@waiaas/skills 2.11.0-rc.21 → 2.11.0-rc.23

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -133,7 +133,7 @@ waiaas quickset # Creates wallets + sessions automatically
133
133
  waiaas set-master # (Later) Harden password, then delete recovery.key
134
134
  ```
135
135
 
136
- The `--auto-provision` flag generates a cryptographically random master password and saves it to `~/.waiaas/recovery.key`. All subsequent CLI commands read it automatically. See the [Agent Self-Setup Guide](docs/guides/agent-self-setup.md) for the complete flow.
136
+ The `--auto-provision` flag generates a cryptographically random master password and saves it to `~/.waiaas/recovery.key`. All subsequent CLI commands read it automatically. See the [Agent Self-Setup Guide](docs/agent-guides/agent-self-setup.md) for the complete flow.
137
137
 
138
138
  For manual setup with human-guided password entry, install skills and follow `waiaas-setup/SKILL.md`:
139
139
 
@@ -215,10 +215,10 @@ Enabled by default (`admin_ui = true` in config.toml).
215
215
  | [Security Model](docs/security-model.md) | Authentication, policy engine, Kill Switch, AutoStop |
216
216
  | [Deployment Guide](docs/deployment.md) | Docker, npm, configuration reference |
217
217
  | [API Reference](docs/api-reference.md) | REST API endpoints and authentication |
218
- | [Agent Self-Setup Guide](docs/guides/agent-self-setup.md) | Fully autonomous setup with auto-provision |
219
- | [Agent Skills Integration](docs/guides/agent-skills-integration.md) | Universal guide for 27+ AI agent platforms |
220
- | [Claude Code Integration](docs/guides/claude-code-integration.md) | Skill files + MCP server setup for Claude Code |
221
- | [OpenClaw Integration](docs/guides/openclaw-integration.md) | Quick setup for OpenClaw bot |
218
+ | [Agent Self-Setup Guide](docs/agent-guides/agent-self-setup.md) | Fully autonomous setup with auto-provision |
219
+ | [Agent Skills Integration](docs/agent-guides/agent-skills-integration.md) | Universal guide for 27+ AI agent platforms |
220
+ | [Claude Code Integration](docs/agent-guides/claude-code-integration.md) | Skill files + MCP server setup for Claude Code |
221
+ | [OpenClaw Integration](docs/agent-guides/openclaw-integration.md) | Quick setup for OpenClaw bot |
222
222
  | [Wallet SDK Integration](docs/wallet-sdk-integration.md) | Integration guide for wallet developers |
223
223
  | [Why WAIaaS?](docs/why-waiaas/) | Background on AI agent wallet security |
224
224
  | [Contributing](CONTRIBUTING.md) | Development setup, code style, testing, PR guidelines |
@@ -1 +1 @@
1
- {"version":3,"file":"openclaw.d.ts","sourceRoot":"","sources":["../src/openclaw.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAwBH;;GAEG;AACH,wBAAgB,qBAAqB,CAAC,IAAI,EAAE;IAAE,KAAK,EAAE,OAAO,CAAA;CAAE,GAAG,IAAI,CAmCpE"}
1
+ {"version":3,"file":"openclaw.d.ts","sourceRoot":"","sources":["../src/openclaw.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAwBH;;GAEG;AACH,wBAAgB,qBAAqB,CAAC,IAAI,EAAE;IAAE,KAAK,EAAE,OAAO,CAAA;CAAE,GAAG,IAAI,CAkCpE"}
package/dist/openclaw.js CHANGED
@@ -44,7 +44,6 @@ Add to ~/.openclaw/openclaw.json:
44
44
  "waiaas-quickstart": {
45
45
  "env": {
46
46
  "WAIAAS_BASE_URL": "http://localhost:3100",
47
- "WAIAAS_MASTER_PASSWORD": "<your-master-password>",
48
47
  "WAIAAS_SESSION_TOKEN": "<your-session-token>"
49
48
  }
50
49
  }
@@ -1 +1 @@
1
- {"version":3,"file":"openclaw.js","sourceRoot":"","sources":["../src/openclaw.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAEH,OAAO,EAAE,MAAM,SAAS,CAAC;AACzB,OAAO,IAAI,MAAM,WAAW,CAAC;AAC7B,OAAO,EAAE,mBAAmB,EAA0B,MAAM,gBAAgB,CAAC;AAE7E;;;;;;;GAOG;AACH,SAAS,iBAAiB,CACxB,QAA2B,EAC3B,YAAoB;IAEpB,OAAO;QACL,IAAI,EAAE,UAAU,YAAY,EAAE;QAC9B,WAAW,EAAE,QAAQ,CAAC,WAAW;KAClC,CAAC;AACJ,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,qBAAqB,CAAC,IAAwB;IAC5D,MAAM,SAAS,GAAG,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,OAAO,EAAE,EAAE,WAAW,EAAE,QAAQ,CAAC,CAAC;IAEjE,OAAO,CAAC,GAAG,CAAC,iCAAiC,SAAS,KAAK,CAAC,CAAC;IAE7D,MAAM,MAAM,GAAG,mBAAmB,CAAC;QACjC,UAAU,EAAE,SAAS;QACrB,SAAS;QACT,oBAAoB,EAAE,iBAAiB;QACvC,KAAK,EAAE,IAAI,CAAC,KAAK;KAClB,CAAC,CAAC;IAEH,OAAO,CAAC,GAAG,CACT,WAAW,MAAM,CAAC,SAAS,eAAe,MAAM,CAAC,OAAO,WAAW,CACpE,CAAC;IAEF,IAAI,MAAM,CAAC,SAAS,GAAG,CAAC,EAAE,CAAC;QACzB,OAAO,CAAC,GAAG,CAAC;;;;;;;;;;;;;;;;CAgBf,CAAC,CAAC;IACD,CAAC;AACH,CAAC"}
1
+ {"version":3,"file":"openclaw.js","sourceRoot":"","sources":["../src/openclaw.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAEH,OAAO,EAAE,MAAM,SAAS,CAAC;AACzB,OAAO,IAAI,MAAM,WAAW,CAAC;AAC7B,OAAO,EAAE,mBAAmB,EAA0B,MAAM,gBAAgB,CAAC;AAE7E;;;;;;;GAOG;AACH,SAAS,iBAAiB,CACxB,QAA2B,EAC3B,YAAoB;IAEpB,OAAO;QACL,IAAI,EAAE,UAAU,YAAY,EAAE;QAC9B,WAAW,EAAE,QAAQ,CAAC,WAAW;KAClC,CAAC;AACJ,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,qBAAqB,CAAC,IAAwB;IAC5D,MAAM,SAAS,GAAG,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,OAAO,EAAE,EAAE,WAAW,EAAE,QAAQ,CAAC,CAAC;IAEjE,OAAO,CAAC,GAAG,CAAC,iCAAiC,SAAS,KAAK,CAAC,CAAC;IAE7D,MAAM,MAAM,GAAG,mBAAmB,CAAC;QACjC,UAAU,EAAE,SAAS;QACrB,SAAS;QACT,oBAAoB,EAAE,iBAAiB;QACvC,KAAK,EAAE,IAAI,CAAC,KAAK;KAClB,CAAC,CAAC;IAEH,OAAO,CAAC,GAAG,CACT,WAAW,MAAM,CAAC,SAAS,eAAe,MAAM,CAAC,OAAO,WAAW,CACpE,CAAC;IAEF,IAAI,MAAM,CAAC,SAAS,GAAG,CAAC,EAAE,CAAC;QACzB,OAAO,CAAC,GAAG,CAAC;;;;;;;;;;;;;;;CAef,CAAC,CAAC;IACD,CAAC;AACH,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"registry.d.ts","sourceRoot":"","sources":["../src/registry.ts"],"names":[],"mappings":"AAEA,MAAM,WAAW,UAAU;IACzB,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IACtB,QAAQ,CAAC,QAAQ,EAAE,MAAM,CAAC;IAC1B,QAAQ,CAAC,WAAW,EAAE,MAAM,CAAC;CAC9B;AAED,eAAO,MAAM,cAAc,EAAE,SAAS,UAAU,EAiDtC,CAAC;AAEX;;;GAGG;AACH,wBAAgB,YAAY,IAAI,MAAM,CAErC"}
1
+ {"version":3,"file":"registry.d.ts","sourceRoot":"","sources":["../src/registry.ts"],"names":[],"mappings":"AAEA,MAAM,WAAW,UAAU;IACzB,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IACtB,QAAQ,CAAC,QAAQ,EAAE,MAAM,CAAC;IAC1B,QAAQ,CAAC,WAAW,EAAE,MAAM,CAAC;CAC9B;AAED,eAAO,MAAM,cAAc,EAAE,SAAS,UAAU,EAqCtC,CAAC;AAEX;;;GAGG;AACH,wBAAgB,YAAY,IAAI,MAAM,CAErC"}
package/dist/registry.js CHANGED
@@ -1,10 +1,5 @@
1
1
  import path from "node:path";
2
2
  export const SKILL_REGISTRY = [
3
- {
4
- name: "setup",
5
- filename: "setup.skill.md",
6
- description: "Zero-state daemon setup: install CLI, initialize, start daemon, create wallet, configure session",
7
- },
8
3
  {
9
4
  name: "quickstart",
10
5
  filename: "quickstart.skill.md",
@@ -13,7 +8,7 @@ export const SKILL_REGISTRY = [
13
8
  {
14
9
  name: "wallet",
15
10
  filename: "wallet.skill.md",
16
- description: "Wallet CRUD, asset queries, session management, token registry, MCP provisioning, owner management",
11
+ description: "Wallet queries, asset balances, session info, token list",
17
12
  },
18
13
  {
19
14
  name: "transactions",
@@ -23,12 +18,7 @@ export const SKILL_REGISTRY = [
23
18
  {
24
19
  name: "policies",
25
20
  filename: "policies.skill.md",
26
- description: "Policy engine CRUD: 12 policy types for spending limits, whitelists, time restrictions, rate limits, token/contract/approve controls, network restrictions, x402 domain controls",
27
- },
28
- {
29
- name: "admin",
30
- filename: "admin.skill.md",
31
- description: "Admin API: daemon status, kill switch, notifications, settings management, JWT rotation, shutdown, oracle status, API key management",
21
+ description: "Policy queries: view applied spending limits, whitelists, time restrictions",
32
22
  },
33
23
  {
34
24
  name: "actions",
@@ -1 +1 @@
1
- {"version":3,"file":"registry.js","sourceRoot":"","sources":["../src/registry.ts"],"names":[],"mappings":"AAAA,OAAO,IAAI,MAAM,WAAW,CAAC;AAQ7B,MAAM,CAAC,MAAM,cAAc,GAA0B;IACnD;QACE,IAAI,EAAE,OAAO;QACb,QAAQ,EAAE,gBAAgB;QAC1B,WAAW,EACT,kGAAkG;KACrG;IACD;QACE,IAAI,EAAE,YAAY;QAClB,QAAQ,EAAE,qBAAqB;QAC/B,WAAW,EACT,iFAAiF;KACpF;IACD;QACE,IAAI,EAAE,QAAQ;QACd,QAAQ,EAAE,iBAAiB;QAC3B,WAAW,EACT,oGAAoG;KACvG;IACD;QACE,IAAI,EAAE,cAAc;QACpB,QAAQ,EAAE,uBAAuB;QACjC,WAAW,EACT,6GAA6G;KAChH;IACD;QACE,IAAI,EAAE,UAAU;QAChB,QAAQ,EAAE,mBAAmB;QAC7B,WAAW,EACT,kLAAkL;KACrL;IACD;QACE,IAAI,EAAE,OAAO;QACb,QAAQ,EAAE,gBAAgB;QAC1B,WAAW,EACT,sIAAsI;KACzI;IACD;QACE,IAAI,EAAE,SAAS;QACf,QAAQ,EAAE,kBAAkB;QAC5B,WAAW,EACT,0GAA0G;KAC7G;IACD;QACE,IAAI,EAAE,MAAM;QACZ,QAAQ,EAAE,eAAe;QACzB,WAAW,EACT,+EAA+E;KAClF;CACO,CAAC;AAEX;;;GAGG;AACH,MAAM,UAAU,YAAY;IAC1B,OAAO,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;AACxD,CAAC"}
1
+ {"version":3,"file":"registry.js","sourceRoot":"","sources":["../src/registry.ts"],"names":[],"mappings":"AAAA,OAAO,IAAI,MAAM,WAAW,CAAC;AAQ7B,MAAM,CAAC,MAAM,cAAc,GAA0B;IACnD;QACE,IAAI,EAAE,YAAY;QAClB,QAAQ,EAAE,qBAAqB;QAC/B,WAAW,EACT,iFAAiF;KACpF;IACD;QACE,IAAI,EAAE,QAAQ;QACd,QAAQ,EAAE,iBAAiB;QAC3B,WAAW,EACT,0DAA0D;KAC7D;IACD;QACE,IAAI,EAAE,cAAc;QACpB,QAAQ,EAAE,uBAAuB;QACjC,WAAW,EACT,6GAA6G;KAChH;IACD;QACE,IAAI,EAAE,UAAU;QAChB,QAAQ,EAAE,mBAAmB;QAC7B,WAAW,EACT,6EAA6E;KAChF;IACD;QACE,IAAI,EAAE,SAAS;QACf,QAAQ,EAAE,kBAAkB;QAC5B,WAAW,EACT,0GAA0G;KAC7G;IACD;QACE,IAAI,EAAE,MAAM;QACZ,QAAQ,EAAE,eAAe;QACzB,WAAW,EACT,+EAA+E;KAClF;CACO,CAAC;AAEX;;;GAGG;AACH,MAAM,UAAU,YAAY;IAC1B,OAAO,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;AACxD,CAAC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@waiaas/skills",
3
- "version": "2.11.0-rc.21",
3
+ "version": "2.11.0-rc.23",
4
4
  "description": "WAIaaS skill files for AI agents - install via npx @waiaas/skills add <name>",
5
5
  "license": "MIT",
6
6
  "type": "module",
@@ -3,7 +3,7 @@ name: "WAIaaS Actions"
3
3
  description: "Action Provider framework: list providers, execute DeFi actions through the 6-stage transaction pipeline"
4
4
  category: "api"
5
5
  tags: [wallet, blockchain, defi, actions, waiass, jupiter, 0x, swap, lifi, bridge, cross-chain, lido, jito, staking, liquid-staking, pendle, yield, pt, yt, drift, perp, perpetual, leverage, futures, dcent-swap, dcent, aggregator, across, across-bridge, polymarket, prediction-market, clob, ctf]
6
- version: "2.11.0-rc.21"
6
+ version: "2.11.0-rc.23"
7
7
  dispatch:
8
8
  kind: "tool"
9
9
  allowedCommands: ["curl"]
@@ -29,10 +29,7 @@ All action endpoints require **sessionAuth** via `Authorization: Bearer <token>`
29
29
  - List action providers and their available actions
30
30
  - Execute actions (subject to policy evaluation)
31
31
 
32
- ### Admin (masterAuth -- prerequisite)
33
- - Register API keys for action providers via Admin UI Settings
34
- - Enable/configure built-in providers via Admin UI > DeFi (`#/defi`) or Agent Identity (`#/agent-identity`)
35
- - Configure CONTRACT_WHITELIST/ALLOWED_TOKENS policies for provider contracts (or use provider-trust bypass)
32
+ > Provider 활성화, API 키 등록, CONTRACT_WHITELIST 설정은 관리자가 사전에 완료해야 합니다. docs/admin-manual/defi-providers.md 를 참조하세요.
36
33
 
37
34
  ```
38
35
  Authorization: Bearer wai_sess_eyJ...
@@ -3,7 +3,7 @@ name: "WAIaaS ERC-8004"
3
3
  description: "ERC-8004 Trustless Agents: identity registration, reputation management, on-chain validation"
4
4
  category: "api"
5
5
  tags: [wallet, blockchain, erc-8004, identity, reputation, validation, trust, waiass]
6
- version: "2.11.0-rc.21"
6
+ version: "2.11.0-rc.23"
7
7
  dispatch:
8
8
  kind: "tool"
9
9
  allowedCommands: ["curl"]
@@ -23,7 +23,7 @@ http://localhost:3100
23
23
 
24
24
  - **Read endpoints (GET):** Require `Authorization: Bearer <token>` (sessionAuth).
25
25
  - **Write actions:** Executed via `POST /v1/actions/erc8004_agent/{action}` with sessionAuth. Subject to policy evaluation (6-stage pipeline).
26
- - **Admin configuration:** Configure via Admin UI > Agent Identity (`#/agent-identity`), or via `X-Master-Password` header for enabling the provider and configuring registry addresses.
26
+ - **Admin configuration:** See docs/admin-manual/erc8004-setup.md for provider and registry setup.
27
27
 
28
28
  ## Permissions
29
29
 
@@ -31,10 +31,7 @@ http://localhost:3100
31
31
  - Query agent identity, reputation, validation status (4 GET endpoints)
32
32
  - Execute write actions: register, set wallet, set URI, set metadata, give/revoke feedback, request validation
33
33
 
34
- ### Admin (masterAuth -- prerequisite)
35
- - ERC-8004 provider is enabled by default since v30.11 (`actions.erc8004_agent_enabled=true`)
36
- - Configure registry addresses and registration file base URL
37
- - Create REPUTATION_THRESHOLD policies
34
+ > ERC-8004 Provider 설정(레지스트리 주소, REPUTATION_THRESHOLD 정책)은 관리자가 사전에 완료해야 합니다. docs/admin-manual/erc8004-setup.md 를 참조하세요.
38
35
 
39
36
  ---
40
37
 
@@ -473,72 +470,11 @@ Write tools are auto-registered from the Action Provider framework. Each tool na
473
470
 
474
471
  ---
475
472
 
476
- ## 5. Admin Settings
477
-
478
- Configure ERC-8004 via Admin UI > Agent Identity (`#/agent-identity`), or via `PUT /v1/admin/settings`:
479
-
480
- ```bash
481
- curl -s -X PUT http://localhost:3100/v1/admin/settings \
482
- -H 'Content-Type: application/json' \
483
- -H 'X-Master-Password: <password>' \
484
- -d '{"key": "actions.erc8004_agent_enabled", "value": "true"}'
485
- ```
486
-
487
- | Setting Key | Type | Default | Description |
488
- | ------------------------------------------------ | ------- | ------------------------------------------------ | ------------------------------------------------- |
489
- | `actions.erc8004_agent_enabled` | boolean | `true` | Master feature gate. Enabled by default since v30.11.|
490
- | `actions.erc8004_identity_registry_address` | string | `0x8004A169FB4a3325136EB29fA0ceB6D2e539a432` | Identity Registry contract address. |
491
- | `actions.erc8004_reputation_registry_address` | string | `0x8004BAa17C55a88189AE136b182e5fdA19dE9b63` | Reputation Registry contract address. |
492
- | `actions.erc8004_validation_registry_address` | string | (empty) | Validation Registry address. Empty = feature off. |
493
- | `actions.erc8004_registration_file_base_url` | string | (empty) | Base URL for registration file hosting. |
494
- | `actions.erc8004_auto_publish_registration` | boolean | `true` | Auto-generate and serve registration files. |
495
- | `actions.erc8004_reputation_cache_ttl_sec` | number | `300` | Reputation cache TTL in seconds. |
496
- | `actions.erc8004_min_reputation_score` | number | `0` | Global minimum reputation score. |
497
- | `actions.erc8004_reputation_rpc_timeout_ms` | number | `3000` | RPC timeout for reputation queries (ms). |
498
-
499
- **Action tier override:** Action tier can be overridden per-action via the tier dropdown in Admin UI > Agent Identity, or via Settings API key pattern `actions.erc8004_agent_{action}_tier`. See **admin.skill.md** Section 15.
500
-
501
- ---
502
-
503
- ## 6. REPUTATION_THRESHOLD Policy
504
-
505
- The REPUTATION_THRESHOLD policy evaluates counterparty agent reputation during transaction processing. When the counterparty's on-chain reputation is below the threshold, the transaction security tier is escalated.
506
-
507
- For full policy details and rules schema, see **policies.skill.md** (Section 2m).
508
-
509
- **Quick setup:**
510
-
511
- ```bash
512
- curl -s -X POST http://localhost:3100/v1/policies \
513
- -H 'Content-Type: application/json' \
514
- -H 'X-Master-Password: <password>' \
515
- -d '{
516
- "walletId": "<uuid>",
517
- "type": "REPUTATION_THRESHOLD",
518
- "rules": {
519
- "min_score": 50,
520
- "below_threshold_tier": "APPROVAL",
521
- "unrated_tier": "APPROVAL",
522
- "tag1": "",
523
- "tag2": "",
524
- "check_counterparty": true
525
- }
526
- }'
527
- ```
528
-
529
- ---
530
-
531
- ## 7. Common Workflows
473
+ ## 5. Common Workflows
532
474
 
533
475
  ### Register an Agent and Set Up Registration File
534
476
 
535
- 1. Verify ERC-8004 is enabled (default: true since v30.11):
536
- ```bash
537
- curl -s http://localhost:3100/v1/admin/settings \
538
- -H 'X-Master-Password: <password>' | grep erc8004_agent_enabled
539
- ```
540
-
541
- 2. Register the agent (requires owner approval):
477
+ 1. Register the agent (requires owner approval):
542
478
  ```bash
543
479
  curl -s -X POST http://localhost:3100/v1/actions/erc8004_agent/register_agent \
544
480
  -H 'Content-Type: application/json' \
@@ -568,29 +504,9 @@ curl -s 'http://localhost:3100/v1/erc8004/agent/99/reputation?tag1=reliability'
568
504
  -H 'Authorization: Bearer wai_sess_eyJ...'
569
505
  ```
570
506
 
571
- ### Set Up REPUTATION_THRESHOLD Policy
572
-
573
- ```bash
574
- curl -s -X POST http://localhost:3100/v1/policies \
575
- -H 'Content-Type: application/json' \
576
- -H 'X-Master-Password: <password>' \
577
- -d '{
578
- "walletId": "<uuid>",
579
- "type": "REPUTATION_THRESHOLD",
580
- "rules": {
581
- "min_score": 50,
582
- "below_threshold_tier": "APPROVAL",
583
- "unrated_tier": "DELAY",
584
- "check_counterparty": true
585
- }
586
- }'
587
- ```
588
-
589
- When the counterparty has a reputation score below 50, the transaction tier is escalated to APPROVAL. When the counterparty has no reputation data, the tier is escalated to DELAY.
590
-
591
507
  ---
592
508
 
593
- ## 8. Error Reference
509
+ ## 6. Error Reference
594
510
 
595
511
  | Code | HTTP | Description | Recovery |
596
512
  | ------------------------ | ---- | ---------------------------------------------- | ------------------------------------------ |
@@ -604,7 +520,7 @@ When the counterparty has a reputation score below 50, the transaction tier is e
604
520
 
605
521
  ---
606
522
 
607
- ## 9. Related Skill Files
523
+ ## 7. Related Skill Files
608
524
 
609
525
  - **policies.skill.md** -- REPUTATION_THRESHOLD policy type (Section 2m) and policy evaluation flow
610
526
  - **actions.skill.md** -- Action Provider framework, provider-trust bypass mechanism
@@ -3,7 +3,7 @@ name: "WAIaaS ERC-8128"
3
3
  description: "ERC-8128 Signed HTTP Requests: RFC 9421 + EIP-191 signature for API authentication"
4
4
  category: "api"
5
5
  tags: [wallet, blockchain, erc-8128, signing, rfc9421, http, authentication, waiass]
6
- version: "2.11.0-rc.21"
6
+ version: "2.11.0-rc.23"
7
7
  dispatch:
8
8
  kind: "tool"
9
9
  allowedCommands: ["curl"]
@@ -29,10 +29,7 @@ Requires **sessionAuth** via `Authorization: Bearer <token>` header.
29
29
  - Sign HTTP requests via POST /v1/erc8128/sign
30
30
  - Verify HTTP signatures via POST /v1/erc8128/verify
31
31
 
32
- ### Admin (masterAuth -- prerequisite)
33
- - Configure ERC8128_ALLOWED_DOMAINS policy to whitelist target API domains
34
- - Enable ERC-8128 feature (`erc8128.enabled = true` in Admin Settings)
35
- - Configure default preset, TTL, nonce, algorithm, and rate limit
32
+ > ERC-8128 기능 활성화 및 ERC8128_ALLOWED_DOMAINS 정책 설정은 관리자가 사전에 완료해야 합니다. docs/admin-manual/erc8128-setup.md 를 참조하세요.
36
33
 
37
34
  ## 1. Sign HTTP Request
38
35
 
@@ -136,37 +133,7 @@ curl -s -X POST http://localhost:3100/v1/erc8128/verify \
136
133
  }
137
134
  ```
138
135
 
139
- ## 3. Prerequisites
140
-
141
- Before using ERC-8128 signing, ensure:
142
-
143
- 1. **ERC-8128 enabled** in Admin Settings:
144
- ```bash
145
- curl -s -X PUT http://localhost:3100/v1/admin/settings \
146
- -H 'Content-Type: application/json' \
147
- -H 'X-Master-Password: <password>' \
148
- -d '{"settings": [{"key": "erc8128.enabled", "value": "true"}]}'
149
- ```
150
-
151
- 2. **ERC8128_ALLOWED_DOMAINS policy** for the wallet (default-deny):
152
- ```bash
153
- curl -s -X POST http://localhost:3100/v1/policies \
154
- -H 'Content-Type: application/json' \
155
- -H 'X-Master-Password: <password>' \
156
- -d '{
157
- "walletId": "<wallet-uuid>",
158
- "type": "ERC8128_ALLOWED_DOMAINS",
159
- "rules": {
160
- "domains": ["api.example.com", "*.premium-apis.com"]
161
- },
162
- "priority": 0,
163
- "enabled": true
164
- }'
165
- ```
166
-
167
- 3. **EVM wallet** -- ERC-8128 uses EIP-191 signing, which requires an Ethereum-compatible wallet. Solana wallets are not supported.
168
-
169
- ## 4. Presets
136
+ ## 3. Presets
170
137
 
171
138
  Covered Components presets determine which HTTP message components are included in the signature:
172
139
 
@@ -176,7 +143,7 @@ Covered Components presets determine which HTTP message components are included
176
143
  | `standard` | `@method`, `@target-uri`, `@authority`, `content-digest` | Recommended default |
177
144
  | `strict` | `@method`, `@target-uri`, `@authority`, `content-type`, `content-digest`, `content-length` | Maximum security |
178
145
 
179
- ## 5. SDK Usage
146
+ ## 4. SDK Usage
180
147
 
181
148
  **TypeScript SDK:**
182
149
 
@@ -218,7 +185,7 @@ console.log(result.status, result.body);
218
185
  - `erc8128_sign_request` -- Sign an HTTP request (method, url, headers, body, preset, ttl_seconds)
219
186
  - `erc8128_verify_signature` -- Verify a signature (method, url, headers, signature_input, signature, content_digest)
220
187
 
221
- ## 6. Error Reference
188
+ ## 5. Error Reference
222
189
 
223
190
  | Code | HTTP | Description | Recovery |
224
191
  |------|------|-------------|----------|
@@ -227,7 +194,7 @@ console.log(result.status, result.body);
227
194
  | `ERC8128_RATE_LIMITED` | 429 | Rate limit exceeded for this domain | Wait and retry; adjust `erc8128.rate_limit_per_minute` |
228
195
  | `UNSUPPORTED_CHAIN` | 400 | Wallet chain does not support EIP-191 signing | Use an EVM wallet |
229
196
 
230
- ## 7. Related Skill Files
197
+ ## 6. Related Skill Files
231
198
 
232
199
  - **policies.skill.md** -- ERC8128_ALLOWED_DOMAINS policy management
233
200
  - **admin.skill.md** -- ERC-8128 Admin Settings configuration
@@ -3,7 +3,7 @@ name: "WAIaaS External Actions"
3
3
  description: "Off-chain action framework: signedData/signedHttp pipeline, credential vault, venue/category policies"
4
4
  category: "api"
5
5
  tags: [wallet, external-actions, off-chain, signing, credentials, venue, waiass]
6
- version: "2.11.0-rc.21"
6
+ version: "2.11.0-rc.23"
7
7
  dispatch:
8
8
  kind: "tool"
9
9
  allowedCommands: ["curl"]
@@ -22,7 +22,8 @@ http://localhost:3100
22
22
  ```
23
23
 
24
24
  Action execution and queries use **sessionAuth** (`Authorization: Bearer <token>`).
25
- Credential management uses **masterAuth** (`X-Master-Password`).
25
+
26
+ > Credential 관리(생성/삭제/교체)는 관리자 전용입니다. docs/admin-manual/credentials.md 를 참조하세요.
26
27
 
27
28
  ## Permissions
28
29
 
@@ -32,14 +33,6 @@ Credential management uses **masterAuth** (`X-Master-Password`).
32
33
  - Get off-chain action detail via `GET /v1/wallets/:id/actions/:actionId`
33
34
  - List credential metadata via `GET /v1/wallets/:id/credentials` (names and types only -- never values)
34
35
 
35
- ### Admin (masterAuth)
36
- - Create credentials: `POST /v1/wallets/:id/credentials`
37
- - Delete credentials: `DELETE /v1/wallets/:id/credentials/:ref`
38
- - Rotate credentials: `PUT /v1/wallets/:id/credentials/:ref/rotate`
39
- - Global credentials: `GET/POST/DELETE/PUT /v1/admin/credentials[/:ref[/rotate]]`
40
- - Venue whitelist policy: via `POST /v1/policies` with type `VENUE_WHITELIST`
41
- - Category limit policy: via `POST /v1/policies` with type `ACTION_CATEGORY_LIMIT`
42
-
43
36
  ---
44
37
 
45
38
  ## 1. ResolvedAction 3-Kind System
@@ -74,41 +67,9 @@ Schemes that require credentials reference a `credentialRef` string that resolve
74
67
 
75
68
  ---
76
69
 
77
- ## 3. Credential Management
78
-
79
- Credentials are stored encrypted with AES-256-GCM (per-wallet encryption key derived via HKDF from master password). Credential values are **never** returned in API responses.
80
-
81
- ### Credential Scope
70
+ ## 3. Credential Queries
82
71
 
83
- - **Per-wallet**: Stored under `/v1/wallets/:id/credentials`. Only accessible by that wallet's pipeline.
84
- - **Global**: Stored under `/v1/admin/credentials`. Accessible by all wallets. Per-wallet credentials take priority over global ones with the same name.
85
-
86
- ### Create Credential (masterAuth)
87
-
88
- ```bash
89
- curl -s -X POST http://localhost:3100/v1/wallets/<wallet-id>/credentials \
90
- -H 'Content-Type: application/json' \
91
- -H 'X-Master-Password: <password>' \
92
- -d '{
93
- "name": "polymarket-api-key",
94
- "type": "api_key",
95
- "value": "secret-api-key-value",
96
- "expiresAt": 1735689600
97
- }'
98
- ```
99
-
100
- **Response (201):**
101
- ```json
102
- {
103
- "id": "cred-uuid",
104
- "name": "polymarket-api-key",
105
- "type": "api_key",
106
- "walletId": "<wallet-id>",
107
- "expiresAt": 1735689600,
108
- "createdAt": 1700000000,
109
- "updatedAt": 1700000000
110
- }
111
- ```
72
+ Credentials are stored encrypted with AES-256-GCM. Credential values are **never** returned in API responses.
112
73
 
113
74
  ### List Credentials (sessionAuth)
114
75
 
@@ -117,23 +78,7 @@ curl -s http://localhost:3100/v1/wallets/<wallet-id>/credentials \
117
78
  -H 'Authorization: Bearer <token>'
118
79
  ```
119
80
 
120
- Returns array of `CredentialMetadata` (no `value` field).
121
-
122
- ### Delete Credential (masterAuth)
123
-
124
- ```bash
125
- curl -s -X DELETE http://localhost:3100/v1/wallets/<wallet-id>/credentials/polymarket-api-key \
126
- -H 'X-Master-Password: <password>'
127
- ```
128
-
129
- ### Rotate Credential (masterAuth)
130
-
131
- ```bash
132
- curl -s -X PUT http://localhost:3100/v1/wallets/<wallet-id>/credentials/polymarket-api-key/rotate \
133
- -H 'Content-Type: application/json' \
134
- -H 'X-Master-Password: <password>' \
135
- -d '{"value": "new-secret-value"}'
136
- ```
81
+ Returns array of `CredentialMetadata` (names, types, expiry -- no `value` field).
137
82
 
138
83
  ---
139
84
 
@@ -261,11 +206,6 @@ const actions = await client.listOffchainActions({ walletId: 'w1', venue: 'polym
261
206
  const detail = await client.getActionResult('w1', 'act-uuid');
262
207
  const creds = await client.listCredentials('w1');
263
208
 
264
- // Credential CRUD (masterAuth -- admin only)
265
- const cred = await client.createCredential('w1', { name: 'api-key', type: 'api_key', value: 'secret' });
266
- await client.deleteCredential('w1', 'api-key');
267
- await client.rotateCredential('w1', 'api-key', 'new-secret');
268
-
269
209
  // Off-chain action execution (sessionAuth -- uses existing executeAction)
270
210
  const result = await client.executeAction('polymarket_order', 'pm_buy', {
271
211
  params: { tokenId: '0x...', amount: '100', price: '0.65', side: 'BUY' },
@@ -3,7 +3,7 @@ name: "WAIaaS NFT Operations"
3
3
  description: "NFT query, transfer, and approval operations for ERC-721, ERC-1155, and Metaplex standards"
4
4
  category: "api"
5
5
  tags: [wallet, blockchain, nft, erc721, erc1155, metaplex, solana, ethereum, waiass]
6
- version: "2.11.0-rc.21"
6
+ version: "2.11.0-rc.23"
7
7
  dispatch:
8
8
  kind: "tool"
9
9
  allowedCommands: ["curl"]
@@ -96,14 +96,9 @@ Response includes:
96
96
 
97
97
  Note: Metadata is cached in the database with a 24-hour TTL.
98
98
 
99
- ### GET /v1/wallets/{id}/nfts -- List NFTs (masterAuth)
99
+ ### Admin NFT Query
100
100
 
101
- Operator endpoint to query any wallet's NFTs.
102
-
103
- ```bash
104
- curl -s 'http://localhost:3100/v1/wallets/01958f3a-1234-7000-8000-abcdef123456/nfts?network=ethereum-mainnet' \
105
- -H 'X-Master-Password: your-master-password'
106
- ```
101
+ Operators can query any wallet's NFTs via `GET /v1/wallets/{id}/nfts` -- see docs/admin-manual/wallet-management.md.
107
102
 
108
103
  ## 3. NFT Transfer (sessionAuth)
109
104