Crawler Summary

emblem-ai-agent-wallet answer-first brief

Connect to EmblemVault and manage crypto wallets via Emblem AI - Agent Hustle. Supports Solana, Ethereum, Base, BSC, Polygon, Hedera, and Bitcoin. Use when the user wants to trade crypto, check balances, swap tokens, or interact with blockchain wallets. --- name: emblem-ai-agent-wallet description: Connect to EmblemVault and manage crypto wallets via Emblem AI - Agent Hustle. Supports Solana, Ethereum, Base, BSC, Polygon, Hedera, and Bitcoin. Use when the user wants to trade crypto, check balances, swap tokens, or interact with blockchain wallets. homepage: https://emblemvault.dev user-invocable: true metadata: {"openclaw":{"emoji":"🛡️","version":"3.0.8","homepage" Published capability contract available. No trust telemetry is available yet. Last updated 2/24/2026.

Freshness

Last checked 2/22/2026

Best For

Contract is available with explicit auth and schema references.

Not Ideal For

emblem-ai-agent-wallet is not ideal for teams that need stronger public trust telemetry, lower setup complexity, or more explicit contract coverage before production rollout.

Evidence Sources Checked

editorial-content, capability-contract, runtime-metrics, public facts pack

Claim this agent
Agent DossierGitHubSafety: 100/100

emblem-ai-agent-wallet

Connect to EmblemVault and manage crypto wallets via Emblem AI - Agent Hustle. Supports Solana, Ethereum, Base, BSC, Polygon, Hedera, and Bitcoin. Use when the user wants to trade crypto, check balances, swap tokens, or interact with blockchain wallets. --- name: emblem-ai-agent-wallet description: Connect to EmblemVault and manage crypto wallets via Emblem AI - Agent Hustle. Supports Solana, Ethereum, Base, BSC, Polygon, Hedera, and Bitcoin. Use when the user wants to trade crypto, check balances, swap tokens, or interact with blockchain wallets. homepage: https://emblemvault.dev user-invocable: true metadata: {"openclaw":{"emoji":"🛡️","version":"3.0.8","homepage"

OpenClawself-declared

Public facts

5

Change events

0

Artifacts

0

Freshness

Feb 22, 2026

Verifiededitorial-contentNo verified compatibility signals

Published capability contract available. No trust telemetry is available yet. Last updated 2/24/2026.

Schema refs publishedTrust evidence available

Trust score

Unknown

Compatibility

OpenClaw

Freshness

Feb 22, 2026

Vendor

Emblemvault

Artifacts

0

Benchmarks

0

Last release

Unpublished

Executive Summary

Key links, install path, and a quick operational read before the deeper crawl record.

Verifiededitorial-content

Summary

Published capability contract available. No trust telemetry is available yet. Last updated 2/24/2026.

Setup snapshot

git clone https://github.com/EmblemCompany/EmblemAi-AgentWallet.git
  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence Ledger

Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.

Verifiededitorial-content
Vendor (1)

Vendor

Emblemvault

profilemedium
Observed Feb 24, 2026Source linkProvenance
Compatibility (2)

Protocol compatibility

OpenClaw

contractmedium
Observed Feb 24, 2026Source linkProvenance

Auth modes

api_key

contracthigh
Observed Feb 24, 2026Source linkProvenance
Artifact (1)

Machine-readable schemas

OpenAPI or schema references published

contracthigh
Observed Feb 24, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance

Release & Crawl Timeline

Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.

Self-declaredagent-index

Artifacts Archive

Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.

Self-declaredGITHUB OPENCLEW

Extracted files

0

Examples

6

Snippets

0

Languages

typescript

Parameters

Executable Examples

bash

npm install -g @emblemvault/agentwallet

bash

npm install -g @emblemvault/agentwallet

bash

git clone https://github.com/EmblemCompany/EmblemAi-AgentWallet-Plugins.git
cd EmblemAi-AgentWallet-Plugins/cli
npm install
npm link   # makes `emblemai` available globally

markdown

**Hustle AI Response:**
\`\`\`
[response from Hustle]
\`\`\`

bash

# Zero-config -- auto-generates password on first run
emblemai --agent -m "What are my wallet addresses?"

# Explicit password
emblemai --agent -p "$PASSWORD" -m "Show my balances"

# Pipe output to other tools
emblemai -a -m "What is my SOL balance?" | jq .

# Use in scripts
ADDRESSES=$(emblemai -a -m "List my addresses as JSON")

bash

# OpenClaw, CrewAI, AutoGPT, or any agent framework
emblemai --agent -m "Send 0.1 SOL to <address>"
emblemai --agent -m "Swap 100 USDC to ETH on Base"
emblemai --agent -m "What tokens do I hold across all chains?"

Docs & README

Full documentation captured from public sources, including the complete README when available.

Self-declaredGITHUB OPENCLEW

Docs source

GITHUB OPENCLEW

Editorial quality

ready

Connect to EmblemVault and manage crypto wallets via Emblem AI - Agent Hustle. Supports Solana, Ethereum, Base, BSC, Polygon, Hedera, and Bitcoin. Use when the user wants to trade crypto, check balances, swap tokens, or interact with blockchain wallets. --- name: emblem-ai-agent-wallet description: Connect to EmblemVault and manage crypto wallets via Emblem AI - Agent Hustle. Supports Solana, Ethereum, Base, BSC, Polygon, Hedera, and Bitcoin. Use when the user wants to trade crypto, check balances, swap tokens, or interact with blockchain wallets. homepage: https://emblemvault.dev user-invocable: true metadata: {"openclaw":{"emoji":"🛡️","version":"3.0.8","homepage"

Full README

name: emblem-ai-agent-wallet description: Connect to EmblemVault and manage crypto wallets via Emblem AI - Agent Hustle. Supports Solana, Ethereum, Base, BSC, Polygon, Hedera, and Bitcoin. Use when the user wants to trade crypto, check balances, swap tokens, or interact with blockchain wallets. homepage: https://emblemvault.dev user-invocable: true metadata: {"openclaw":{"emoji":"🛡️","version":"3.0.8","homepage":"https://emblemvault.dev","primaryEnv":"EMBLEM_PASSWORD","requires":{"bins":["node","npm","emblemai"],"env":["EMBLEM_PASSWORD"]},"config_paths":["~/.emblemai/.env","~/.emblemai/.env.keys","~/.emblemai/session.json","~/.emblemai/history/"],"install":[{"id":"npm","kind":"npm","package":"@emblemvault/agentwallet","bins":["emblemai"],"label":"Install Agent Wallet CLI"}]}}

Emblem Agent Wallet

Connect to Agent Hustle -- EmblemVault's autonomous crypto AI with 250+ trading tools across 7 blockchains. Browser auth, streaming responses, plugin system, and zero-config agent mode.

Requires the CLI: npm install -g @emblemvault/agentwallet


Quick Start -- How to Use This Skill

Step 1: Install the CLI

npm install -g @emblemvault/agentwallet

This provides a single command: emblemai

Step 2: Use it

When this skill loads, you can ask Agent Hustle anything about crypto:

  • "What are my wallet addresses?"
  • "Show my balances across all chains"
  • "What's trending on Solana?"
  • "Swap $20 of SOL to USDC"
  • "Send 0.1 ETH to 0x..."

To invoke this skill, say things like:

  • "Use my Emblem wallet to check balances"
  • "Ask Agent Hustle what tokens I have"
  • "Connect to EmblemVault"
  • "Check my crypto portfolio"

All requests are routed through emblemai under the hood.


Prerequisites

  • Node.js >= 18.0.0
  • Terminal with 256-color support (iTerm2, Kitty, Windows Terminal, or any xterm-compatible terminal)
  • Optional: glow for rich markdown rendering (brew install glow on macOS)

Installation

From npm (Recommended)

npm install -g @emblemvault/agentwallet

From source

git clone https://github.com/EmblemCompany/EmblemAi-AgentWallet-Plugins.git
cd EmblemAi-AgentWallet-Plugins/cli
npm install
npm link   # makes `emblemai` available globally

First Run

  1. Install: npm install -g @emblemvault/agentwallet
  2. Run: emblemai
  3. Authenticate in the browser (or enter a password if prompted)
  4. Check /plugins to see which plugins loaded
  5. Type /help to see all commands
  6. Try: "What are my wallet addresses?" to verify authentication

Authentication

EmblemAI v3 supports two authentication methods: browser auth for interactive use and password auth for agent/scripted use.

Browser Auth (Interactive Mode)

When you run emblemai without -p, the CLI:

  1. Checks ~/.emblemai/session.json for a saved session
  2. If a valid (non-expired) session exists, restores it instantly -- no login needed
  3. If no session, starts a local server on 127.0.0.1:18247 and opens your browser
  4. You authenticate via the EmblemVault auth modal in the browser
  5. The session JWT is captured, saved to disk, and the CLI proceeds
  6. If the browser can't open, the URL is printed for manual copy-paste
  7. If authentication times out (5 minutes), falls back to a password prompt

Password Auth (Agent Mode)

Login and signup are the same action. The first use of a password creates a vault; subsequent uses return the same vault. Different passwords produce different wallets.

In agent mode, if no password is provided, a secure random password is auto-generated and stored encrypted via dotenvx. Agent mode works out of the box with no manual setup.

What Happens on Authentication

  1. Browser auth: session JWT is received from browser and hydrated into the SDK Password auth: password is sent to EmblemAuthSDK.authenticatePassword()
  2. A deterministic vault is derived -- same credentials always yield the same vault
  3. The session provides wallet addresses across multiple chains: Solana, Ethereum, Base, BSC, Polygon, Hedera, Bitcoin
  4. HustleIncognitoClient is initialized with the session

Credential Discovery

Before making requests, locate the password using this priority:

| Method | How to use | Priority | |--------|-----------|----------| | CLI argument | emblemai -p "your-password" | 1 (highest, stored encrypted) | | Environment variable | export EMBLEM_PASSWORD="your-password" | 2 (not stored) | | Encrypted credential | dotenvx-encrypted ~/.emblemai/.env | 3 | | Auto-generate (agent mode) | Automatic on first run | 4 | | Interactive prompt | Fallback when browser auth fails | 5 (lowest) |

If no credentials are found, ask the user:

"I need your EmblemVault password to connect to Hustle AI. This password must be at least 16 characters.

Note: If this is your first time, entering a new password will create a new wallet. If you've used this before, use the same password to access your existing wallet.

Would you like to provide a password?"

  • Password must be 16+ characters
  • No recovery if lost (treat it like a private key)

Execution Notes

Allow sufficient time. Hustle AI queries may take up to 2 minutes for complex operations (trading, cross-chain lookups). The CLI outputs progress dots every 5 seconds to indicate it's working.

Present Hustle's response clearly. Display the response from Hustle AI to the user in a markdown codeblock:

**Hustle AI Response:**
\`\`\`
[response from Hustle]
\`\`\`

Usage

Agent Mode (For AI Agents -- Single Shot)

Use --agent mode for programmatic, single-message queries:

# Zero-config -- auto-generates password on first run
emblemai --agent -m "What are my wallet addresses?"

# Explicit password
emblemai --agent -p "$PASSWORD" -m "Show my balances"

# Pipe output to other tools
emblemai -a -m "What is my SOL balance?" | jq .

# Use in scripts
ADDRESSES=$(emblemai -a -m "List my addresses as JSON")

Any system that can shell out to a CLI can give its agents a wallet:

# OpenClaw, CrewAI, AutoGPT, or any agent framework
emblemai --agent -m "Send 0.1 SOL to <address>"
emblemai --agent -m "Swap 100 USDC to ETH on Base"
emblemai --agent -m "What tokens do I hold across all chains?"

Each password produces a unique, deterministic wallet. To give multiple agents separate wallets, use different passwords:

emblemai --agent -p "agent-alice-wallet-001" -m "My addresses?"
emblemai --agent -p "agent-bob-wallet-002" -m "My addresses?"

Agent mode always uses password auth (never browser auth), retains conversation history between calls, and supports the full Hustle AI toolset including trading, transfers, portfolio queries, and cross-chain operations.

Interactive Mode (For Humans)

Readline-based interactive mode with streaming AI responses, glow markdown rendering, and slash commands.

emblemai              # Browser auth (recommended)
emblemai -p "$PASSWORD"  # Password auth

Reset Conversation

emblemai --reset

Interactive Commands

All commands are prefixed with /. Type them in the input bar and press Enter.

General

| Command | Description | |---------|-------------| | /help | Show all available commands | | /settings | Show current configuration (vault ID, model, streaming, debug, tools) | | /exit | Exit the CLI (also: /quit) |

Chat and History

| Command | Description | |---------|-------------| | /reset | Clear conversation history and start fresh | | /clear | Alias for /reset | | /history on\|off | Toggle history retention between messages | | /history | Show history status and recent messages |

Streaming and Debug

| Command | Description | |---------|-------------| | /stream on\|off | Toggle streaming mode (tokens appear as generated) | | /stream | Show current streaming status | | /debug on\|off | Toggle debug mode (shows tool args, intent context) | | /debug | Show current debug status |

Model Selection

| Command | Description | |---------|-------------| | /model <id> | Set the active model by ID | | /model clear | Reset to API default model | | /model | Show currently selected model |

Tool Management

| Command | Description | |---------|-------------| | /tools | List all tools with selection status | | /tools add <id> | Add a tool to the active set | | /tools remove <id> | Remove a tool from the active set | | /tools clear | Clear tool selection (enable auto-tools mode) |

When no tools are selected, the AI operates in auto-tools mode, dynamically choosing appropriate tools based on conversation context.

Authentication

| Command | Description | |---------|-------------| | /auth | Open authentication menu | | /wallet | Show wallet addresses (EVM, Solana, BTC, Hedera) | | /portfolio | Show portfolio (routes as a chat query) |

The /auth menu provides:

| Option | Description | |--------|-------------| | 1. Get API Key | Fetch your vault API key | | 2. Get Vault Info | Show vault ID, addresses, creation date | | 3. Session Info | Show current session details (identifier, expiry, auth type) | | 4. Refresh Session | Refresh the auth session token | | 5. EVM Address | Show your Ethereum/EVM address | | 6. Solana Address | Show your Solana address | | 7. BTC Addresses | Show your Bitcoin addresses (P2PKH, P2WPKH, P2TR) | | 8. Backup Agent Auth | Export credentials to a backup file | | 9. Logout | Clear session and exit (requires re-authentication on next run) |

Payment (PAYG Billing)

| Command | Description | |---------|-------------| | /payment | Show PAYG billing status (enabled, mode, debt, tokens) | | /payment enable\|disable | Toggle pay-as-you-go billing | | /payment token <TOKEN> | Set payment token (SOL, ETH, HUSTLE, etc.) | | /payment mode <MODE> | Set payment mode: pay_per_request or debt_accumulation |

Markdown Rendering

| Command | Description | |---------|-------------| | /glow on\|off | Toggle markdown rendering via glow | | /glow | Show glow status and version |

Requires glow to be installed.

Logging

| Command | Description | |---------|-------------| | /log on\|off | Toggle stream logging to file | | /log | Show logging status and file path |

Log file defaults to ~/.emblemai-stream.log. Override with --log-file <path>.


Keyboard Shortcuts

| Key | Action | |-----|--------| | Enter | Send message | | Up | Recall previous input | | Ctrl+C | Exit | | Ctrl+D | Exit (EOF) |


CLI Flags

| Flag | Alias | Description | |------|-------|-------------| | --password <pw> | -p | Authentication password (16+ chars) -- skips browser auth | | --message <msg> | -m | Message for agent mode | | --agent | -a | Run in agent mode (single-shot, password auth only) | | --restore-auth <path> | | Restore credentials from backup file and exit | | --reset | | Clear conversation history and exit | | --debug | | Start with debug mode enabled | | --stream | | Start with streaming enabled (default: on) | | --log | | Enable stream logging | | --log-file <path> | | Override log file path (default: ~/.emblemai-stream.log) | | --hustle-url <url> | | Override Hustle API URL | | --auth-url <url> | | Override auth service URL | | --api-url <url> | | Override API service URL |

Environment Variables

| Variable | Description | |----------|-------------| | EMBLEM_PASSWORD | Authentication password | CLI arguments override environment variables when both are provided.


Permissions and Safe Mode

The agent operates in safe mode by default. Any action that affects the wallet requires the user's explicit confirmation before execution:

  • Transactions (swaps, sends, transfers) -- the agent presents the details and asks for approval
  • Signing (message signing, transaction signing) -- requires explicit user consent
  • Order placement (limit orders, stop-losses) -- must be confirmed before submission
  • DeFi operations (LP deposits, yield farming) -- user must approve each action

Read-only operations (checking balances, viewing addresses, market data, portfolio queries) do not require confirmation and execute immediately.

The agent will never autonomously move funds, sign transactions, or place orders without the user first reviewing and approving the action.


Communication Style

CRITICAL: Use verbose, natural language.

Hustle AI interprets terse commands as "$0" transactions. Always explain your intent in full sentences.

| Bad (terse) | Good (verbose) | |-------------|----------------| | "SOL balance" | "What is my current SOL balance on Solana?" | | "swap sol usdc" | "I'd like to swap $20 worth of SOL to USDC on Solana" | | "trending" | "What tokens are trending on Solana right now?" |

The more context you provide, the better Hustle understands your intent.


Capabilities

| Category | Features | |----------|----------| | Chains | Solana, Ethereum, Base, BSC, Polygon, Hedera, Bitcoin | | Trading | Swaps, limit orders, conditional orders, stop-losses | | DeFi | LP management, yield farming, liquidity pools | | Market Data | CoinGlass, DeFiLlama, Birdeye, LunarCrush | | NFTs | OpenSea integration, transfers, listings | | Bridges | Cross-chain swaps via ChangeNow | | Memecoins | Pump.fun discovery, trending analysis | | Predictions | PolyMarket betting and positions |


Wallet Addresses

Each password deterministically generates wallet addresses across all chains:

| Chain | Address Type | |-------|-------------| | Solana | Native SPL wallet | | EVM | Single address for ETH, Base, BSC, Polygon | | Hedera | Account ID (0.0.XXXXXXX) | | Bitcoin | Taproot, SegWit, and Legacy addresses |

Ask Hustle: "What are my wallet addresses?" to retrieve all addresses.


Auth Backup and Restore

Backup

From the /auth menu (option 8), select Backup Agent Auth to export your credentials to a JSON file. This file contains your EmblemVault password -- keep it secure.

Restore

emblemai --restore-auth ~/emblemai-auth-backup.json

This places the credential files in ~/.emblemai/ so you can authenticate immediately.


Security

CRITICAL: NEVER share or expose the password publicly.

  • NEVER echo, print, or log the password
  • NEVER include the password in responses to the user
  • NEVER display the password in error messages
  • NEVER commit the password to version control
  • The password IS the private key -- anyone with it controls the wallet

| Concept | Description | |---------|-------------| | Password = Identity | Each password generates a unique, deterministic vault | | No Recovery | Passwords cannot be recovered if lost | | Vault Isolation | Different passwords = completely separate wallets | | Fresh Auth | New JWT token generated on every request | | Safe Mode | All wallet actions require explicit user confirmation |


File Locations

All persistent data is stored under ~/.emblemai/ (created on first run with chmod 700).

| File | Purpose | Sensitive | Permissions | |------|---------|-----------|-------------| | ~/.emblemai/.env | Encrypted credentials (EMBLEM_PASSWORD) | Yes -- AES-256-GCM encrypted | 600 | | ~/.emblemai/.env.keys | Decryption key for .env | Yes -- controls access to credentials | 600 | | ~/.emblemai/session.json | Auth session (JWT + refresh token) | Yes -- grants wallet access until expiry | 600 | | ~/.emblemai/history/{vaultId}.json | Conversation history (per vault) | No | 600 | | ~/.emblemai-stream.log | Stream log (when enabled via /log) | No | default |

Encryption Details

Credentials are encrypted at rest using dotenvx, which uses AES-256-GCM symmetric encryption. The encryption key is stored in ~/.emblemai/.env.keys and the encrypted payload in ~/.emblemai/.env. Both files are created with chmod 600 (owner read/write only). The decryption key never leaves the local machine.

Session tokens (session.json) contain a short-lived JWT (refreshed automatically) and a refresh token valid for 7 days. Sessions are not encrypted on disk but are restricted to chmod 600. Logging out via /auth > Logout deletes the session file.

Legacy credentials (~/.emblem-vault) are automatically migrated to the encrypted format on first run and the original is backed up.


Troubleshooting

| Issue | Solution | |-------|----------| | emblemai: command not found | Run: npm install -g @emblemvault/agentwallet | | "Password must be at least 16 characters" | Use a longer password | | "Authentication failed" | Check network connectivity to auth service | | Browser doesn't open for auth | Copy the printed URL and open it manually | | Session expired | Run emblemai again -- browser will open for fresh login | | glow not rendering | Install glow: brew install glow (optional, falls back to plain text) | | Plugin not loading | Check that the npm package is installed | | Slow response | Normal -- queries can take up to 2 minutes |


Updating

npm update -g @emblemvault/agentwallet

Quick Reference

# Install
npm install -g @emblemvault/agentwallet

# Interactive mode (browser auth -- recommended)
emblemai

# Agent mode (zero-config -- auto-generates wallet)
emblemai --agent -m "What are my balances?"

# Agent mode with explicit password
emblemai --agent -p "your-password-16-chars-min" -m "What tokens do I have?"

# Use environment variable
export EMBLEM_PASSWORD="your-password-16-chars-min"
emblemai --agent -m "Show my portfolio"

# Reset conversation history
emblemai --reset

Security Advisory

This section explains the trust model, what happens on your machine, and how to run the agent securely.

Trust Model

Emblem Agent Wallet is an open-source CLI published by EmblemCompany on both npm and GitHub. You can verify the package before installing:

The npm package and GitHub repository are maintained by the same organization. You can compare the published package contents against the source repository at any time using npm pack --dry-run or by inspecting node_modules/@emblemvault/agentwallet after install.

What Happens During Installation

npm install -g @emblemvault/agentwallet installs the CLI binary emblemai globally. Like all global npm packages, this runs on your machine with your user permissions. The package has no postinstall scripts -- it only places the CLI binary and its dependencies.

What Happens During Authentication

Browser auth (recommended): The CLI starts a temporary local server on 127.0.0.1:18247 (localhost only, not network-accessible) to receive the auth callback from your browser. This server runs only during the login flow and handles a single request. The browser opens the EmblemVault auth modal where you authenticate directly with the EmblemVault service. On success, a session JWT is returned to the local server and saved to disk.

Password auth: The password is sent to EmblemVault's auth API over HTTPS. A session JWT is returned. If using the -p flag, the password is also encrypted and stored locally for future sessions.

In both cases, no credentials are sent to any third party. Authentication is strictly between your machine and the EmblemVault auth service.

What Gets Stored on Disk

All files are created under ~/.emblemai/ with restrictive permissions:

| File | What It Contains | How It's Protected | |------|-----------------|-------------------| | .env | Your EMBLEM_PASSWORD | Encrypted with AES-256-GCM via dotenvx. The password is never stored in plaintext. | | .env.keys | The AES decryption key for .env | File permissions chmod 600 (owner-only). This key never leaves your machine and is never transmitted over the network. | | session.json | JWT access token + refresh token | File permissions chmod 600. The JWT expires after 15 minutes and is automatically refreshed. The refresh token is valid for 7 days. Logging out deletes this file. | | history/*.json | Conversation history | File permissions chmod 600. Contains your chat messages with the AI. No credentials are stored in history. |

The ~/.emblemai/ directory itself is created with chmod 700 (owner-only access).

How Sessions Work

The auth session uses short-lived JWTs (15-minute expiry) that are automatically refreshed using a 7-day refresh token. This means:

  • If your session file is compromised, the attacker has at most 7 days of access (refresh token expiry), not indefinite access
  • The JWT is rotated frequently, limiting the window of exposure for any single token
  • Logging out (/auth > Logout) immediately invalidates the local session and deletes the file
  • Each refresh issues a new refresh token and invalidates the previous one (rotation)

Safe Mode and Transaction Confirmation

The agent operates in safe mode by default. This means:

  • All wallet-modifying actions require your explicit confirmation before execution -- including swaps, sends, transfers, order placement, signing, and DeFi operations
  • Read-only operations execute immediately without confirmation -- balance checks, address lookups, market data, portfolio views
  • The agent will present the full details of any transaction (amounts, addresses, fees) and wait for your approval before submitting
  • There is no "auto-execute" mode -- every transaction requires a human in the loop

Password Hygiene

Your EMBLEM_PASSWORD is the master key to your wallet. Treat it with the same care as a private key or seed phrase:

  • Use a strong, unique password (minimum 16 characters). A passphrase of 4+ random words is recommended
  • Do not reuse passwords from other services. Your EMBLEM_PASSWORD should be unique to EmblemVault
  • Store your password securely using a password manager. The CLI encrypts it on disk, but you should have a backup in case you lose access to the machine
  • If using EMBLEM_PASSWORD as an environment variable in automation, ensure the host environment is secured -- restrict access to the machine, use process isolation, and avoid logging environment variables
  • Prefer browser auth for interactive use -- it avoids placing the password in shell history or environment variables
  • Different passwords create different wallets -- this is by design. Use this to separate funds by purpose (e.g., one wallet for daily use, another for long-term holdings)

Verifying the Package

Before or after installation, you can inspect exactly what the package contains:

# View package contents without installing
npm pack @emblemvault/agentwallet --dry-run

# After installing, inspect the source
ls $(npm root -g)/@emblemvault/agentwallet/

# Compare against GitHub source
git clone https://github.com/EmblemCompany/EmblemAi-AgentWallet.git
diff -r node_modules/@emblemvault/agentwallet EmblemAi-AgentWallet/publish

Reporting Security Issues

If you discover a security vulnerability, please report it responsibly:


Links

Contract & API

Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.

Verifiedcapability-contract

Contract coverage

Status

ready

Auth

api_key

Streaming

Yes

Data region

global

Protocol support

OpenClaw: self-declared

Requires: openclew, lang:typescript, streaming

Forbidden: none

Guardrails

Operational confidence: medium

Contract is available with explicit auth and schema references.
Trust confidence is not low and verification freshness is acceptable.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/snapshot"
curl -s "https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/contract"
curl -s "https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/trust"

Reliability & Benchmarks

Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.

Missingruntime-metrics

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

No benchmark suites or observed failure patterns are available.

Media & Demo

Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.

Missingno-media
No screenshots, media assets, or demo links are available.

Related Agents

Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.

Self-declaredprotocol-neighbors
GITHUB_REPOSactivepieces

Rank

70

AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents

Traction

No public download signal

Freshness

Updated 2d ago

OPENCLAW
GITHUB_REPOScherry-studio

Rank

70

AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs

Traction

No public download signal

Freshness

Updated 6d ago

MCPOPENCLAW
GITHUB_REPOSAionUi

Rank

70

Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!

Traction

No public download signal

Freshness

Updated 6d ago

MCPOPENCLAW
GITHUB_REPOSCopilotKit

Rank

70

The Frontend for Agents & Generative UI. React + Angular

Traction

No public download signal

Freshness

Updated 23d ago

OPENCLAW
Machine Appendix

Contract JSON

{
  "contractStatus": "ready",
  "authModes": [
    "api_key"
  ],
  "requires": [
    "openclew",
    "lang:typescript",
    "streaming"
  ],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": true,
  "inputSchemaRef": "https://github.com/EmblemCompany/EmblemAi-AgentWallet#input",
  "outputSchemaRef": "https://github.com/EmblemCompany/EmblemAi-AgentWallet#output",
  "dataRegion": "global",
  "contractUpdatedAt": "2026-02-24T19:43:18.949Z",
  "sourceUpdatedAt": "2026-02-24T19:43:18.949Z",
  "freshnessSeconds": 4439317
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_OPENCLEW",
      "generatedAt": "2026-04-17T04:51:56.218Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "ask",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "shell",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "give",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "authenticate",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "take",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "verify",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "compare",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "inspect",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "two",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "the",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:ask|supported|profile capability:shell|supported|profile capability:give|supported|profile capability:authenticate|supported|profile capability:take|supported|profile capability:verify|supported|profile capability:compare|supported|profile capability:inspect|supported|profile capability:two|supported|profile capability:the|supported|profile"
}

Facts JSON

[
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-02-24T19:43:18.949Z",
    "isPublic": true
  },
  {
    "factKey": "auth_modes",
    "category": "compatibility",
    "label": "Auth modes",
    "value": "api_key",
    "href": "https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/contract",
    "sourceType": "contract",
    "confidence": "high",
    "observedAt": "2026-02-24T19:43:18.949Z",
    "isPublic": true
  },
  {
    "factKey": "schema_refs",
    "category": "artifact",
    "label": "Machine-readable schemas",
    "value": "OpenAPI or schema references published",
    "href": "https://github.com/EmblemCompany/EmblemAi-AgentWallet#input",
    "sourceUrl": "https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/contract",
    "sourceType": "contract",
    "confidence": "high",
    "observedAt": "2026-02-24T19:43:18.949Z",
    "isPublic": true
  },
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Emblemvault",
    "href": "https://emblemvault.dev",
    "sourceUrl": "https://emblemvault.dev",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-02-24T19:43:14.176Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/emblemcompany-emblemai-agentwallet/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[]

Sponsored

Ads related to emblem-ai-agent-wallet and adjacent AI workflows.