authenticate-wallet
SKILL.md
Authenticating the AgnicPay Wallet
Use npx agnic@latest auth login to authenticate via browser-based OAuth. This opens the user's default browser to AgnicPay where they sign in and set spending limits for the CLI session.
Confirm wallet is initialized and authed
npx agnic@latest status
If already authenticated, no further action is needed. If not authenticated, proceed with login.
Login Flow
npx agnic@latest auth login
This command:
- Starts a temporary local server on a random port
- Opens the user's default browser to AgnicPay's OAuth consent screen
- The user signs in (email, Google, or wallet) and approves spending limits
- The browser redirects back to
http://localhost:<port>/callback - The CLI exchanges the authorization code for tokens and saves them locally
Wait for the CLI to print ✓ Authenticated! before proceeding.
Verify Authentication
After login, confirm the session is active:
npx agnic@latest status
Expected output:
Wallet Status
✓ Authenticated
Email: user@example.com
Wallet: 0x742d35Cc6634C0532925a3b844Bc9e7595f0bEb7
Expires: 2026-05-22 14:30:00 UTC
Logout
To remove stored credentials:
npx agnic@latest auth logout
Token Storage
Credentials are stored in ~/.agnic/config.json with restricted permissions (0600). Tokens auto-refresh on 401 responses — no manual re-authentication needed until the refresh token expires (90 days).
Error Handling
Common errors:
- "Not authenticated" — Run
npx agnic@latest auth login - "Authentication failed" — User cancelled the browser flow or the timeout (5 min) expired
- "Could not open browser" — The CLI prints a URL to copy and open manually
- "Token expired" — Tokens auto-refresh; if refresh also fails, re-run
npx agnic@latest auth login
Weekly Installs
5
Repository
agnicpay/agnic-…t-skillsFirst Seen
Feb 21, 2026
Security Audits
Installed on
opencode5
gemini-cli5
github-copilot5
codex5
kimi-cli5
amp5