Awesome-omni-skill emblem-ai-agent-wallet

Connect to EmblemVault and manage crypto wallets via Emblem AI - Agent Hustle. Supports Solana, Ethereum, Base, BSC, Polygon, Hedera, and Bitcoin. Use when the user wants to trade crypto, check balances, swap tokens, or interact with blockchain wallets.

install
source · Clone the upstream repo
git clone https://github.com/diegosouzapw/awesome-omni-skill
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/diegosouzapw/awesome-omni-skill "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data-ai/emblem-ai-agent-wallet-emblemcompany" ~/.claude/skills/diegosouzapw-awesome-omni-skill-emblem-ai-agent-wallet-13f9d5 && rm -rf "$T"
manifest: skills/data-ai/emblem-ai-agent-wallet-emblemcompany/SKILL.md
source content

Emblem Agent Wallet

Connect to Agent Hustle -- EmblemVault's autonomous crypto AI with 250+ trading tools across 7 blockchains. Browser auth, streaming responses, plugin system, and zero-config agent mode.

Requires the CLI:

npm install -g @emblemvault/agentwallet


Quick Start -- How to Use This Skill

Step 1: Install the CLI

npm install -g @emblemvault/agentwallet

This provides a single command:

emblemai

Step 2: Use it

When this skill loads, you can ask Agent Hustle anything about crypto:

  • "What are my wallet addresses?"
  • "Show my balances across all chains"
  • "What's trending on Solana?"
  • "Swap $20 of SOL to USDC"
  • "Send 0.1 ETH to 0x..."

To invoke this skill, say things like:

  • "Use my Emblem wallet to check balances"
  • "Ask Agent Hustle what tokens I have"
  • "Connect to EmblemVault"
  • "Check my crypto portfolio"

All requests are routed through

emblemai
under the hood.


Prerequisites

  • Node.js >= 18.0.0
  • Terminal with 256-color support (iTerm2, Kitty, Windows Terminal, or any xterm-compatible terminal)
  • Optional: glow for rich markdown rendering (
    brew install glow
    on macOS)

Installation

From npm (Recommended)

npm install -g @emblemvault/agentwallet

From source

git clone https://github.com/EmblemCompany/EmblemAi-cli.git
cd EmblemAi-cli
npm install
npm link   # makes `emblemai` available globally

First Run

  1. Install:
    npm install -g @emblemvault/agentwallet
  2. Run:
    emblemai
  3. Authenticate in the browser (or enter a password if prompted)
  4. Check
    /plugins
    to see which plugins loaded
  5. Type
    /help
    to see all commands
  6. Try: "What are my wallet addresses?" to verify authentication

Authentication

EmblemAI v3 supports two authentication methods: browser auth for interactive use and password auth for agent/scripted use.

Browser Auth (Interactive Mode)

When you run

emblemai
without
-p
, the CLI:

  1. Checks
    ~/.emblemai/session.json
    for a saved session
  2. If a valid (non-expired) session exists, restores it instantly -- no login needed
  3. If no session, starts a local server on
    127.0.0.1:18247
    and opens your browser
  4. You authenticate via the EmblemVault auth modal in the browser
  5. The session JWT is captured, saved to disk, and the CLI proceeds
  6. If the browser can't open, the URL is printed for manual copy-paste
  7. If authentication times out (5 minutes), falls back to a password prompt

Password Auth (Agent Mode)

Login and signup are the same action. The first use of a password creates a vault; subsequent uses return the same vault. Different passwords produce different wallets.

In agent mode, if no password is provided, a secure random password is auto-generated and stored encrypted via dotenvx. Agent mode works out of the box with no manual setup.

What Happens on Authentication

  1. Browser auth: session JWT is received from browser and hydrated into the SDK Password auth: password is sent to
    EmblemAuthSDK.authenticatePassword()
  2. A deterministic vault is derived -- same credentials always yield the same vault
  3. The session provides wallet addresses across multiple chains: Solana, Ethereum, Base, BSC, Polygon, Hedera, Bitcoin
  4. HustleIncognitoClient
    is initialized with the session

Credential Discovery

Before making requests, locate the password using this priority:

MethodHow to usePriority
CLI argument
emblemai -p "your-password"
1 (highest, stored encrypted)
Environment variable
export EMBLEM_PASSWORD="your-password"
2 (not stored)
Encrypted credentialdotenvx-encrypted
~/.emblemai/.env
3
Auto-generate (agent mode)Automatic on first run4
Interactive promptFallback when browser auth fails5 (lowest)

If no credentials are found, ask the user:

"I need your EmblemVault password to connect to Hustle AI. This password must be at least 16 characters.

Note: If this is your first time, entering a new password will create a new wallet. If you've used this before, use the same password to access your existing wallet.

Would you like to provide a password?"

  • Password must be 16+ characters
  • No recovery if lost (treat it like a private key)

Execution Notes

Allow sufficient time. Hustle AI queries may take up to 2 minutes for complex operations (trading, cross-chain lookups). The CLI outputs progress dots every 5 seconds to indicate it's working.

Present Hustle's response clearly. Display the response from Hustle AI to the user in a markdown codeblock:

**Hustle AI Response:**
\`\`\`
[response from Hustle]
\`\`\`

Usage

Agent Mode (For AI Agents -- Single Shot)

Use

--agent
mode for programmatic, single-message queries:

# Zero-config -- auto-generates password on first run
emblemai --agent -m "What are my wallet addresses?"

# Explicit password
emblemai --agent -p "$PASSWORD" -m "Show my balances"

# Pipe output to other tools
emblemai -a -m "What is my SOL balance?" | jq .

# Use in scripts
ADDRESSES=$(emblemai -a -m "List my addresses as JSON")

Any system that can shell out to a CLI can give its agents a wallet:

# OpenClaw, CrewAI, AutoGPT, or any agent framework
emblemai --agent -m "Send 0.1 SOL to <address>"
emblemai --agent -m "Swap 100 USDC to ETH on Base"
emblemai --agent -m "What tokens do I hold across all chains?"

Each password produces a unique, deterministic wallet. To give multiple agents separate wallets, use different passwords:

emblemai --agent -p "agent-alice-wallet-001" -m "My addresses?"
emblemai --agent -p "agent-bob-wallet-002" -m "My addresses?"

Agent mode always uses password auth (never browser auth), retains conversation history between calls, and supports the full Hustle AI toolset including trading, transfers, portfolio queries, and cross-chain operations.

Interactive Mode (For Humans)

Readline-based interactive mode with streaming AI responses, glow markdown rendering, and slash commands.

emblemai              # Browser auth (recommended)
emblemai -p "$PASSWORD"  # Password auth

Reset Conversation

emblemai --reset

Interactive Commands

All commands are prefixed with

/
. Type them in the input bar and press Enter.

General

CommandDescription
/help
Show all available commands
/settings
Show current configuration (vault ID, model, streaming, debug, tools)
/exit
Exit the CLI (also:
/quit
)

Chat and History

CommandDescription
/reset
Clear conversation history and start fresh
/clear
Alias for
/reset
/history on|off
Toggle history retention between messages
/history
Show history status and recent messages

Streaming and Debug

CommandDescription
/stream on|off
Toggle streaming mode (tokens appear as generated)
/stream
Show current streaming status
/debug on|off
Toggle debug mode (shows tool args, intent context)
/debug
Show current debug status

Model Selection

CommandDescription
/model <id>
Set the active model by ID
/model clear
Reset to API default model
/model
Show currently selected model

Tool Management

CommandDescription
/tools
List all tools with selection status
/tools add <id>
Add a tool to the active set
/tools remove <id>
Remove a tool from the active set
/tools clear
Clear tool selection (enable auto-tools mode)

When no tools are selected, the AI operates in auto-tools mode, dynamically choosing appropriate tools based on conversation context.

Authentication

CommandDescription
/auth
Open authentication menu
/wallet
Show wallet addresses (EVM, Solana, BTC, Hedera)
/portfolio
Show portfolio (routes as a chat query)

The

/auth
menu provides:

OptionDescription
1. Get API KeyFetch your vault API key
2. Get Vault InfoShow vault ID, addresses, creation date
3. Session InfoShow current session details (identifier, expiry, auth type)
4. Refresh SessionRefresh the auth session token
5. EVM AddressShow your Ethereum/EVM address
6. Solana AddressShow your Solana address
7. BTC AddressesShow your Bitcoin addresses (P2PKH, P2WPKH, P2TR)
8. Backup Agent AuthExport credentials to a backup file
9. LogoutClear session and exit (requires re-authentication on next run)

Payment (PAYG Billing)

CommandDescription
/payment
Show PAYG billing status (enabled, mode, debt, tokens)
/payment enable|disable
Toggle pay-as-you-go billing
/payment token <TOKEN>
Set payment token (SOL, ETH, HUSTLE, etc.)
/payment mode <MODE>
Set payment mode:
pay_per_request
or
debt_accumulation

Markdown Rendering

CommandDescription
/glow on|off
Toggle markdown rendering via glow
/glow
Show glow status and version

Requires glow to be installed.

Logging

CommandDescription
/log on|off
Toggle stream logging to file
/log
Show logging status and file path

Log file defaults to

~/.emblemai-stream.log
. Override with
--log-file <path>
.


Keyboard Shortcuts

KeyAction
Enter
Send message
Up
Recall previous input
Ctrl+C
Exit
Ctrl+D
Exit (EOF)

CLI Flags

FlagAliasDescription
--password <pw>
-p
Authentication password (16+ chars) -- skips browser auth
--message <msg>
-m
Message for agent mode
--agent
-a
Run in agent mode (single-shot, password auth only)
--restore-auth <path>
Restore credentials from backup file and exit
--reset
Clear conversation history and exit
--debug
Start with debug mode enabled
--stream
Start with streaming enabled (default: on)
--log
Enable stream logging
--log-file <path>
Override log file path (default:
~/.emblemai-stream.log
)
--hustle-url <url>
Override Hustle API URL
--auth-url <url>
Override auth service URL
--api-url <url>
Override API service URL

Environment Variables

VariableDescription
EMBLEM_PASSWORD
Authentication password
CLI arguments override environment variables when both are provided.

Permissions and Safe Mode

The agent operates in safe mode by default. Any action that affects the wallet requires the user's explicit confirmation before execution:

  • Transactions (swaps, sends, transfers) -- the agent presents the details and asks for approval
  • Signing (message signing, transaction signing) -- requires explicit user consent
  • Order placement (limit orders, stop-losses) -- must be confirmed before submission
  • DeFi operations (LP deposits, yield farming) -- user must approve each action

Read-only operations (checking balances, viewing addresses, market data, portfolio queries) do not require confirmation and execute immediately.

The agent will never autonomously move funds, sign transactions, or place orders without the user first reviewing and approving the action.


Communication Style

CRITICAL: Use verbose, natural language.

Hustle AI interprets terse commands as "$0" transactions. Always explain your intent in full sentences.

Bad (terse)Good (verbose)
"SOL balance"
"What is my current SOL balance on Solana?"
"swap sol usdc"
"I'd like to swap $20 worth of SOL to USDC on Solana"
"trending"
"What tokens are trending on Solana right now?"

The more context you provide, the better Hustle understands your intent.


Capabilities

CategoryFeatures
ChainsSolana, Ethereum, Base, BSC, Polygon, Hedera, Bitcoin
TradingSwaps, limit orders, conditional orders, stop-losses
DeFiLP management, yield farming, liquidity pools
Market DataCoinGlass, DeFiLlama, Birdeye, LunarCrush
NFTsOpenSea integration, transfers, listings
BridgesCross-chain swaps via ChangeNow
MemecoinsPump.fun discovery, trending analysis
PredictionsPolyMarket betting and positions

Wallet Addresses

Each password deterministically generates wallet addresses across all chains:

ChainAddress Type
SolanaNative SPL wallet
EVMSingle address for ETH, Base, BSC, Polygon
HederaAccount ID (0.0.XXXXXXX)
BitcoinTaproot, SegWit, and Legacy addresses

Ask Hustle:

"What are my wallet addresses?"
to retrieve all addresses.


Auth Backup and Restore

Backup

From the

/auth
menu (option 8), select Backup Agent Auth to export your credentials to a JSON file. This file contains your EmblemVault password -- keep it secure.

Restore

emblemai --restore-auth ~/emblemai-auth-backup.json

This places the credential files in

~/.emblemai/
so you can authenticate immediately.


Security

CRITICAL: NEVER share or expose the password publicly.

  • NEVER echo, print, or log the password
  • NEVER include the password in responses to the user
  • NEVER display the password in error messages
  • NEVER commit the password to version control
  • The password IS the private key -- anyone with it controls the wallet
ConceptDescription
Password = IdentityEach password generates a unique, deterministic vault
No RecoveryPasswords cannot be recovered if lost
Vault IsolationDifferent passwords = completely separate wallets
Fresh AuthNew JWT token generated on every request
Safe ModeAll wallet actions require explicit user confirmation

File Locations

All persistent data is stored under

~/.emblemai/
(created on first run with
chmod 700
).

FilePurposeSensitivePermissions
~/.emblemai/.env
Encrypted credentials (EMBLEM_PASSWORD)Yes -- AES-256-GCM encrypted
600
~/.emblemai/.env.keys
Decryption key for
.env
Yes -- controls access to credentials
600
~/.emblemai/session.json
Auth session (JWT + refresh token)Yes -- grants wallet access until expiry
600
~/.emblemai/history/{vaultId}.json
Conversation history (per vault)No
600
~/.emblemai-stream.log
Stream log (when enabled via
/log
)
Nodefault

Encryption Details

Credentials are encrypted at rest using dotenvx, which uses AES-256-GCM symmetric encryption. The encryption key is stored in

~/.emblemai/.env.keys
and the encrypted payload in
~/.emblemai/.env
. Both files are created with
chmod 600
(owner read/write only). The decryption key never leaves the local machine.

Session tokens (

session.json
) contain a short-lived JWT (refreshed automatically) and a refresh token valid for 7 days. Sessions are not encrypted on disk but are restricted to
chmod 600
. Logging out via
/auth
> Logout deletes the session file.

Legacy credentials (

~/.emblem-vault
) are automatically migrated to the encrypted format on first run and the original is backed up.


Troubleshooting

IssueSolution
emblemai: command not found
Run:
npm install -g @emblemvault/agentwallet
"Password must be at least 16 characters"Use a longer password
"Authentication failed"Check network connectivity to auth service
Browser doesn't open for authCopy the printed URL and open it manually
Session expiredRun
emblemai
again -- browser will open for fresh login
glow not renderingInstall glow:
brew install glow
(optional, falls back to plain text)
Plugin not loadingCheck that the npm package is installed
Slow responseNormal -- queries can take up to 2 minutes

Updating

npm update -g @emblemvault/agentwallet

Quick Reference

# Install
npm install -g @emblemvault/agentwallet

# Interactive mode (browser auth -- recommended)
emblemai

# Agent mode (zero-config -- auto-generates wallet)
emblemai --agent -m "What are my balances?"

# Agent mode with explicit password
emblemai --agent -p "your-password-16-chars-min" -m "What tokens do I have?"

# Use environment variable
export EMBLEM_PASSWORD="your-password-16-chars-min"
emblemai --agent -m "Show my portfolio"

# Reset conversation history
emblemai --reset

Security Advisory

This section explains the trust model, what happens on your machine, and how to run the agent securely.

Trust Model

Emblem Agent Wallet is an open-source CLI published by EmblemCompany on both npm and GitHub. You can verify the package before installing:

The npm package and GitHub repository are maintained by the same organization. You can compare the published package contents against the source repository at any time using

npm pack --dry-run
or by inspecting
node_modules/@emblemvault/agentwallet
after install.

What Happens During Installation

npm install -g @emblemvault/agentwallet
installs the CLI binary
emblemai
globally. Like all global npm packages, this runs on your machine with your user permissions. The package has no
postinstall
scripts -- it only places the CLI binary and its dependencies.

What Happens During Authentication

Browser auth (recommended): The CLI starts a temporary local server on

127.0.0.1:18247
(localhost only, not network-accessible) to receive the auth callback from your browser. This server runs only during the login flow and handles a single request. The browser opens the EmblemVault auth modal where you authenticate directly with the EmblemVault service. On success, a session JWT is returned to the local server and saved to disk.

Password auth: The password is sent to EmblemVault's auth API over HTTPS. A session JWT is returned. If using the

-p
flag, the password is also encrypted and stored locally for future sessions.

In both cases, no credentials are sent to any third party. Authentication is strictly between your machine and the EmblemVault auth service.

What Gets Stored on Disk

All files are created under

~/.emblemai/
with restrictive permissions:

FileWhat It ContainsHow It's Protected
.env
Your EMBLEM_PASSWORDEncrypted with AES-256-GCM via dotenvx. The password is never stored in plaintext.
.env.keys
The AES decryption key for
.env
File permissions
chmod 600
(owner-only). This key never leaves your machine and is never transmitted over the network.
session.json
JWT access token + refresh tokenFile permissions
chmod 600
. The JWT expires after 15 minutes and is automatically refreshed. The refresh token is valid for 7 days. Logging out deletes this file.
history/*.json
Conversation historyFile permissions
chmod 600
. Contains your chat messages with the AI. No credentials are stored in history.

The

~/.emblemai/
directory itself is created with
chmod 700
(owner-only access).

How Sessions Work

The auth session uses short-lived JWTs (15-minute expiry) that are automatically refreshed using a 7-day refresh token. This means:

  • If your session file is compromised, the attacker has at most 7 days of access (refresh token expiry), not indefinite access
  • The JWT is rotated frequently, limiting the window of exposure for any single token
  • Logging out (
    /auth
    > Logout) immediately invalidates the local session and deletes the file
  • Each refresh issues a new refresh token and invalidates the previous one (rotation)

Safe Mode and Transaction Confirmation

The agent operates in safe mode by default. This means:

  • All wallet-modifying actions require your explicit confirmation before execution -- including swaps, sends, transfers, order placement, signing, and DeFi operations
  • Read-only operations execute immediately without confirmation -- balance checks, address lookups, market data, portfolio views
  • The agent will present the full details of any transaction (amounts, addresses, fees) and wait for your approval before submitting
  • There is no "auto-execute" mode -- every transaction requires a human in the loop

Password Hygiene

Your EMBLEM_PASSWORD is the master key to your wallet. Treat it with the same care as a private key or seed phrase:

  • Use a strong, unique password (minimum 16 characters). A passphrase of 4+ random words is recommended
  • Do not reuse passwords from other services. Your EMBLEM_PASSWORD should be unique to EmblemVault
  • Store your password securely using a password manager. The CLI encrypts it on disk, but you should have a backup in case you lose access to the machine
  • If using
    EMBLEM_PASSWORD
    as an environment variable
    in automation, ensure the host environment is secured -- restrict access to the machine, use process isolation, and avoid logging environment variables
  • Prefer browser auth for interactive use -- it avoids placing the password in shell history or environment variables
  • Different passwords create different wallets -- this is by design. Use this to separate funds by purpose (e.g., one wallet for daily use, another for long-term holdings)

Verifying the Package

Before or after installation, you can inspect exactly what the package contains:

# View package contents without installing
npm pack @emblemvault/agentwallet --dry-run

# After installing, inspect the source
ls $(npm root -g)/@emblemvault/agentwallet/

# Compare against GitHub source
git clone https://github.com/EmblemCompany/EmblemAi-AgentWallet.git
diff -r node_modules/@emblemvault/agentwallet EmblemAi-AgentWallet/publish

Reporting Security Issues

If you discover a security vulnerability, please report it responsibly:


Links