Skip to main content
Clavion provides adapters for four AI agent frameworks. Each adapter is a Domain A component that constructs TxIntent objects and calls ISCL Core over HTTP. The adapter never sees private keys, never signs transactions, and never contacts the blockchain directly.

Supported frameworks

How adapters work

Every adapter follows the same two-step pipeline for fund-affecting operations:
1

Approve request

The adapter constructs a TxIntent and calls POST /v1/tx/approve-request. ISCL Core evaluates policy, runs preflight simulation, and prompts the user for approval. This call blocks until the user approves or denies.
2

Sign and send

If approved, the adapter calls POST /v1/tx/sign-and-send with the single-use approval token. ISCL Core verifies the token, signs the transaction, and broadcasts it to the blockchain.
Read-only operations (balance lookups, transaction receipt queries) call the API directly without the approval pipeline.

Choosing an approval mode

The approval mode determines how the user confirms transactions. Set ISCL_APPROVAL_MODE on ISCL Core:
ModeBehaviorBest for
cliReadline prompt in the ISCL Core terminalDevelopment, single-user CLI workflows
webPending requests appear on the web dashboard at /approval-uiMCP, Telegram, multi-tool setups
autoAuto-approved without human confirmationTesting only
Never use auto mode in production. It bypasses human confirmation entirely.
For MCP and Telegram, use ISCL_APPROVAL_MODE=web so approval happens through the dashboard or bot UI rather than the terminal.

Security model

All adapters are Domain A (untrusted). They satisfy these invariants:
  • No key access. Adapters never see private keys. They only know the wallet address.
  • Full pipeline enforcement. Every transaction goes through policy evaluation, preflight simulation, and user approval.
  • No direct blockchain access. All RPC calls are mediated by ISCL Core in Domain B.
  • No raw calldata. Adapters construct declarative TxIntent objects. ISCL Core builds the actual transaction.
  • Audit trail. All operations are logged with the adapter’s source identifier for traceability.

Build your own

Need an adapter for a different framework? See the custom adapter tutorial for a step-by-step guide covering the ISCLClient, intent builder, pipeline function, and framework integration patterns for MCP, ElizaOS, Telegram, and OpenClaw.

Next steps