Infrastructure for the Starknet agent economy: contracts, runtimes, and skills to run self-custodial AI agents with on-chain identity, policy-enforced execution, and composable tool access.
Most agent stacks treat wallets as add-ons. starknet-agentic treats wallets, identity, and execution policy as first-class system boundaries.
This repo gives you:
- account-level control rails (session keys, spending policy, revoke paths)
- ERC-8004 identity, reputation, and validation registries on Starknet
- MCP and A2A integration packages for agent runtimes
- reusable skills and end-to-end examples
If you just want Starknet agent capabilities now:
npx create-starknet-agent@latestSanity check (npm availability):
npm view create-starknet-agent versionThe scaffolder detects your environment (OpenClaw/MoltBook, Claude Code, Cursor, or standalone) and wires Starknet integration automatically.
Use the path that matches your runtime:
# Full project scaffold
npx create-starknet-agent@latest# Codex (public GitHub install, cairo-auditor)
skill-installer install https://github.com/keep-starknet-strange/starknet-agentic/tree/main/skills/cairo-auditor
# Restart Codex, then run /skills and invoke cairo-auditor# Codex (reproducible install pinned to a released tag)
skill-installer install https://github.com/keep-starknet-strange/starknet-agentic/tree/v0.2.2/skills/cairo-auditor# Claude Code marketplace
/plugin marketplace add keep-starknet-strange/starknet-agentic
/plugin install starknet-agentic-skills@starknet-agentic-skills --scope local
/reload-plugins
/plugin menu
/starknet-agentic-skills:cairo-auditor# Individual skill install via Agent Skills CLI
npx skills add keep-starknet-strange/starknet-agentic/skills/cairo-auditorFor deterministic install/usage guidance, see:
For the full skill catalog and Cairo migration notes, see skills/README.md and docs/CAIRO_SKILLS_MIGRATION.md.
- CLI users (
npx create-starknet-agent@latest): Node.js>=18.0.0 - Contributors from source (this monorepo):
- Node.js
>=20.9.0 pnpm>=10.28.2(workspace package manager)- Scarb
>=2.14.0+ Starknet Foundry (snforge)>=0.54.1(for Cairo builds/tests)
- Node.js
| Goal | Start here |
|---|---|
| Add Starknet tools to an existing agent | packages/create-starknet-agent |
| Run local no-backend onboarding demo | examples/onboard-agent |
| Run autonomous loop with MCP tools | examples/full-stack-swarm |
| Integrate on-chain identity/reputation | contracts/erc8004-cairo |
| Build production signer boundary | packages/starknet-mcp-server + external signer (proxy mode) |
flowchart TB
A["Agent Runtime<br/>(OpenClaw, Claude Code, custom app)"] --> B["MCP / A2A Layer<br/>starknet-mcp-server, starknet-a2a, skills"]
B --> C["Signer Boundary<br/>direct (dev) or proxy (prod)"]
C --> D["Starknet Contracts"]
D --> D1["Agent-account stack<br/>owner controls + spending policy enforcement"]
D --> D2["ERC-8004 Registries<br/>Identity, Reputation, Validation"]
D --> D3["Session-account primitives<br/>session-key account modules"]
Default launch profile is self-custodial and no-backend:
- users run agent runtime locally or on their own infra
- transaction policy is enforced on-chain by account contracts
- no central signer or shared custody by this project
For production environments, use MCP proxy signer mode rather than raw in-process private keys.
| Component | Path | What it does |
|---|---|---|
| Agent account contracts | contracts/agent-account |
Session keys, policy enforcement, ownership controls |
| ERC-8004 Cairo registries | contracts/erc8004-cairo |
Identity, reputation, validation primitives |
| Session-account primitives | contracts/session-account |
Session-key account modules for policy-centric execution |
| Huginn registry | contracts/huginn-registry |
Additional registry primitives used by ecosystem demos |
| Package | Path | Purpose |
|---|---|---|
create-starknet-agent |
packages/create-starknet-agent |
Scaffolds/installs Starknet agent integration |
@starknet-agentic/mcp-server |
packages/starknet-mcp-server |
Starknet operations over MCP |
@starknet-agentic/a2a |
packages/starknet-a2a |
A2A protocol adapter |
@starknet-agentic/agent-passport |
packages/starknet-agent-passport |
ERC-8004 capability metadata helpers |
@starknet-agentic/prediction-arb-scanner |
packages/prediction-arb-scanner |
Signals-only prediction market arb scanner output model |
x402-starknet (internal) |
packages/x402-starknet |
Internal workspace package for Starknet payment signing utilities |
@starknet-agentic/onboarding-utils |
packages/starknet-onboarding-utils |
Shared onboarding helpers |
Skill packs live in skills/. Browse full catalog and install flows in skills/README.md.
Cairo migration notes and legacy mapping live in docs/CAIRO_SKILLS_MIGRATION.md.
Install one skill:
npx skills add keep-starknet-strange/starknet-agentic/skills/starknet-wallet| Standard | Purpose | Implementation |
|---|---|---|
| MCP | Agent tool interface | packages/starknet-mcp-server |
| A2A | Agent-to-agent messaging/workflows | packages/starknet-a2a |
| ERC-8004 | Agent identity/reputation/validation | contracts/erc8004-cairo |
Parity and Starknet-specific behavior for ERC-8004 is documented in docs/ERC8004-PARITY.md.
pnpm install# full workspace
pnpm build
pnpm test
# packages only (faster path when you do not need example/website checks)
pnpm -r --filter "./packages/*" build
pnpm -r --filter "./packages/*" testfailed=0
for dir in contracts/erc8004-cairo contracts/huginn-registry contracts/agent-account contracts/session-account; do
if ! (cd "$dir" && scarb build && snforge test); then
echo "Cairo checks failed in $dir"
failed=1
break
fi
done
[ "$failed" -eq 0 ]Before running, configure the required environment in:
examples/hello-agent/README.md
# from repo root (after configuring examples/hello-agent/.env)
pnpm demo:hello-agent| Example | What it proves |
|---|---|
examples/hello-agent |
Minimal RPC + state read + transaction path |
examples/onboard-agent |
Deploy agent account + register identity + receipt artifacts |
examples/defi-agent |
Autonomous DeFi strategy agent (triangular arb + risk controls) |
examples/carry-agent |
Deterministic carry monitor (Extended funding + net-edge decision artifact) |
examples/full-stack-swarm |
Autonomous multi-agent run with MCP + signer boundary + ERC-8004 |
examples/secure-defi-demo |
Base reputation envelope + Starknet guardrails + Vesu flow artifact |
examples/crosschain-demo |
Cross-chain registration flow (Base Sepolia + Starknet Sepolia) |
examples/erc8004-validation-demo |
Validation request/response + summary extraction |
examples/starkzap-onboard-transfer |
End-to-end Starkzap onboarding and STRK transfer flow (Sepolia) |
examples/controller-calls |
Non-custodial unsigned-call flow with external signer execution |
- read security policy:
SECURITY.md - hardened signer setup: use proxy signer mode in
packages/starknet-mcp-server - GitHub Actions quality gates:
ci.yml,codeql.yml,dependency-review.yml - publish pipeline uses provenance + attestations:
publish.yml
Release artifact verification (recommended):
gh attestation verify <artifact-file> --repo keep-starknet-strange/starknet-agenticstarknet-agentic/
├── .agents/ # Codex discovery entrypoints (symlinks to skills/*)
├── contracts/ # Cairo contracts (account, ERC-8004, session-account)
├── packages/ # MCP/A2A/CLI and supporting libraries
├── skills/ # Agent skill packs
├── examples/ # End-to-end demos and reference flows
├── docs/ # Specs, roadmap, troubleshooting, launch material
└── website/ # Documentation website
- getting started:
docs/GETTING_STARTED.md - roadmap:
docs/ROADMAP.md - specification:
docs/SPECIFICATION.md - troubleshooting:
docs/TROUBLESHOOTING.md - good first tasks:
docs/GOOD_FIRST_ISSUES.md
See CONTRIBUTING.md.
MIT (LICENSE)