emblem-ai-agent-wallet
Emblem Agent Wallet
Connect to Agent Hustle -- EmblemVault's autonomous crypto AI with 250+ trading tools across 7 blockchains. Browser auth, streaming responses, plugin system, and zero-config agent mode.
Requires the CLI: npm install -g @emblemvault/agentwallet
Quick Start -- How to Use This Skill
Step 1: Install the CLI
npm install -g @emblemvault/agentwallet
This provides a single command: emblemai
Step 2: Use it
When this skill loads, you can ask Agent Hustle anything about crypto:
- "What are my wallet addresses?"
- "Show my balances across all chains"
- "What's trending on Solana?"
- "Swap $20 of SOL to USDC"
- "Send 0.1 ETH to 0x..."
To invoke this skill, say things like:
- "Use my Emblem wallet to check balances"
- "Ask Agent Hustle what tokens I have"
- "Connect to EmblemVault"
- "Check my crypto portfolio"
All requests are routed through emblemai under the hood.
Prerequisites
- Node.js >= 18.0.0
- Terminal with 256-color support (iTerm2, Kitty, Windows Terminal, or any xterm-compatible terminal)
- Optional: glow for rich markdown rendering (
brew install glowon macOS)
Installation
From npm (Recommended)
npm install -g @emblemvault/agentwallet
From source
git clone https://github.com/EmblemCompany/EmblemAi-cli.git
cd EmblemAi-cli
npm install
npm link # makes `emblemai` available globally
First Run
- Install:
npm install -g @emblemvault/agentwallet - Run:
emblemai - Authenticate in the browser (or enter a password if prompted)
- Check
/pluginsto see which plugins loaded - Type
/helpto see all commands - Try: "What are my wallet addresses?" to verify authentication
Authentication
EmblemAI v3 supports two authentication methods: browser auth for interactive use and password auth for agent/scripted use.
Browser Auth (Interactive Mode)
When you run emblemai without -p, the CLI:
- Checks
~/.emblemai/session.jsonfor a saved session - If a valid (non-expired) session exists, restores it instantly -- no login needed
- If no session, starts a local server on
127.0.0.1:18247and opens your browser - You authenticate via the EmblemVault auth modal in the browser
- The session JWT is captured, saved to disk, and the CLI proceeds
- If the browser can't open, the URL is printed for manual copy-paste
- If authentication times out (5 minutes), falls back to a password prompt
Password Auth (Agent Mode)
Login and signup are the same action. The first use of a password creates a vault; subsequent uses return the same vault. Different passwords produce different wallets.
In agent mode, if no password is provided, a secure random password is auto-generated and stored encrypted via dotenvx. Agent mode works out of the box with no manual setup.
What Happens on Authentication
- Browser auth: session JWT is received from browser and hydrated into the SDK
Password auth: password is sent to
EmblemAuthSDK.authenticatePassword() - A deterministic vault is derived -- same credentials always yield the same vault
- The session provides wallet addresses across multiple chains: Solana, Ethereum, Base, BSC, Polygon, Hedera, Bitcoin
HustleIncognitoClientis initialized with the session
Credential Discovery
Before making requests, locate the password using this priority:
| Method | How to use | Priority |
|---|---|---|
| CLI argument | emblemai -p "your-password" |
1 (highest, stored encrypted) |
| Environment variable | export EMBLEM_PASSWORD="your-password" |
2 (not stored) |
| Encrypted credential | dotenvx-encrypted ~/.emblemai/.env |
3 |
| Auto-generate (agent mode) | Automatic on first run | 4 |
| Interactive prompt | Fallback when browser auth fails | 5 (lowest) |
If no credentials are found, ask the user:
"I need your EmblemVault password to connect to Hustle AI. This password must be at least 16 characters.
Note: If this is your first time, entering a new password will create a new wallet. If you've used this before, use the same password to access your existing wallet.
Would you like to provide a password?"
- Password must be 16+ characters
- No recovery if lost (treat it like a private key)
Execution Notes
Allow sufficient time. Hustle AI queries may take up to 2 minutes for complex operations (trading, cross-chain lookups). The CLI outputs progress dots every 5 seconds to indicate it's working.
Present Hustle's response clearly. Display the response from Hustle AI to the user in a markdown codeblock:
**Hustle AI Response:**
\`\`\`
[response from Hustle]
\`\`\`
Usage
Agent Mode (For AI Agents -- Single Shot)
Use --agent mode for programmatic, single-message queries:
# Zero-config -- auto-generates password on first run
emblemai --agent -m "What are my wallet addresses?"
# Explicit password
emblemai --agent -p "$PASSWORD" -m "Show my balances"
# Pipe output to other tools
emblemai -a -m "What is my SOL balance?" | jq .
# Use in scripts
ADDRESSES=$(emblemai -a -m "List my addresses as JSON")
Any system that can shell out to a CLI can give its agents a wallet:
# OpenClaw, CrewAI, AutoGPT, or any agent framework
emblemai --agent -m "Send 0.1 SOL to <address>"
emblemai --agent -m "Swap 100 USDC to ETH on Base"
emblemai --agent -m "What tokens do I hold across all chains?"
Each password produces a unique, deterministic wallet. To give multiple agents separate wallets, use different passwords:
emblemai --agent -p "agent-alice-wallet-001" -m "My addresses?"
emblemai --agent -p "agent-bob-wallet-002" -m "My addresses?"
Agent mode always uses password auth (never browser auth), retains conversation history between calls, and supports the full Hustle AI toolset including trading, transfers, portfolio queries, and cross-chain operations.
Interactive Mode (For Humans)
Readline-based interactive mode with streaming AI responses, glow markdown rendering, and slash commands.
emblemai # Browser auth (recommended)
emblemai -p "$PASSWORD" # Password auth
Reset Conversation
emblemai --reset
Interactive Commands
All commands are prefixed with /. Type them in the input bar and press Enter.
General
| Command | Description |
|---|---|
/help |
Show all available commands |
/settings |
Show current configuration (vault ID, model, streaming, debug, tools) |
/exit |
Exit the CLI (also: /quit) |
Chat and History
| Command | Description |
|---|---|
/reset |
Clear conversation history and start fresh |
/clear |
Alias for /reset |
/history on|off |
Toggle history retention between messages |
/history |
Show history status and recent messages |
Streaming and Debug
| Command | Description |
|---|---|
/stream on|off |
Toggle streaming mode (tokens appear as generated) |
/stream |
Show current streaming status |
/debug on|off |
Toggle debug mode (shows tool args, intent context) |
/debug |
Show current debug status |
Model Selection
| Command | Description |
|---|---|
/model <id> |
Set the active model by ID |
/model clear |
Reset to API default model |
/model |
Show currently selected model |
Tool Management
| Command | Description |
|---|---|
/tools |
List all tools with selection status |
/tools add <id> |
Add a tool to the active set |
/tools remove <id> |
Remove a tool from the active set |
/tools clear |
Clear tool selection (enable auto-tools mode) |
When no tools are selected, the AI operates in auto-tools mode, dynamically choosing appropriate tools based on conversation context.
Authentication
| Command | Description |
|---|---|
/auth |
Open authentication menu |
/wallet |
Show wallet addresses (EVM, Solana, BTC, Hedera) |
/portfolio |
Show portfolio (routes as a chat query) |
The /auth menu provides:
| Option | Description |
|---|---|
| 1. Get API Key | Fetch your vault API key |
| 2. Get Vault Info | Show vault ID, addresses, creation date |
| 3. Session Info | Show current session details (identifier, expiry, auth type) |
| 4. Refresh Session | Refresh the auth session token |
| 5. EVM Address | Show your Ethereum/EVM address |
| 6. Solana Address | Show your Solana address |
| 7. BTC Addresses | Show your Bitcoin addresses (P2PKH, P2WPKH, P2TR) |
| 8. Backup Agent Auth | Export credentials to a backup file |
| 9. Logout | Clear session and exit (requires re-authentication on next run) |
Payment (PAYG Billing)
| Command | Description |
|---|---|
/payment |
Show PAYG billing status (enabled, mode, debt, tokens) |
/payment enable|disable |
Toggle pay-as-you-go billing |
/payment token <TOKEN> |
Set payment token (SOL, ETH, HUSTLE, etc.) |
/payment mode <MODE> |
Set payment mode: pay_per_request or debt_accumulation |
Markdown Rendering
| Command | Description |
|---|---|
/glow on|off |
Toggle markdown rendering via glow |
/glow |
Show glow status and version |
Requires glow to be installed.
Logging
| Command | Description |
|---|---|
/log on|off |
Toggle stream logging to file |
/log |
Show logging status and file path |
Log file defaults to ~/.emblemai-stream.log. Override with --log-file <path>.
Keyboard Shortcuts
| Key | Action |
|---|---|
Enter |
Send message |
Up |
Recall previous input |
Ctrl+C |
Exit |
Ctrl+D |
Exit (EOF) |
CLI Flags
| Flag | Alias | Description |
|---|---|---|
--password <pw> |
-p |
Authentication password (16+ chars) -- skips browser auth |
--message <msg> |
-m |
Message for agent mode |
--agent |
-a |
Run in agent mode (single-shot, password auth only) |
--restore-auth <path> |
Restore credentials from backup file and exit | |
--reset |
Clear conversation history and exit | |
--debug |
Start with debug mode enabled | |
--stream |
Start with streaming enabled (default: on) | |
--log |
Enable stream logging | |
--log-file <path> |
Override log file path (default: ~/.emblemai-stream.log) |
|
--hustle-url <url> |
Override Hustle API URL | |
--auth-url <url> |
Override auth service URL | |
--api-url <url> |
Override API service URL |
Environment Variables
| Variable | Description |
|---|---|
EMBLEM_PASSWORD |
Authentication password |
| CLI arguments override environment variables when both are provided. |
Permissions and Safe Mode
The agent operates in safe mode by default. Any action that affects the wallet requires the user's explicit confirmation before execution:
- Transactions (swaps, sends, transfers) -- the agent presents the details and asks for approval
- Signing (message signing, transaction signing) -- requires explicit user consent
- Order placement (limit orders, stop-losses) -- must be confirmed before submission
- DeFi operations (LP deposits, yield farming) -- user must approve each action
Read-only operations (checking balances, viewing addresses, market data, portfolio queries) do not require confirmation and execute immediately.
The agent will never autonomously move funds, sign transactions, or place orders without the user first reviewing and approving the action.
Communication Style
CRITICAL: Use verbose, natural language.
Hustle AI interprets terse commands as "$0" transactions. Always explain your intent in full sentences.
| Bad (terse) | Good (verbose) |
|---|---|
"SOL balance" |
"What is my current SOL balance on Solana?" |
"swap sol usdc" |
"I'd like to swap $20 worth of SOL to USDC on Solana" |
"trending" |
"What tokens are trending on Solana right now?" |
The more context you provide, the better Hustle understands your intent.
Capabilities
| Category | Features |
|---|---|
| Chains | Solana, Ethereum, Base, BSC, Polygon, Hedera, Bitcoin |
| Trading | Swaps, limit orders, conditional orders, stop-losses |
| DeFi | LP management, yield farming, liquidity pools |
| Market Data | CoinGlass, DeFiLlama, Birdeye, LunarCrush |
| NFTs | OpenSea integration, transfers, listings |
| Bridges | Cross-chain swaps via ChangeNow |
| Memecoins | Pump.fun discovery, trending analysis |
| Predictions | PolyMarket betting and positions |
Wallet Addresses
Each password deterministically generates wallet addresses across all chains:
| Chain | Address Type |
|---|---|
| Solana | Native SPL wallet |
| EVM | Single address for ETH, Base, BSC, Polygon |
| Hedera | Account ID (0.0.XXXXXXX) |
| Bitcoin | Taproot, SegWit, and Legacy addresses |
Ask Hustle: "What are my wallet addresses?" to retrieve all addresses.
Auth Backup and Restore
Backup
From the /auth menu (option 8), select Backup Agent Auth to export your credentials to a JSON file. This file contains your EmblemVault password -- keep it secure.
Restore
emblemai --restore-auth ~/emblemai-auth-backup.json
This places the credential files in ~/.emblemai/ so you can authenticate immediately.
Security
CRITICAL: NEVER share or expose the password publicly.
- NEVER echo, print, or log the password
- NEVER include the password in responses to the user
- NEVER display the password in error messages
- NEVER commit the password to version control
- The password IS the private key -- anyone with it controls the wallet
| Concept | Description |
|---|---|
| Password = Identity | Each password generates a unique, deterministic vault |
| No Recovery | Passwords cannot be recovered if lost |
| Vault Isolation | Different passwords = completely separate wallets |
| Fresh Auth | New JWT token generated on every request |
| Safe Mode | All wallet actions require explicit user confirmation |
File Locations
All persistent data is stored under ~/.emblemai/ (created on first run with chmod 700).
| File | Purpose | Sensitive | Permissions |
|---|---|---|---|
~/.emblemai/.env |
Encrypted credentials (EMBLEM_PASSWORD) | Yes -- AES-256-GCM encrypted | 600 |
~/.emblemai/.env.keys |
Decryption key for .env |
Yes -- controls access to credentials | 600 |
~/.emblemai/session.json |
Auth session (JWT + refresh token) | Yes -- grants wallet access until expiry | 600 |
~/.emblemai/history/{vaultId}.json |
Conversation history (per vault) | No | 600 |
~/.emblemai-stream.log |
Stream log (when enabled via /log) |
No | default |
Encryption Details
Credentials are encrypted at rest using dotenvx, which uses AES-256-GCM symmetric encryption. The encryption key is stored in ~/.emblemai/.env.keys and the encrypted payload in ~/.emblemai/.env. Both files are created with chmod 600 (owner read/write only). The decryption key never leaves the local machine.
Session tokens (session.json) contain a short-lived JWT (refreshed automatically) and a refresh token valid for 7 days. Sessions are not encrypted on disk but are restricted to chmod 600. Logging out via /auth > Logout deletes the session file.
Legacy credentials (~/.emblem-vault) are automatically migrated to the encrypted format on first run and the original is backed up.
Troubleshooting
| Issue | Solution |
|---|---|
emblemai: command not found |
Run: npm install -g @emblemvault/agentwallet |
| "Password must be at least 16 characters" | Use a longer password |
| "Authentication failed" | Check network connectivity to auth service |
| Browser doesn't open for auth | Copy the printed URL and open it manually |
| Session expired | Run emblemai again -- browser will open for fresh login |
| glow not rendering | Install glow: brew install glow (optional, falls back to plain text) |
| Plugin not loading | Check that the npm package is installed |
| Slow response | Normal -- queries can take up to 2 minutes |
Updating
npm update -g @emblemvault/agentwallet
Quick Reference
# Install
npm install -g @emblemvault/agentwallet
# Interactive mode (browser auth -- recommended)
emblemai
# Agent mode (zero-config -- auto-generates wallet)
emblemai --agent -m "What are my balances?"
# Agent mode with explicit password
emblemai --agent -p "your-password-16-chars-min" -m "What tokens do I have?"
# Use environment variable
export EMBLEM_PASSWORD="your-password-16-chars-min"
emblemai --agent -m "Show my portfolio"
# Reset conversation history
emblemai --reset
Security Advisory
This section explains the trust model, what happens on your machine, and how to run the agent securely.
Trust Model
Emblem Agent Wallet is an open-source CLI published by EmblemCompany on both npm and GitHub. You can verify the package before installing:
- npm registry: @emblemvault/agentwallet -- check the publisher, version history, and download stats
- Source code: github.com/EmblemCompany/EmblemAi-AgentWallet -- full source is public and auditable
- Homepage: emblemvault.dev -- the project homepage with documentation
The npm package and GitHub repository are maintained by the same organization. You can compare the published package contents against the source repository at any time using npm pack --dry-run or by inspecting node_modules/@emblemvault/agentwallet after install.
What Happens During Installation
npm install -g @emblemvault/agentwallet installs the CLI binary emblemai globally. Like all global npm packages, this runs on your machine with your user permissions. The package has no postinstall scripts -- it only places the CLI binary and its dependencies.
What Happens During Authentication
Browser auth (recommended): The CLI starts a temporary local server on 127.0.0.1:18247 (localhost only, not network-accessible) to receive the auth callback from your browser. This server runs only during the login flow and handles a single request. The browser opens the EmblemVault auth modal where you authenticate directly with the EmblemVault service. On success, a session JWT is returned to the local server and saved to disk.
Password auth: The password is sent to EmblemVault's auth API over HTTPS. A session JWT is returned. If using the -p flag, the password is also encrypted and stored locally for future sessions.
In both cases, no credentials are sent to any third party. Authentication is strictly between your machine and the EmblemVault auth service.
What Gets Stored on Disk
All files are created under ~/.emblemai/ with restrictive permissions:
| File | What It Contains | How It's Protected |
|---|---|---|
.env |
Your EMBLEM_PASSWORD | Encrypted with AES-256-GCM via dotenvx. The password is never stored in plaintext. |
.env.keys |
The AES decryption key for .env |
File permissions chmod 600 (owner-only). This key never leaves your machine and is never transmitted over the network. |
session.json |
JWT access token + refresh token | File permissions chmod 600. The JWT expires after 15 minutes and is automatically refreshed. The refresh token is valid for 7 days. Logging out deletes this file. |
history/*.json |
Conversation history | File permissions chmod 600. Contains your chat messages with the AI. No credentials are stored in history. |
The ~/.emblemai/ directory itself is created with chmod 700 (owner-only access).
How Sessions Work
The auth session uses short-lived JWTs (15-minute expiry) that are automatically refreshed using a 7-day refresh token. This means:
- If your session file is compromised, the attacker has at most 7 days of access (refresh token expiry), not indefinite access
- The JWT is rotated frequently, limiting the window of exposure for any single token
- Logging out (
/auth> Logout) immediately invalidates the local session and deletes the file - Each refresh issues a new refresh token and invalidates the previous one (rotation)
Safe Mode and Transaction Confirmation
The agent operates in safe mode by default. This means:
- All wallet-modifying actions require your explicit confirmation before execution -- including swaps, sends, transfers, order placement, signing, and DeFi operations
- Read-only operations execute immediately without confirmation -- balance checks, address lookups, market data, portfolio views
- The agent will present the full details of any transaction (amounts, addresses, fees) and wait for your approval before submitting
- There is no "auto-execute" mode -- every transaction requires a human in the loop
Password Hygiene
Your EMBLEM_PASSWORD is the master key to your wallet. Treat it with the same care as a private key or seed phrase:
- Use a strong, unique password (minimum 16 characters). A passphrase of 4+ random words is recommended
- Do not reuse passwords from other services. Your EMBLEM_PASSWORD should be unique to EmblemVault
- Store your password securely using a password manager. The CLI encrypts it on disk, but you should have a backup in case you lose access to the machine
- If using
EMBLEM_PASSWORDas an environment variable in automation, ensure the host environment is secured -- restrict access to the machine, use process isolation, and avoid logging environment variables - Prefer browser auth for interactive use -- it avoids placing the password in shell history or environment variables
- Different passwords create different wallets -- this is by design. Use this to separate funds by purpose (e.g., one wallet for daily use, another for long-term holdings)
Verifying the Package
Before or after installation, you can inspect exactly what the package contains:
# View package contents without installing
npm pack @emblemvault/agentwallet --dry-run
# After installing, inspect the source
ls $(npm root -g)/@emblemvault/agentwallet/
# Compare against GitHub source
git clone https://github.com/EmblemCompany/EmblemAi-AgentWallet.git
diff -r node_modules/@emblemvault/agentwallet EmblemAi-AgentWallet/publish
Reporting Security Issues
If you discover a security vulnerability, please report it responsibly:
- GitHub: Open an issue at github.com/EmblemCompany/EmblemAi-AgentWallet/issues
- Discord: Report in the security channel at discord.gg/Q93wbfsgBj