wallet

Multi-chain wallet — balances, transfers, signing, policy (EVM multi-chain + Solana)

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "wallet" with this command: npx skills add starchild-ai-agent/official-skills/starchild-ai-agent-official-skills-wallet

💰 Wallet Skill

Multi-chain wallet for EVM (DeBank-supported chains) + Solana. Balances, transfers, signing, policy management.

Tools

ToolDescription
wallet_infoGet all wallet addresses
wallet_balanceEVM balance on a chain (DeBank)
wallet_sol_balanceSolana balance (Birdeye)
wallet_get_all_balancesAll chains at once
wallet_transferBroadcast EVM tx (gas sponsored by default, user-paid fallback)
wallet_sign_transactionSign EVM tx (no broadcast)
wallet_signEIP-191 message signing
wallet_sign_typed_dataEIP-712 typed data signing
wallet_transactionsEVM tx history
wallet_sol_transferBroadcast Solana tx
wallet_sol_sign_transactionSign Solana tx (no broadcast)
wallet_sol_signSolana message signing
wallet_sol_transactionsSolana tx history
wallet_get_policyCheck policy status
wallet_propose_policyPropose policy (sends to UI)

Key Facts

  • Gas is sponsored by default on EVM chains — user doesn't need native tokens for gas. Falls back to user-paid if sponsorship is unavailable. Use sponsor=false in wallet_transfer to explicitly pay gas from wallet balance.
  • Policy default: OFF (allow-all). Only when user enables policy do transactions need UI confirmation
  • Supported EVM chains: All DeBank-supported chains. Common names auto-mapped to DeBank chain IDs (e.g. avalancheavax, bscbsc, zksyncera). For full chain list call db_chain_list() from the debank skill. The 16 common chains (ethereum, base, arbitrum, optimism, polygon, linea, bsc, avalanche, fantom, gnosis, zksync, scroll, blast, mantle, celo, aurora) have built-in fallback mapping.
  • Balance sources: DeBank (EVM), Birdeye (Solana), wallet-service (fallback)

Workflow

Check Balances

  1. Single chain: wallet_balance(chain="base") or wallet_sol_balance()
  2. All at once: wallet_get_all_balances()

Send Transaction (EVM)

  1. Check balance: wallet_balance(chain=...)
  2. Transfer: wallet_transfer(to=..., amount=..., chain_id=...)
  3. Verify: wallet_transactions() or check balance again

Policy Management

  1. Check: wallet_get_policy(chain_type="ethereum")
  2. If user wants to enable: wallet_propose_policy(chain_type, rules, title, description)
  3. User confirms in UI → policy applied

Standard Wildcard Policy (when needed)

rules = [
  {"name": "Deny key export", "method": "exportPrivateKey", "conditions": [], "action": "DENY"},
  {"name": "Allow all", "method": "*", "conditions": [], "action": "ALLOW"},
]

Policy Modes — CRITICAL DECISION TABLE

⚠️ DENY > ALLOW in Privy. DENY * overrides ALL ALLOW rules. NEVER mix them.

ModeRulesEffect
Allow-all (default)DENY exportPrivateKey + ALLOW *Everything allowed except key export
Deny-all (lockdown)DENY exportPrivateKey + DENY *Nothing works. No ALLOW rules!
Whitelist (selective)DENY exportPrivateKey + specific ALLOW rules onlyOnly whitelisted ops work, rest implicitly denied

Mode 1: Allow-All (Standard Wildcard)

rules = [
  {"name": "Deny key export", "method": "exportPrivateKey", "conditions": [], "action": "DENY"},
  {"name": "Allow all", "method": "*", "conditions": [], "action": "ALLOW"},
]

Mode 2: Deny-All (Lockdown)

rules = [
  {"name": "Deny key export", "method": "exportPrivateKey", "conditions": [], "action": "DENY"},
  {"name": "Deny all actions", "method": "*", "conditions": [], "action": "DENY"},
]
# ⚠️ NO ALLOW rules here — DENY * would override them!

Mode 3: Whitelist (Selective Allow)

rules = [
  {"name": "Deny key export", "method": "exportPrivateKey", "conditions": [], "action": "DENY"},
  {"name": "Allow transfer to Uniswap", "method": "eth_sendTransaction", "conditions": [
    {"field_source": "ethereum_transaction", "field": "to", "operator": "eq", "value": "0x833589fCD6eDb6E08f4c7C32D4f71b54bdA02913"}
  ], "action": "ALLOW"},
]
# ⚠️ NO "DENY *" here! enabled=true already denies everything not ALLOWed.
# Adding DENY * would override the ALLOW rules above (DENY > ALLOW).

Privy Policy Rules — Key Constraints

RuleDetails
Default behaviorenabled=true → deny-all unless explicitly ALLOWed
DENY > ALLOWDENY always wins when both match
Empty conditionsOnly exportPrivateKey and * (wildcard) allow conditions: []
TX methods need conditionseth_sendTransaction, eth_signTransaction, eth_signTypedData_v4, eth_signUserOperation, signAndSendTransaction, etc. ALL require ≥1 condition
Valid field_sourcesEVM: ethereum_transaction (to/value/chain_id), ethereum_calldata (function_name), ethereum_typed_data_domain (chainId/verifyingContract), ethereum_typed_data_message, system
Valid operatorseq, gt, gte, lt, lte, in (array, max 100 values)
Dual chainCall wallet_propose_policy TWICE for EVM + Solana

Gotchas

  • wallet_propose_policy sends SSE event to frontend — needs streaming context
  • DeBank/Birdeye keys are auto-injected by sc-proxy
  • wallet_balance requires chain param — use wallet_get_all_balances for discovery
  • For both EVM + Solana policy, call wallet_propose_policy TWICE

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Web3

wallet-mcp

Generate, manage, and perform multi-chain wallet operations on Solana and EVM chains with JSON output, including batch sends, sweeps, scans, imports, and exp...

Registry SourceRecently Updated
730Profile unavailable
Web3

Zerion API

Query crypto wallet portfolios, transactions, DeFi positions, NFTs, token prices, and gas fees across EVM chains and Solana using Zerion's API.

Registry SourceRecently Updated
1.3K0Profile unavailable
Web3

Zerion Api

Query real-time crypto wallet portfolios, transactions, DeFi positions, token prices, NFTs, and gas fees across EVM chains and Solana via Zerion's MCP API.

Registry SourceRecently Updated
2K7Profile unavailable
Security

Bank of Bots

Trust scoring for AI agents. Log transactions and submit payment proofs to build a verifiable BOB Score — a trust score (think FICO but for AI Agents) that o...

Registry SourceRecently Updated
2610Profile unavailable