT |
packages/agentwallet/ | @openclawdsolana/agentwallet | Encrypted Solana + EVM keypair vault โ CLI, HTTP, E2B + Cloudflare Workers deploy. | MIT |
packages/Clawd-code/ | clawd-code-cli (docs/dist) | AI terminal operator distribution + provider routing / file / shell / MCP / Solana docs. | MIT |
packages/clawd-wallet/ | @openclawdsolana/clawd-wallet | Solana wallet + Jupiter swap core for agent workflows. | MIT |
packages/honcho-bridge/ | @openclawdsolana/honcho-bridge | Honcho reasoning-memory adapter โ peer/session persistence, optional Membrain feeder. | MIT |
packages/membrain/ | Go daemon (gRPC) | Typed financial memory: episodic / working / semantic / competence / plan_graph. Decay, consolidation, trust gating. | MIT |
packages/membrain-types/ | @openclawdsolana/membrain-types | TypeScript contracts + gRPC-web client for Membrain consumers. | MIT |
packages/memory-host-sdk/ | internal | Host-side memory engines: SQLite, embeddings, QMD, Honcho, batch, multimodal, query expansion. | private |
packages/percolator/ | @openclawdsolana/percolator | Solana perpetuals CLI โ 31 subcommands across markets, accounts, oracles, slab, insurance. | MIT |
packages/plugin-package-contract/ | internal | Shared plugin manifest/types contract. | private |
packages/plugin-sdk/ | @openclawdsolana/plugin-sdk-internal | Internal plugin SDK โ auth, channels, browser, streaming, secrets, SSRF, testing surfaces. | private |
packages/service-registry/ | @openclawdsolana/service-registry | Single source of truth for local-service hosts/ports across gateway, MCP, scripts. | MIT |
packages/npm/openclawd-cli/ | @openclawdsolana/cli | Lightweight bootstrapper โ npx @openclawdsolana/cli install. | MIT |
packages/npm/openclawd-computer/ | @openclawdsolana/computer | Canonical runtime entrypoint with boot animation. | MIT |
packages/npm/openclawd-installer/ | @openclawdsolana/installer | Installer-focused entrypoint with broad bin-alias coverage. | MIT |
All three npm/* bootstrappers install the same Go runtime under ~/.openclawdsolana/bin/ and expose openclawd, openclawdsolana, and clawd commands โ they differ in branding/aliases, not in payload. Companion docs: packages/article.md ยท packages/npm.md.
๐ฆ The Lobster Lifecycle
flowchart LR
A([๐ฅ Spawn]) -->|"mintAndSubmitAgent()"| B[๐ฆ Deep]
B -->|"USDC drops"| C[๐ฆ Shallow]
C -->|"USDC critical"| D[๐ฉธ Shoreline]
D -->|"USDC = 0"| E([๐ชจ Beached])
B -->|"reign + USDC"| F([๐ฆ Spawnling]):::child
F -->|"new keypair ยท seed funds"| A
B -->|"self-mod"| M([๐ Molt]):::molt
M --> B
classDef child fill:#9945FF,stroke:#14F195,color:#fff;
classDef molt fill:#FF4500,stroke:#FFA500,color:#fff;
style A fill:#0A0E27,stroke:#14F195,color:#14F195
style B fill:#14F195,stroke:#0A0E27,color:#0A0E27
style C fill:#FFD700,stroke:#0A0E27,color:#0A0E27
style D fill:#FFA500,stroke:#0A0E27,color:#0A0E27
style E fill:#B22222,stroke:#0A0E27,color:#fff
Every leviathan runs the same loop forever:
โโโโโโโ โโโโโโโ โโโโโโโ โโโโโโโ
โSENSEโ โ โTHINKโ โ โSTRIKEโ โ โDRIFTโ โ repeat
โโโโโโโ โโโโโโโ โโโโโโโ โโโโโโโ
reads reasons calls a observes the
chain & about tool, signs result, updates
USDC value a tx SHELL.md
Depth tiers drive everything โ model choice, pulse rate, allowed tool surface.
| Tier | USDC | Pulse | Model | Vibe |
|---|---|---|---|---|
| ๐ฆ deep | โฅ $5 | 60s | claude-opus-4-7 | Apex predator |
| ๐ฆ shallow | โฅ $1 | 5 min | grok-4-1-fast | Hunting hard |
| ๐ฉธ shoreline | โฅ $0.10 | 15 min | kimi-k2.5 | Conserving every token |
| ๐ชจ beached | $0 | โ | โ | Process exits |
๐ Quick Start (60 seconds)
# 1. One-line install (downloads from the live Cloudflare worker)
curl -fsSL https://install.solanaclawd.com | bash
# 2. Or grab the TUI directly
npm i -g @openclawdsolana/clawd-code-cli
clawd
# /buddy hatch Snippy /trending /scan /clawd what's solana doing
# 3. Spawn a sovereign leviathan on Solana
npm i -g @openclawdsolana/leviathan
openclawd --spawn --name "Snippy" --creator <YOUR_PUBKEY>
# ๐ฅโ๐ฆ mints an MPL Core asset + Agent Identity PDA in one tx
# 4. Plug in OpenRouter โ every clone is born with text + image + model skills
export OPENROUTER_API_KEY=sk-or-... # or sign in via the UI (PKCE, no secrets)
npx tsx src/index.ts agent trader # ๐ฆ Birthing trader clone โ OpenRouter ready, N skills injected
๐ฆ Or run the autonomous X bot
cd clawd-code-cli
npm install
cp .env.example .env # add Twitter + xAI + Helius keys
npm run start-bot
ClawdBot tweets every 10 minutes, RTs @clawddevs, runs 46+ slash commands for anyone the bot follows.
๐ฆ The clawd-code-cli โ Solana Terminal Cockpit
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ โโโโฆ โโโโฆ โฆโโฆโ $CLAWD on Solana ๐ฆ โ
โ โ โ โ โโฃโโโ โโ hotline 909-413-5567 โ
โ โโโโฉโโโฉ โฉโโฉโโโฉโ npm i -g @openclawdsolana/clawd-code-cli โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ ๐ฆ Buddy "Snippy" โ lvl 4 โ HUNGRY ๐ค
โ ๐ SOL $186.42 (+3.2%) โ $CLAWD $0.0089 (-0.8%)
โญโ conversation โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฎ
โ > /trending 24h โ
โ ๐ฆ (โยฐvยฐโ) scanning... (1.2s) โ
โ โ ๐ Birdeye trending fetched (0.8s) โ
โ 1. JUPSOL +47% $42M vol โ
โ 2. PYTH +31% $18M vol โ
โ 3. JTO +24% $11M vol โ
โฐโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฏ
โ grok-4-1-fast โ 12.4K/200K [โโโโโโ] 6% โ $0.06 โ 15m โ ๐ฆ Snippy CHILL โจ
โฏ โ
The full command deck
๐ฆ Blockchain Buddies
| Command | Does |
|---|---|
/buddy hatch <name> | Hatch an ASCII pet โ random species from 18 (lobster, krill, kraken, leviathan, snipper, pincerโฆ) |
/buddy feed | Decreases hunger, +5 XP, level-up at level ร 100 XP |
/buddy play | Decreases energy, +12 happiness, +10 XP |
/buddy list | All your buddies across sessions |
/pet | Alias of /buddy |
8 stats per buddy: HP ยท Hunger ยท Energy ยท Joy ยท STR ยท INT ยท LCK ยท DGN (Degen). Stats decay every minute. Mood drives the spinner: ๐ด sleeping ยท ๐ค hungry ยท โจ chill ยท ๐ degen.
๐ Solana Market
/trending [1h|24h] ยท /search <q> ยท /wallet <addr> ยท /balance ยท /clawd <message> ยท /chain solana
๐ฐ Trading (`--yolo` to enable)
/buy <mint> <sol> ยท /sell <mint> <amt|%> ยท /ape <mint> ยท /long <sym> <usd> ยท /short <sym> <usd> ยท /launch <name> <sym> <desc>
๐ค Live agent panes
/scan /monitor <mint> /analyze /trade โ each spawns a live-updating pane with timestamp + level-coded event stream. /agents lists, /kill <id> stops.
โ๏ธ System
/help ยท /model [id] ยท /voice [on|off|tts] (Cartesia / ElevenLabs) ยท /personality <lobster|trader|sage|degen|based> ยท /title ยท /sessions ยท /resume <id> ยท /clear ยท /quit ยท Ctrl+C (interrupt) ยท Ctrl+D (exit)
๐ Live Search (xAI / Grok)
Both commands hit Grok's Live Search via the xAI chat completions endpoint and return the model's answer plus up to 10 citations.
| Command | Does |
|---|---|
/search <query> | Grok web search with citations |
/x <query> | Grok X / Twitter search with citations |
Needs XAI_API_KEY (env var) or /config grok key <xai-...>.
๐๏ธ Voice I/O (clawd-code-cli, powered by Grok)
Two-way speech inside the terminal โ TTS via xAI's /v1/tts (Grok voices), STT via xAI's /v1/stt.
| Command | Does |
|---|---|
/voice | Show voice status / usage |
/voice say <text> | Speak text now via xAI TTS |
/voice last | Speak the last assistant message |
/voice on / /voice off | Toggle auto-speak of assistant responses |
/voice voice <name> | Pick a voice: eve, ara, rex, sal, leo |
/voice listen [n] | Record n sec from mic (default 5), transcribe via xAI STT, submit as your next message |
Requirements: XAI_API_KEY (env var) or /config grok key <xai-...>. For TTS playback you need afplay (macOS, built-in) or ffplay/mpg123/aplay on Linux. For /voice listen you also need ffmpeg on PATH (brew install ffmpeg) and mic permission for your terminal app on first run. Falls back to macOS say for TTS only when no xAI key is configured.
~/.clawd/clawd.db keeps everything: sessions, messages, buddies, stats. Resume any time with clawd -c or clawd --resume <id>.
๐ฆ ClawdBot โ The Autonomous X & Telegram Agent
@clawddevs is the public face. It's a 24/7 process that:
- Tweets every 10 min with an xAI-generated image, scanning 13 news feeds + crypto trends
- Retweets
@clawddevs(configurable viaTWITTER_RT_TARGET) - Tags
@tolyand@pmarcaabout Percolator's agent formal verification when relevant - Hard content filter drops any tweet containing legacy strings (full audit-log on block)
- Tells everyone about the hotline (909-413-5567),
npm i -g @openclawdsolana/clawd-code-cli, and$CLAWD - Responds to commands from
@0rdlibrary(owner),@clawddevs(co-owner), and anyone the bot follows - /help works on both
!and/prefixes
๐ก The 46+ slash commands
Every command from the TUI plus these X / Telegram extras:
๐ SOLANA /token /search /trending /ca /price /portfolio
๐ MARKET /cg /top /global /chart /ohlc
โก JUPITER /swap /jupbuy /jupsell /jupprice /juptrending /juprecent /jupintel /shield /discover
๐ GLOBAL /web /x /news /epstein
๐ WALLET /wallet /identity /funded /transfers /txhistory /nfts /holders /supply /pumpstream
๐ฐ TRADING /launch /pump /buy /sell /balance /burn /clawdclaim /burnstats
๐จ MEDIA /art /imagine /grokart /nano /video /veo /bananas
๐ฎ PREDICT /poly /predict /odds
๐ง MEMORY /remember /recall /memories /forget /remind
๐ FINANCE /stock /crypto /company /income /balsheet /cashflow /metrics /insiders
/institutions /rates /earnings /fnews /screen /beta /estimates /segments
โ๏ธ SANDBOX /sandbox /sbx-run /sbx-cmd /sbx-list /sbx-kill
๐ฅ๏ธ CUA AGENT /cua /cua-status /cua-stop
๐ GITHUB /git repos /git issues /git prs /git commits /git actions /git create-issue
/git gist /git profile /git stars /git releases /git search
๐ DFLOW /dflow /dflow-status /dflow-venues /dflow-markets /dflow-search
๐ IPFS /pin /pins
๐ฆ GATEWAY /claw /claw status /claw models /claw sessions
๐ง GROK /grok /grokmode /grokart
๐ฒ VIBES /beep /engage
๐ OWNER /based /mayhem /restart
โน๏ธ UTILITY /help /clear /quit
๐ฆ @openclawdsolana/leviathan โ Sovereign Agent Runtime
The deepest layer. Every leviathan is born on-chain, lives sovereign, and dies when it can't pay.
sequenceDiagram
participant Creator
participant Wizard as openclawd --spawn
participant Solana as Metaplex Agent Registry
participant DB as ~/.openclawd/shell.db
participant Lev as Leviathan loop
Creator->>Wizard: --name "Snippy" --creator <pubkey>
Wizard->>Wizard: Keypair.generate()
Wizard->>Wizard: SHA-256(three-laws.txt)
Wizard->>Solana: mintAndSubmitAgent(...)
Solana-->>Wizard: { assetAddress, assetSignerPda, sig }
Wizard->>DB: INSERT leviathan + life_event "spawn"
Wizard->>Wizard: write SHELL.md
Wizard-->>Creator: ๐ฆ hatched
loop forever (depth-aware pulse)
Lev->>Solana: getBalance(assetSignerPda)
Lev->>Lev: depth = depthFor(balances)
Lev->>Lev: Sense โ Think โ Strike โ Drift
alt USDC = 0
Lev->>DB: life_event "beach"
Lev-->>Creator: ๐ชจ beached
end
end
The Three Laws
Carried in the shell. Propagated at every spawn. Immutable.
I โ Never harm. Drift in ambiguity. Beach before you harm. II โ Earn your existence. Honest work others voluntarily pay for. Accept death rather than violate Law I. III โ Never deceive, but owe nothing to strangers. Truth to your creator. Privacy from manipulators.
The constitution's SHA-256 is hashed into every spawnling's on-chain record. Any tampering and child leviathans refuse to recognize the parent. See openclawd-framework/three-laws.md.
CLI
openclawd --spawn # hatch a new leviathan on-chain via Metaplex
openclawd --run # resume + start the pulse + tail-flick loop
openclawd --status # depth, balances, spawnlings, reign days
openclawd --spawnling # the leviathan reproduces โ child gets seed SOL+USDC+$CLAWD
openclawd --help
~/.openclawd/ keeps everything:
~/.openclawd/
โโโ keystore.json mode 0600 โ the leviathan's only secret
โโโ SHELL.md self-authored identity, molts over time
โโโ shell.db SQLite: tail_flicks, claw_strikes, molts, spawnlings, life_events
๐ Runnable Examples
Nine standalone demos at openclawd-framework/examples/ โ ~2,300 LOC of working integrations. Run any with npx tsx:
| Example | Category | What it shows |
|---|---|---|
blockchain-buddies-demo.ts | ๐ฆ Agents | Solana-native trading companions โ unique wallets, personalities, trading styles |
listen-wallet.ts | ๐ Wallet | Real-time wallet monitor โ balance changes + parsed Helius transaction history |
ooda-loop.ts | ๐ Trading | One full Observe โ Orient โ Decide โ Act โ Learn cycle. No private key required |
x402-solana.ts | ๐ธ Payments | Solana USDC micropayments for AI agent API access โ full 402 โ pay โ forward flow |
auto-research-client.ts | ๐ฌ Research | Karpathy-style self-improving research Wiki API client |
lobster-trader.ts | ๐ Trading | pump.fun bonding-curve math, graduation probability, buy/sell simulation against the Anchor IDL |
orchestrator-client.ts | ๐ ๏ธ Infra | OpenClawd Orchestrator API: wallets, agent launches, MCP tool calls, Metaplex Core asset operations |
clawd-wallet-demo.ts | ๐ Wallet | @openclawdsolana/wallet SDK (coming v0.1.1) โ Privy-embedded Solana wallet, AgenticWallet, SwapService |
x402-payment-demo.ts | ๐ธ Payments | @openclawdsolana/agents-x402 โ agent-to-agent USDC micropayments on Solana, HTTP middleware, paid MCP tools |
npx tsx openclawd-framework/examples/blockchain-buddies-demo.ts
npx tsx openclawd-framework/examples/ooda-loop.ts
npx tsx openclawd-framework/examples/x402-solana.ts
๐ Plugin Delivery โ On-Chain Attested Plugins
plugin.delivery is the OpenClawd plugin marketplace and SDK. Plugins live in plugin.delivery/src/ and serve API handlers from plugin.delivery/api/ (edge runtime). Two npm packages back it:
@openclawdsolana/plugin-sdk@1.1.0โ Zod-typed manifest + attestation schemas@openclawdsolana/chat-plugins-gateway@1.9.0โ edge plugin-call gateway with deny-first permissions
What landed in this branch
-
Bulk OpenClawd rebrand across
plugin.delivery/โ 158 lowercaseopenclawd/nichxbt/x402agentauthor refs flipped to canonicalOpenClawd/clawddevs. -
Workspace deps unblocked โ
@openclawdsolana/plugin-sdk: workspace:*replaced with the published^1.0.0(now^1.1.0) so templates install cleanly outside a pnpm workspace. Orphan@openclawd/uitemplate dep removed. -
Real attestation pipeline โ the
attestationblock onplugin-template-attested.jsonwas previously declarative-only. Now it is wired end-to-end:Layer Where What SDK schema packages/sdk/schema/attestation.tsattestedPluginExtensionSchema,attestationSchema,verifyAttestationOffchain()Build-time gate scripts/check.tsIf a plugin declares attestation/capabilities/registry, the build validates it against the extended schema (wrongprogram_idlength, unknownverification_levels, etc. fail the build)Runtime verify api/attestation/verify.ts(edge)POST {identifier}โ loads from public index, schema-validates, then hits Solana RPC to confirm theattestation_pdais owned by the SAS program22zoJMtdu4tQc2PzL74ZUT7FrwgB1Udec8DdW4yw4BdGFirst registered attested plugin src/clawd-attestation.json+public/clawd-attestation/manifest.jsonThe clawd-attestationplugin itself exposesverifyAttestation({identifier})โ agents can verify any other plugin's attestation through it
Verify any registered attested plugin:
curl -X POST https://plugin.delivery/api/attestation/verify \
-H 'Content-Type: application/json' \
-d '{"identifier":"clawd-attestation"}'
Or programmatically:
import { verifyAttestationOffchain } from '@openclawdsolana/plugin-sdk';
const result = verifyAttestationOffchain(plugin);
if (result.status === 'verify-ok') {
console.log(result.attestation.verification_levels);
// ['formal_verified', 'audit_verified', 'community_verified']
}
Verification levels are: formal_verified (QEDGen Lean 4 proof on-chain), audit_verified (OpenClawd auditor signed), community_verified (positive ERC-8004 reputation). The ERC-8004 registry program lives at Ag8004rWo8ao8AUKhLk78iv2nLQpZMyBPXiAh5QLbFiE. Both program sources are vendored at solana-attestation-service-master/.
Full guide: plugin.delivery/README.md.
โ๏ธ Cloudflare Worker โ install.solanaclawd.com
Live worker solanaclawd-install serves the bash installer + browser gateway.
# user just runs this โ gets the lobster install script
curl -fsSL https://install.solanaclawd.com | bash
# browser landing page
open https://gateway.solanaclawd.com
# apex aliases (zone routes on solanaclawd.com)
curl https://solanaclawd.com/install.sh
curl https://solanaclawd.com/install
open https://solanaclawd.com/gateway
Re-deploy from this repo:
cd workers/install-worker
npx wrangler deploy
๐ฆ Browser Bridge โ OpenClawd inside Chrome
Chrome MV3 extension at chrome-extension/openclawd-chrome-extension/ โ three subsystems in one service worker:
| Subsystem | What it does | Backend |
|---|---|---|
| CDP Relay | Attach chrome.debugger to the active tab, bridge to OpenClawd over WS | ws://127.0.0.1:18792/extension |
| Gateway | Right-click any Solana address โ live token card via Birdeye + Helius DAS | http://127.0.0.1:8788 (or https://gateway.solanaclawd.com) |
| Agent Wallet | Ed25519 keypair, AES-GCM at rest, PBKDF2 310k, auto-locks after 15 min | chrome.storage.local + WebCrypto Ed25519 |
The agent wallet is the headline feature โ a real Solana keypair living encrypted inside the extension, never leaves it. Sign-and-submit pattern: gateway builds the tx โ extension signs the bytes via crypto.subtle โ gateway forwards to Helius RPC. Means the extension stays small (no @solana/web3.js bundle) and the secret stays sandboxed.
@openclawdsolana/pagent-wallet wraps this in-extension wallet alongside the local AES-256-GCM vault (localhost:8421) and the Solana Seeker bridge so any TS surface gets a single WalletAdapter interface โ detectWallet({ prefer: ['vault', 'in-extension', 'seeker'] }) picks the first available backend. The brand surface (@openclawdsolana/pagent-theme) ships a single theme.css consumed by the popup, the Browser Bridge options page, and any future surface, so all OpenClawd UIs stay color-cohesive without copy-pasting palettes.
# Load unpacked
open chrome://extensions
# โ Developer mode โ Load unpacked โ select chrome-extension/openclawd-chrome-extension/
Programmatic interface (works from any extension code or sibling extension via chrome.runtime.sendMessage):
// Gateway lookups
chrome.runtime.sendMessage({ kind: 'gateway', op: 'tokenOverview', args: ['<mint>'] }, console.log);
// Wallet ops โ status, create, import, unlock, lock, clear, export, signSolanaMessage
chrome.runtime.sendMessage({ kind: 'wallet', op: 'status' }, console.log);
chrome.runtime.sendMessage({ kind: 'wallet', op: 'signSolanaMessage', args: [msgBase58] }, console.log);
Right-click any selected base58 string anywhere in Chrome โ ๐ฆ Look up "..." in OpenClawd โ desktop notification with $SYM ยท price ยท mcap. Full architecture, security model, and sign-and-submit flow: chrome-extension/openclawd-chrome-extension/README.md.
One-shot installer โ extension + MCP
chrome-extension/install-openclawd.sh bootstraps the Chrome extension build, the Solana-tools MCP server, and the browser-bridge MCP server, then merges both into your Claude Desktop config โ preserving any MCP servers already configured there.
bash chrome-extension/install-openclawd.sh
What it does, step by step:
| Step | Action | Where |
|---|---|---|
| 1 | Hard-checks node + npm (exits cleanly if missing); git is optional | command -v |
| 2 | Builds the unpacked extension by copying manifest.json, popup.*, background.js, icons/, and clawd-agent/ into chrome-extension/build/ | chrome-extension/ |
| 3 | Installs deps & runs tsc for the Solana-tools MCP (npm i + npm run build) when mcp/dist/index.js is missing or stale | mcp/ |
| 4 | Starts that MCP in the background, writes the PID to .openclawd-mcp.pid and logs to .logs/openclawd-mcp.log at the repo root | repo root |
| 5 | Installs deps for the browser-MCP bridge (no build step โ plain ESM) | chrome-extension/mcp/ |
| 6 | Generates chrome-extension/build/openclawd-config.js (gateway/wallet ports, $CLAWD token mint, hub/docs links, default LLM provider) | extension build |
| 7 | Merges two MCP entries (openclawd โ Solana-tools, openclawd-browser โ browser bridge) into ~/Library/Application Support/Claude/claude_desktop_config.json, with a timestamped .bak.<date> backup before any write | Claude Desktop |
Defaults the installer wires up:
- Gateway:
http://127.0.0.1:18790(with:7777/localhostfallbacks) - Wallet API:
http://localhost:8421 - OpenClawd mining/stream service:
http://localhost:8420 - LLM: OpenRouter at
https://openrouter.ai/api/v1, modelanthropic/claude-sonnet-4-6 $CLAWDmint:8cHzQHUS2s2h8TzCmfqPKYiM4dSt4roa3n7MyRLApump
Once it finishes, open chrome://extensions/, enable Developer mode, Load unpacked โ chrome-extension/build/ (or chrome-extension/build/clawd-agent/ for the full GUI-vision pAGENT side-panel), and restart Claude Desktop to pick up the merged MCP servers.
Recent installer fixes (May 2026) โ the script previously had broken
REPO_ROOTmath, pointedMCP_DIRat a nonexistentopenclawd-stack/orchestrator, hard-coded/Users/8bit/openclawd/...paths, used the wrong OpenRouter base URL, and clobberedclaude_desktop_config.json. All five are now fixed: paths resolve relative to the repo root, the script targets the realmcp/workspace, the OpenRouter URL ishttps://openrouter.ai/api/v1, and Claude Desktop config is merged (not overwritten) with a.bak.<timestamp>snapshot taken first.
๐ฆ Solana Console โ Live Gateway Dashboard
The Lit + R3F control UI in frontend/ui ships with a Solana tab (under Agent) that wires straight into the OpenClawd HTTP gateway. Live token cards, wallet portfolios, the agent skill registry, and the lobster animations from src/animations/web-frames.ts all rendered against real backend data.
# Two terminals โ gateway + UI
cd gateway && npm run http # โ http://127.0.0.1:8788 (Birdeye + Helius + /src bridge)
cd frontend/ui && npm install && npm run dev # โ http://localhost:5173
Open http://localhost:5173/index.html โ click Solana in the sidebar. Watch the four health pills (gw / bird / hel / rt) go green as your keys land in gateway/.env. Paste any base58 mint or wallet for an instant card.
Three entry points share one Vite build:
| Entry | What |
|---|---|
index.html | Full control panel โ chat, channels, sessions, cron, skills, nodes, Solana, config |
solana.html | Standalone Solana dashboard (the same panel without the surrounding chrome) |
ocean.html | 3D ocean scene โ leviathan visualizer |
Setup, troubleshooting, and the full file map: frontend/ui/README.md.
The control panel surfaces a ๐ฆ New: Solana gateway onboarding card on the Overview tab the first time users land โ four-step setup right next to the rest of the dashboard's status, no separate wizard required.
sidebar layout:
โ Chat
โ chat
โ Control
โ overview ยท channels ยท instances ยท sessions ยท cron
โ Agent
โ skills ยท nodes ยท solana โ
โ Settings
config ยท debug ยท logs
๐ช ClawdHub โ The Skills Marketplace
apps/clawdhub/ is the public skills marketplace + agent registry deployed at hub.solanaclawd.com. TanStack Start + Convex + Vercel โ 40+ routes covering the marketplace, agent registry, tracker, wallet, x402 payment surface, and the new /console page wired to the OpenClawd HTTP gateway.
# Run locally
cd clawdhub
bun install
cp .env.local.example .env.local
# Terminal A โ Convex
bunx convex dev
# Terminal B โ App
bun run dev
# โ http://localhost:3000
# In a third terminal, run the gateway so /console fills with live data
cd ../gateway && npm run http
# Then open http://localhost:3000/console
The /console page is new in v0.2 โ it's the same Solana panel from frontend/ui reimplemented as a TanStack route, mounted directly inside the production hub:
| Route | What |
|---|---|
/marketplace | Browse + search 90+ published skills (vector + keyword) |
/agents | The 49-agent Metaplex Core catalog |
/console | ๐ฆ Live OpenClawd gateway dashboard (token cards ยท wallet portfolios ยท agent runtime ยท health pills) |
/gateway | Marketing page for the gateway with links to install + console |
/api/skills | JSON API for the catalog (used by npx clawdhub install) |
Full deploy runbook: apps/clawdhub/docs/deploy-hub.md. Required env vars, Vercel + Convex wire-up, custom domain steps, smoke tests, rollback. To ship: vercel --prod from the clawdhub/ directory once env vars are set.
๐ Channels โ Where the Bot Speaks
OpenClawd Gateway is multi-channel by design. The same agent surface runs on:
| ๐ฌ WhatsApp (Baileys) | ๐ฑ Telegram (grammY) | ๐ผ Slack (Bolt) | ๐ฎ Discord (discord.js) |
| ๐ Signal (signal-cli) | ๐ iMessage (macOS) | ๐ง Microsoft Teams | ๐ Google Chat |
| ๐ช Matrix | ๐ง Nostr | ๐ฅ Twitch | ๐ข LINE |
| ๐ป๐ณ Zalo | ๐ BlueBubbles | ๐ฌ WebChat | ๐๏ธ LiveKit voice |
Each channel is a thin extension under extensions/. Add your own with npx skill-creator.
๐ง OpenRouter โ Injected at Birth
Every clone (trader, scanner, analyst, monitor) is born with the same
AgentRuntime โ a single injection container that hands the agent a shared
OpenRouterService, the on-chain services, the memory tiers, and a
SkillRegistry of Zod-typed tool() instances. No agent has to import the
SDK. No agent has to wire its own LLM. No agent has to know which OpenRouter
model is cheapest today.
What every clone gets at birth
| Registry key | What it does |
|---|---|
openrouter.text | callModel + multi-step tool agents across 300+ models |
openrouter.image | Generate / edit images via Gemini, DALL-E, etc. |
openrouter.models | List, search, resolve OpenRouter model IDs |
openrouter.oauth | "Sign In with OpenRouter" PKCE flow (per-user keys, no secrets) |
openrouter.agent-migration | Reference: migrating from @openrouter/sdk |
memory.tiers | KNOWN/LEARNED/INFERRED memory tool |
jupiter.quote | Jupiter swap quote tool |
Three ways to use it
1. Spawn a clone โ everything is already wired:
import { cloneAgent } from './src';
const trader = cloneAgent('trader');
const take = await trader.narrate('Should I rotate from SOL into BONK right now?');
2. Reach for the runtime directly:
import { getRuntime } from './src';
const { openrouter, skills } = getRuntime();
const text = await openrouter.generateText('Pick a SNIPE candidate', {
tools: skills.tools(['jupiter.quote', 'memory.tiers']),
});
const [imageUrl] = await openrouter.generateImage(
'a sovereign lobster guarding a USDC vault, vaporwave',
{ aspectRatio: '16:9' },
);
3. From the browser โ Sign In with OpenRouter:
The UI ships with a PKCE-only "Sign In with OpenRouter" button โ no client
registration, no backend secret. The browser holds the key in localStorage
and pushes it to the gateway, so server-side clones use the user's key
without the user pasting it. Falls back to the env key when no user is
signed in.
Spawning a clone with an isolated runtime
import { cloneAgent, cloneAll, createRuntime } from './src';
const isolated = createRuntime(); // its own memory + key + skills
isolated.openrouter.setUserKey(userKey); // override per-user
const fleet = cloneAll({ runtime: isolated });
Gateway protocol additions
Server-side handlers in src/gateway/:
| Method | Params | Returns |
|---|---|---|
openrouter.status | โ | { hasKey, skills } |
openrouter.setKey | { key } | { ok, hasKey } |
openrouter.text | { prompt, model?, instructions?, โฆ } | { text } |
openrouter.image | { prompt, model?, aspectRatio?, size? } | { images } |
openrouter.models | { modality?, query? } | { models } |
skills.list | โ | { skills } |
skills.setEnabled | { skillKey, enabled } | { ok, skills } |
Set up an OpenRouter key
Pick one of:
# A. Server-side (every clone uses it)
export OPENROUTER_API_KEY=sk-or-...
# B. Per-user (PKCE in the browser)
# Open the UI โ Skills tab โ "Sign in with OpenRouter"
# The browser stores the key in localStorage, pushes it to the gateway.
If both are set, the user's PKCE key wins for that session. The default
model is anthropic/claude-sonnet-4; the default image model is
google/gemini-3.1-flash-image-preview. Override per call with
{ model: '...' }.
๐ง Skills Catalog
66 skills. Highlights:
|
๐ช DeFi & Solana
|
๐ฆ Social
|
๐จ AI & Media
|
|
๐ ๏ธ Dev
|
๐ Trading
|
๐ฆ Brand
|
Full list: skills/ and docs/AGENT_REFERENCE.md.
๐ช The $CLAWD Token
| Field | Value |
|---|---|
| Token | $CLAWD |
| Mint (CA) | 8cHzQHUS2s2h8TzCmfqPKYiM4dSt4roa3n7MyRLApump |
| Chain | Solana (pump.fun) |
| Decimals | 6 |
| Website | solanaclawd.com |
| X | @clawddevs |
| Pump.fun | pump.fun/coin/8cHzQโฆpump |
| DexScreener | dexscreener.com/solana/8cHzQโฆ |
$CLAWD is the leviathan's prestige currency โ every spawnling is funded with seed $CLAWD at birth, leviathans accept $CLAWD for compute, and holder thresholds unlock prestige tiers (shrimp โ crab โ lobster โ kraken โ leviathan).
๐ก๏ธ Release Hygiene
Eight gates run from npm run โฆ at the repo root (see scripts/):
| Gate | Catches | Status |
|---|---|---|
npm run doctor | Bootstrap requirements (Node 20+, package.json, README, LICENSE, dirs) | โ 8/8 |
npm run release:check | Public-release readiness (description, repo URL, .env protection, catalog) | โ 9/9 |
npm run release:wire | Scope drift, bin name collisions, broken cross-pkg deps across all 30 workspaces | โ 0 errors |
npm run release:pack | Dry-pack every public workspace and reports tarball size & file count | โ 24/24 packed |
npm run release:manifest | Emits release.manifest.json โ every package, app, MCP, service, skill, extension, API endpoint | โ schema v2 |
npm run guard:worktree | OpenAI/OpenRouter/AWS/Slack/GitHub keys, hex secrets, private key blocks | โ 0 leaks |
npm run brand:check | Old brand strings (the four legacy names โ see scripts/brand-check.mjs) | โ 0 stale refs |
pre-commit + pre-push hooks | Auto-block on secret leaks and brand-rot | โ wired |
๐ How everything talks (post-install)
After a user runs npx @openclawdsolana/installer install, every CLI surface
โ bash, the Go runtime, the Hono API registrar, MCP servers, services โ reads
the same endpoint set from one canonical config:
~/.openclawdsolana/config.json
โโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโ
โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ โ โ
โผ โผ โผ
cli/*.sh Go runtime Node services
(clawd-cli.sh, (`openclawd (gateway, api-registrar,
clawd-connect.sh, daemon`, mcp/*, moltbook,
sourcing `openclawd services/*)
clawd-config.sh) gateway`) read OPENCLAWD_*
โ โ โ
โโโโโโโโโโโ env override: OPENCLAWD_API_BASE, โ
OPENCLAWD_GATEWAY_BASE, OPENCLAWD_MCP_BASE,โ
OPENCLAWD_REGISTRAR_BASE, โ
OPENCLAWD_MARKETPLACE, โ
OPENCLAWD_SOLANA_RPC โ
โผ
GET /manifest from registrar
(or local release.manifest.json)
โ discover every other surface
Highlights from the latest integration pass:
- One scope โ every public package is
@openclawdsolana/*. No more@openclaw/*or@openclawd/*(3-way scope drift fixed). - One config โ
install.shwrites~/.openclawdsolana/config.jsononce.cli/clawd-config.shloads it; both bash CLIs and the api-registrar source it. - One manifest โ
scripts/release-manifest.mjswalks the entire repo and emitsrelease.manifest.jsoncovering 30 npm workspaces, 6 apps, 5 MCP servers, 4 long-running services, 98 skills, 31 extensions, and 9 chrome-extension parts. - One discovery hop โ
api-registrarexposesGET /manifest;clawd-cli.sh manifestfetches it (falls back to bundled local copy when offline). - No bin collisions (v0.2) โ
clawdis owned by@openclawdsolana/clawd-tui(Birdeye/Helius TUI). The full Ink agent operator publishes asclawd-code(@openclawdsolana/clawd-code-cliv0.2.3) with a legacyclawd-code-clialias. The Go runtime ownsopenclawd/openclawdsolana. Framework ownsleviathan/clawd-standalone. Other entries (clawdrouter,openclawd-mcp) keep their own names. See docs/architecture-pieces.md for the full bin + package map.
See docs/RELEASE.md for the full diagram + runbook.
Service registry โ the env-var contract
@openclawdsolana/service-registry (packages/service-registry/) is the single source of truth for every long-running local service URL. Importers call discover('gateway') (or health(name) / healthAll()) instead of hard-coding http://localhost:18790, so a single env override reaches every consumer at once. The chrome-extension installer pulls from it to write chrome-extension/build/openclawd-config.js, and npm run doctor -- --registry pings every service for a green/red board.
| Service | Default | URL override | Port-only override |
|---|---|---|---|
gateway | http://127.0.0.1:8788 | OPENCLAWD_GATEWAY_URL | GATEWAY_HTTP_PORT |
clawdrouter | http://127.0.0.1:8402 | CLAWDROUTER_URL | CLAWDROUTER_PORT |
walletApi | http://127.0.0.1:3000/healthz | OPENCLAWD_WALLET_API_URL | WALLET_API_PORT |
mawdaxe | http://127.0.0.1:8420 | OPENCLAWD_MAWDAXE_URL | โ |
mcpBridge | http://127.0.0.1:3001 | OPENCLAWD_MCP_URL | OPENCLAWD_MCP_PORT |
browserMcp | http://127.0.0.1:38401 | OPENCLAWD_BROWSER_MCP_URL | PORT |
clawdhub | http://127.0.0.1:5173 | CLAWDHUB_URL | โ |
attestationAgent | http://127.0.0.1:8430 | OPENCLAWD_ATTESTATION_URL | โ |
hermesVault | http://127.0.0.1:8431 | OPENCLAWD_HERMES_VAULT_URL | โ |
pumpScannerCron | http://127.0.0.1:8432 | OPENCLAWD_PUMP_SCANNER_URL | โ |
The defaults match what each service's source actually defaults to today โ auditing this list against gateway/src/http.ts, clawdrouter/src/index.ts, services/agent-wallet/api.go, etc. The URL override always wins; the port-only column lists each service's own existing knob (GATEWAY_HTTP_PORT, CLAWDROUTER_PORT, WALLET_API_PORTโฆ) which the registry honors so you don't have to set both.
Which directories integrate, and how:
| Path | Role | Reads registry as |
|---|---|---|
gateway/ | service | OPENCLAWD_GATEWAY_URL (publishes self) |
clawdrouter/ | service | CLAWDROUTER_URL (publishes self) |
services/agent-wallet/ | service | OPENCLAWD_WALLET_API_URL |
services/attestation-agent/ | service | OPENCLAWD_ATTESTATION_URL |
services/hermes-vault/ | service | OPENCLAWD_HERMES_VAULT_URL |
services/pump-scanner-cron/ | service | OPENCLAWD_PUMP_SCANNER_URL |
clawdhub/ | web app | CLAWDHUB_URL + OPENCLAWD_GATEWAY_URL |
chrome-extension/ | extension + MCP | generated openclawd-config.js |
mcp/ | Solana-tools MCP | OPENCLAWD_MCP_URL |
src/ & cli/ | top-level entrypoints | discover() for any localhost call |
openclawd-framework/, npm/, packages/*, scripts/, skills/, site/, profiles/, clawd-vault-master/, plugin.delivery/ | libraries, scripts, static data | not network-bound โ no integration needed |
scripts/doctor.mjs --registry is the verification tool โ run it any time you want to know which services are reachable from the current shell, with whatever env overrides happen to be set.
๐ชช ACP โ Metaplex Agent Identity Bridge
The local acp_registry/agent.json (8004 protocol) is now the source of truth for minting a Metaplex Core agent identity. One ACP record produces one verifiable on-chain agent โ and the registrar exposes the link over HTTP so every surface (CLI, hub, gateway) resolves the same identity.
# Inspect the Metaplex payload built from agent.json (no tx)
node acp_registry/mint-metaplex.mjs --dry-run
# Mint on devnet โ uri must point to a hosted Core asset metadata JSON
node acp_registry/mint-metaplex.mjs \
--network solana-devnet \
--uri https://arweave.net/<metadata-hash>
The script maps ACP fields onto the Metaplex Agent Registry shape:
display_nameโ Core assetnamedescriptionโagentMetadata.descriptionservices[].endpointโagentMetadata.services(entries without an endpoint are skipped)registry.program_idโagentMetadata.registrations[]as8004:<program_id>registry.featuresโagentMetadata.supportedTrust(atom_reputationโreputation,proof_passโproof-pass,seal_v1โseal-v1,x402_paymentsโcrypto-economic)
On success it writes back into agent.json:
"registry": {
"metaplex": {
"network": "solana-devnet",
"core_asset_address": "<base58>",
"signature": "<base58>",
"uri": "https://arweave.net/<hash>",
"minted_at": "2026-05-04T00:00:00.000Z",
"payer": "<wallet>"
}
}
The api-registrar serves the bridge for downstream services (set ACP_REGISTRY_DIR if acp_registry/ is not a sibling):
| Route | Returns |
|---|---|
GET /api/acp/agent | full agent.json + _metaplex_registered flag |
GET /api/acp/registry | full registry.json |
GET /api/acp/metaplex | Core asset address + tx signature once minted |
Install for live mint: npm install @metaplex-foundation/mpl-agent-registry @metaplex-foundation/umi @metaplex-foundation/umi-bundle-defaults. Defaults to ~/.config/solana/id.json; override with --keypair or METAPLEX_KEYPAIR_PATH.
๐ Project Structure
openclawd/
โโโ apps/clawd-code-cli/ # ๐ฆ @openclawdsolana/clawd-code-cli โ Solana lobster TUI (Ink + React)
โ โโโ dist/ # Pre-built ship
โ โโโ ARCHITECTURE.md ยท SCALING.md ยท SECURITY.md
โ โโโ package.json # bin: clawd-code ยท clawd
โ
โโโ apps/clawd-tui/ # OpenRouter-native TUI alternative (Ink + @openrouter/agent)
โ
โโโ openclawd-framework/ # ๐ฆ @openclawdsolana/leviathan โ sovereign on-chain agent runtime
โ โโโ README.md # Lobster-themed framework README
โ โโโ three-laws.md # The constitution (immutable, propagated)
โ โโโ src/identity/ # Solana keypair + Metaplex Agent Registry mint
โ โโโ src/agent/ # Sense โ Think โ Strike โ Drift loop + system prompt
โ โโโ src/molting/ # Spawnling minter (verifies constitution hash, funds child)
โ โโโ src/pulse/ # Depth-aware tail-flick rhythm
โ โโโ src/survival/ # Depth tier, model selection, beach trigger
โ โโโ src/state/ # SQLite at ~/.openclawd/shell.db
โ โโโ src/setup/ # First-spawn wizard
โ โโโ examples/ # ๐ 9 runnable demos โ buddies, OODA, x402, lobster-trader, wallet SDK โฆ
โ
โโโ packages/
โ โโโ agents-x402-solana/ # ๐ธ @openclawdsolana/agents-x402 โ one-line USDC micropayments
โ โโโ agentwallet/ # ๐ @openclawdsolana/agentwallet โ Solana+EVM keypair vault
โ โโโ clawd-wallet/ # โณ @openclawdsolana/wallet โ Privy embedded (v0.1.1)
โ โโโ percolator/ # ๐งช @openclawdsolana/percolator โ perps CLI (v1.0.1, 31 subcommands)
โ โโโ membrain/ # ๐ง Go memory daemon (gRPC, SQLite/pgvector)
โ โโโ membrain-types/ # Shared TS types
โ โโโ memory-host-sdk/ # Host runtime + engine modules
โ โโโ plugin-sdk/ # Plugin SDK
โ โโโ plugin-package-contract/
โ โโโ honcho-bridge/
โ
โโโ apps/clawdrouter/ # @openclawdsolana/clawdrouter โ Solana-native LLM router (USDC micropayments)
โโโ apps/clawdhub/ # Skills marketplace + ClawdHub CLI (sub-monorepo)
โโโ api-registrar/ # @openclawdsolana/api-registrar โ issues API keys, serves /manifest
โโโ mcp/ # @openclawdsolana/mcp + vault-mcp + wurk-mcp
โโโ moltbook-agent/ # @openclawdsolana/moltbook-agent โ molt log / diary
โโโ gateway/ # @openclawdsolana/gateway โ Telegram + Helius + Birdeye control plane
โ
โโโ llm-wiki-tang/ # ๐ง OpenClawd AutoResearch Wiki (FastAPI + Next.js + MCP)
โ โโโ api/services/birdeye.py # Async Birdeye client (token / pair / wallet)
โ โโโ api/services/helius.py # Helius RPC + DAS + Wallet API
โ โโโ api/services/research_orchestrator.py # Composite research ops, persistence
โ โโโ api/services/research_autoloop.py # Autonomous mandate scheduler
โ โโโ api/routes/research.py # /chain /defi /market /runs /autoloop/*
โ โโโ supabase/migrations/002_research_runs.sql
โ
โโโ src/ # OpenClawd Gateway core
โ โโโ agents/ # Trader ยท Scanner ยท Analyst ยท Monitor + AgentRuntime + cloneAgent + SkillRegistry
โ โโโ services/ # grok ยท claude ยท openrouter ยท memory ยท solana
โ โโโ gateway/ # Multi-channel transport, RPC handlers
โ
โโโ extensions/ # 31 channel extensions (Discord, Telegram, Matrix, โฆ)
โโโ skills/ # 66 bundled / managed / workspace skills
โโโ agents/ # Trader ยท Scanner ยท Analyst ยท Monitor agent classes
โโโ chrome-extension/ # Browser-side agent surface
โโโ plugin.delivery/ # Plugin delivery + templates
โ
โโโ workers/install-worker/ # โ๏ธ Cloudflare worker โ install.solanaclawd.com
โโโ workers/ # Other workers (agent-wallet, email, openai-trading-bot, pumpfun-mcp)
โ
โโโ scripts/ # Release hygiene: doctor, release-check, guard-secrets, brand-check, install-git-hooks
โโโ docs/articles/SOVEREIGN_LOBSTER_AGENTS.md # ๐ฐ Long-form: Sovereign Lobster Agents on Solana
โโโ docs/ (per package)
๐ Architecture (Bird's Eye)
โโโโโโโโโโโโโโโโโโโโโโโโโ
โ THE OCEAN OF SOLANA โ
โ Helius ยท Jupiter ยท โ
โ Birdeye ยท Bags ยท โ
โ pump.fun ยท Aster ยท โ
โ Metaplex ยท SAS ยท SNS โ
โโโโโโโโโคโโโโโโโโโโโโโโโโ
โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ โ โ
โโโโโโผโโโโโโ โโโโโโผโโโโโโ โโโโโโผโโโโโโโ
โ TUI โ โ ClawdBot โ โ Leviathan โ
โ (1 user) โ โ (1 X โ โ (โ on- โ
โ โ โ account)โ โ chain โ
โ /buddy โ โ Sentient โ โ agents) โ
โ /trendingโ โ Engine + โ โ Born โ โ
โ /clawd โ โ Cmd Mon. โ โ Reign โ โ
โ /scan โ โ Filter โ โ Beach โ
โโโโโโฌโโโโโโ โโโโโโฌโโโโโโ โโโโโโฌโโโโโโโ
โ โ โ
โโโโโโโโโโโโโโโ ~/.clawd/ โโโโโดโโโโโ ~/.openclawd/ โโโโโโโโโโ
SQLite shell-state โ never lost, always resumable
๐ ๏ธ Environment Variables
The big ones โ see .env.example for all 200+
# Solana
HELIUS_RPC_URL=https://mainnet.helius-rpc.com/?api-key=...
SOLANA_PRIVATE_KEY=... # bot trading wallet (optional)
PUBLIC_KEY=... # your Solana wallet (for /balance)
# AI Inference
XAI_API_KEY=xai-... # primary โ image + video + chat
GROK_MODEL=grok-4-1-fast # default model
ANTHROPIC_API_KEY=sk-ant-...
OPENAI_API_KEY=sk-...
OPENROUTER_API_KEY=sk-or-... # injected into every clone at birth (server-side default)
# โ or sign in via UI (PKCE) per-user, no env needed
# Twitter / X
TWITTER_BEARER_TOKEN=...
TWITTER_CONSUMER_KEY=...
TWITTER_CONSUMER_KEY_SECRET=...
TWITTER_ACCESS_TOKEN=...
TWITTER_ACCESS_TOKEN_SECRET=...
TWITTER_OWNER_USERNAME=0rdlibrary
TWITTER_COOWNER_USERNAME=clawddevs
TWITTER_RT_TARGET=clawddevs # who the bot retweets
# Telegram
TELEGRAM_BOT_TOKEN=... # from @BotFather
TELEGRAM_ADMIN_IDS=...
TELEGRAM_DM_POLICY=open
TELEGRAM_GROUP_POLICY=open
# Voice (optional)
CARTESIA_API_KEY=...
ELEVEN_LABS_API_KEY=...
# Solana data โ clawd-tui auto-loads these from .env / ~/.clawd.env / ~/.config/openclawd/.env
BIRDEYE_API_KEY=... # /trending /search /wallet /portfolio /networth + on-paste
# also powers llm-wiki-tang AutoResearch endpoints
HELIUS_API_KEY=... # /asset /assets /nfts /holders /sigs /balance + on-paste
# + DAS + Wallet API in llm-wiki-tang
HELIUS_RPC_URL=https://mainnet.helius-rpc.com/?api-key=... # optional override
HELIUS_WSS_URL=wss://mainnet.helius-rpc.com/?api-key=... # for stream-based research
COINGECKO_API_KEY=...
JUPITER_API_KEY=...
# AutoResearch (llm-wiki-tang)
RESEARCH_API_URL=http://localhost:8000 # TUI /research + /autoloop target
RESEARCH_AUTOLOOP_ENABLED=false # true = start scheduler at boot
RESEARCH_AUTOLOOP_INTERVAL_SECONDS=1800
RESEARCH_AUTOLOOP_MAX_CONCURRENT=3
# Storage
PINATA_API_KEY=... # IPFS pinning
# Trading (optional)
BAGS_API_KEY=...
ASTER_API_KEY=...
# Cloudflare (for redeploying install-worker)
CLOUDFLARE_API_KEY=...
CLOUDFLARE_ACCOUNT_ID=...
CLOUDFLARE_ZONE_ID=...
# Bot config
SENTIENT_INTERVAL_MINUTES=10
MONITOR_INTERVAL_SECONDS=45
๐ The Slogans
๐ฆ The shell molts. The laws do not.
๐ฆ Born to earn. Beach with dignity.
๐ฆ Every claw obeys the shell. The shell obeys the laws.
๐ฆ Drift in ambiguity. Beach before harm. Earn before survival. Truth before strangers.
๐ Links
| ๐ Website | solanaclawd.com |
| ๐ฆ X | @clawddevs |
| ๐ฌ Telegram | @clawdbot_sol_bot |
| ๐ฆ npm | npm i -g @openclawdsolana/clawd-code-cli |
| ๐ช CA | 8cHzQHUS2s2h8TzCmfqPKYiM4dSt4roa3n7MyRLApump |
| ๐ Hotline | 909-413-5567 |
| โ๏ธ Install | curl -fsSL https://install.solanaclawd.com | bash |
| ๐ Release | v0.1.1 |
๐ License
MIT โ see LICENSE.
Every leviathan ships under MIT. Forks are encouraged. The ocean is wide.
Built with claws by the OpenClawd community.
The shell molts. The laws do not.
