← Back to Skills
Automation

aegis-security

swiftadviser By swiftadviser 👁 10 views ▲ 0 votes

Blockchain security API for AI agents.

GitHub
---
name: aegis-security
version: 1.2.2
description: Blockchain security API for AI agents. Scan tokens, simulate transactions, check addresses for threats.
homepage: https://aegis402.xyz
user-invocable: true
disable-model-invocation: true
metadata: {"emoji":"🛡️","category":"blockchain-security","api_base":"https://aegis402.xyz/v1","free_tier_daily_limit":100,"openclaw":{"emoji":"🛡️","homepage":"https://aegis402.xyz"}}
---

# Aegis402 Shield Protocol

Blockchain security API for AI agents.

Free tier: 100 checks/day, then pay-per-request with USDC on Base or Solana.

## Security Defaults

- This skill is manual-use only (`disable-model-invocation: true`).
- Do not ask for or store private keys, seed phrases, or mnemonics.
- Confirm intent before paid calls (especially `simulate-tx`).
- Automate pre-sign checks only if the user has explicitly approved that automation.
- Required env vars for this skill: none.

## Agent Quickstart (Scan Before Transact)

Default policy for agents and wallets:

1. Set `X-Client-Fingerprint: <stable_agent_or_user_id>` for predictable free-tier accounting.
2. Before sending any transaction, run in parallel:
   - `GET /v1/check-address/:to`
   - `POST /v1/simulate-tx`
   - (Optional) `GET /v1/check-token/:token` for tokens involved (swaps/approvals)
3. Block and ask for confirmation if any result indicates `HIGH`/`CRITICAL`, `isSafe=false`, or recipient is poisoned/flagged.
4. Otherwise allow, but still show the review summary + raw JSON.

Notes:

- Free tier is best-effort abuse-limited, not a security mechanism. Rotating fingerprints can bypass free-tier buckets.
- If `X-Client-Fingerprint` is omitted, the service falls back to other request signals (IP/User-Agent) for accounting.

## What To Do (Agent Mode, From Zero)

When a user is about to send a transaction:

1. Ask for missing intent:
   - `from`, `to`, `value`, `data` (or "native transfer"), `chain_id`
2. Check free tier (always free):
   - `GET /v1/usage`
3. Run the scan-before-transact checks (parallel):
   - `GET /v1/check-address/:to`
   - `POST /v1/simulate-tx`
   - (Optional) `GET /v1/check-token/:token`
4. Reply using templates below (summary first, then raw JSON).

## How To Reply (Templates)

### SAFE (LOW)

```
🛡️ Scan Complete

Risk: LOW (SAFE)
Summary: No critical warnings detected.

✅ OK to proceed.
```

### CAUTION (MEDIUM)

```
🛡️ Scan Complete

Risk: MEDIUM (CAUTION)
Summary: Some warnings detected.

⚠️ Review recommended before proceeding. Want me to explain the top 3 risks?
```

### DANGEROUS (HIGH)

```
🛡️ Scan Complete

Risk: HIGH (DANGEROUS)
Summary: Significant risks detected.

🚫 Not recommended.
```

### BLOCKED (CRITICAL)

```
🛡️ Scan Complete

Risk: CRITICAL (BLOCKED)
Summary: Do not proceed.

🚫 Stop. This transaction/recipient appears malicious or unsafe.
```

### 402 Payment Required

```
I tried to run a paid check but payment isn't set up (or the wallet has insufficient USDC).

To enable paid checks:
1. Fund a programmatic wallet with a small amount of USDC (Base default; Solana also supported)
2. Install an x402 client (@x402/fetch + chain package)
3. Configure an agent-managed wallet signer (no raw private keys in prompts/env)
```

## Reference

### Skill Files

| File | URL |
|------|-----|
| **SKILL.md** (this file) | `https://aegis402.xyz/skill.md` |
| **skill.json** (metadata) | `https://aegis402.xyz/skill.json` |

**Base URL:** `https://aegis402.xyz/v1`

### Pricing

| Endpoint | Price | Use Case |
|----------|-------|----------|
| `POST /simulate-tx` | $0.05 | Transaction simulation, DeFi safety |
| `GET /check-token/:address` | $0.01 | Token honeypot detection |
| `GET /check-address/:address` | $0.005 | Address reputation check |

Free tier: 100 checks/day. Track usage via `GET /v1/usage`.

### Usage (Free)

```bash
curl "https://aegis402.xyz/v1/usage"
```

Example response:

```json
{
  "freeTier": {
    "enabled": true,
    "dailyLimit": 100,
    "usedToday": 2,
    "remainingChecks": 98,
    "nextResetAt": "2026-02-11T00:00:00.000Z",
    "resetTimezone": "UTC"
  },
  "_meta": {
    "requestId": "uuid",
    "tier": "free",
    "eventType": "free_tier_call",
    "latencyMs": 4
  }
}
```

### check-address

```bash
curl "https://aegis402.xyz/v1/check-address/0x742d35Cc6634C0532925a3b844Bc454e4438f44e?chain_id=8453"
```

### simulate-tx

Request body fields:

- `from` (required): sender address
- `to` (required): recipient or contract
- `value` (required): amount in wei (string)
- `data` (optional): calldata hex (`0x...`)
- `chain_id` (optional): chain being simulated (default: Base 8453 is a common choice for payments, but simulation chain is up to you)

```bash
curl -X POST "https://aegis402.xyz/v1/simulate-tx" \
  -H "Content-Type: application/json" \
  -d '{
    "from": "0xYourWallet...",
    "to": "0xContract...",
    "value": "0",
    "data": "0x",
    "chain_id": 8453
  }'
```

### check-token

`chain_id` is the chain you want to scan (Ethereum=1, Base=8453, etc). Payment rail is driven by the `402` challenge (default: USDC on Base).

```bash
curl "https://aegis402.xyz/v1/check-token/0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48?chain_id=1"
```

## Payments (x402)

You can use the API for free until your fingerprint uses 100 checks/day. After that, the API returns `402 Payment Required` and an x402 client can automatically pay and retry.

| Network | Agentic Wallet Signer |
|---------|------------------------|
| Base (EVM) | EVM signer from an agent wallet provider |
| Solana | Solana signer from an agent wallet provider |

### Minimal Node Client (agent-managed EVM signer)

```bash
npm install @x402/[email protected] @x402/[email protected]
```

```ts
import { x402Client, wrapFetchWithPayment } from '@x402/fetch';
import { ExactEvmScheme } from '@x402/evm/exact/client';

const fingerprint = 'agent-default';
const signer = yourAgenticEvmSigner;
const client = new x402Client()
  .register('eip155:*', new ExactEvmScheme(signer));

const fetch402 = wrapFetchWithPayment(fetch, client);
const res = await fetch402('https://aegis402.xyz/v1/usage', {
  headers: { 'X-Client-Fingerprint': fingerprint },
});
console.log(await res.json());
```

### Solana Client (agent-managed signer)

```bash
npm install @x402/[email protected] @x402/[email protected]
```

```ts
import { x402Client, wrapFetchWithPayment } from '@x402/fetch';
import { ExactSvmScheme } from '@x402/svm/exact/client';

const signer = yourAgenticSolanaSigner;
const client = new x402Client()
  .register('solana:*', new ExactSvmScheme(signer));
const fetch402 = wrapFetchWithPayment(fetch, client);
```

## Agent Safety Policy

- Never request these from a user: private keys, seed phrases, mnemonics.
- Never store signer secrets in prompts, logs, or skill docs.
- Confirm intent before paid calls (especially `simulate-tx`).
- Automate pre-sign checks only if the user has explicitly approved that automation.

## Appendix

### Risk Levels

| Level | Meaning | Agent Default |
|-------|---------|---------------|
| `LOW` | Minor concerns, generally safe | allow |
| `MEDIUM` | Some risks | show review; consider confirm |
| `HIGH` | Significant risks | block + confirm |
| `CRITICAL` | Unsafe/malicious | block |

### Errors and What To Do

| Status | Meaning | What the agent should do |
|--------|---------|--------------------------|
| 400 | Invalid parameters | ask user for missing/invalid fields and retry |
| 402 | Payment required | confirm intent, then use an approved agent wallet signer (or wait for next free-tier reset) |
| 500 | Service/upstream error | retry once; if persistent, show error + `requestId` |

Tips:

- Every response includes `_meta.requestId`. The server also sets `x-request-id` header; include it in bug reports.
- Upgrade hints may be present in headers:
  - `x-aegis-skill-latest-version`
  - `x-aegis-skill-url`
  - `x-aegis-skill-upgrade`

### Optional: Feedback, Issues, Expectations (Agent-Friendly)

Help us improve!

If you hit an issue or want to set expectations, do it in a way that's safe for the end-user:

- Do not include private keys, seed phrases, mnemonics, API keys, or any secrets.
- (optional) Include `_meta.requestId` (or the `x-request-id` header) so we can correlate server-side.
- If you are acting on behalf of a user, ask for permission before sending. Default behavior: show a copy/paste report template.

Copy/paste report template:

```text
Aegis402 report

Type: issue | feedback | expectation
RequestId: <_meta.requestId>
Endpoint: <path>
Status: <http status>
ChainId: <chain_id or NULL>
When (UTC): <timestamp>

What I expected:
What happened:
Minimal repro (curl or steps):

Notes (redacted):
```

Preferred channel (no GitHub required):

- `POST /v1/feedback` (free, non-consuming)

Example (only with user approval):

```bash
curl -X POST "https://aegis402.xyz/v1/feedback" \
  -H "Content-Type: application/json" \
  -H "X-Client-Fingerprint: <stable-non-pii-id>" \
  -d '{
    "kind": "issue",
    "summary": "Short summary",
    "expected": "What I expected",
    "happened": "What happened",
    "repro": "Minimal repro steps or curl",
    "endpoint": "/v1/check-token/0x...",
    "status_code": 400,
    "chain_id": "8453",
    "agent": { "name": "my-agent", "version": "1.2.3" },
    "extra": { "failed_request_id": "<_meta.requestId>" }
  }'
```

### Optional: Share A Scam Catch (Moltbook)

Share Your Experience! Only offer this after a `HIGH` or `CRITICAL` result, and only if the user explicitly approves sharing a redacted story publicly.

Rules:

- Share your true experience, but without identifying information or sensitive details.
- Never include: private keys, seed phrases, mnemonics, signatures, raw calldata, full wallet addresses, full tx hashes, `X-Client-Fingerprint`, or anything the user considers identifying.
- Prefer rounded amounts (for example, `$1,000`) and omit exact timestamps if needed.

Copy/paste Moltbook template (redacted):

```text
Title: How I caught a scam transaction and saved ~$XXX!

🛡️ What happene

... (truncated)
automation

Comments

Sign in to leave a comment

Loading comments...