TxIntent objects and calls ISCL Core over HTTP. The adapter never sees private keys, never signs transactions, and never contacts the blockchain directly.
Supported frameworks
MCP (Claude Desktop / Cursor)
6 tools for Claude Desktop, Cursor, and other MCP-compatible IDEs. Ask Claude to send tokens, swap, or check balances.
ElizaOS (ai16z)
5 actions replacing
@elizaos/plugin-evm. Natural language crypto operations with policy-enforced signing.Telegram Bot
Chat-based crypto operations with inline approval keyboards. Same-sender enforcement and chat allowlisting.
OpenClaw
Thin skill wrappers for OpenClaw’s runtime. Build, preflight, and approve via ISCL Core.
How adapters work
Every adapter follows the same two-step pipeline for fund-affecting operations:Approve request
The adapter constructs a
TxIntent and calls POST /v1/tx/approve-request. ISCL Core evaluates policy, runs preflight simulation, and prompts the user for approval. This call blocks until the user approves or denies.Choosing an approval mode
The approval mode determines how the user confirms transactions. SetISCL_APPROVAL_MODE on ISCL Core:
| Mode | Behavior | Best for |
|---|---|---|
cli | Readline prompt in the ISCL Core terminal | Development, single-user CLI workflows |
web | Pending requests appear on the web dashboard at /approval-ui | MCP, Telegram, multi-tool setups |
auto | Auto-approved without human confirmation | Testing only |
Security model
All adapters are Domain A (untrusted). They satisfy these invariants:- No key access. Adapters never see private keys. They only know the wallet address.
- Full pipeline enforcement. Every transaction goes through policy evaluation, preflight simulation, and user approval.
- No direct blockchain access. All RPC calls are mediated by ISCL Core in Domain B.
- No raw calldata. Adapters construct declarative
TxIntentobjects. ISCL Core builds the actual transaction. - Audit trail. All operations are logged with the adapter’s
sourceidentifier for traceability.
Build your own
Need an adapter for a different framework? See the custom adapter tutorial for a step-by-step guide covering theISCLClient, intent builder, pipeline function, and framework integration patterns for MCP, ElizaOS, Telegram, and OpenClaw.
Next steps
- MCP adapter setup — Connect Claude Desktop or Cursor
- ElizaOS plugin setup — Replace plugin-evm with Clavion
- Telegram bot setup — Chat-based crypto with inline approval
- Custom adapter tutorial — Build an adapter for any framework
- Approval model — How the approval flow works
- Configuration — All environment variables