
Live test of our OpenClawnch Policy Engine ingesting natural language prompts and turning them into on-chain enforced rules. 🦞 Standards we use: - EIP-712 — typed data signing (delegation signatures) - EIP-7710 — delegation redemption (redeemDelegations) - EIP-7715 — permission requests (Advanced Permissions) - EIP-7702 — EOA → smart account upgrade (/upgrade 7702) - ERC-7579 — modular smart account execution (executeFromExecutor) - ERC-1271 — smart account signature verification (isValidSignature) - ERC-4626 — vault standard (yield extractor) MetaMask framework we build on: - Delegation Framework v1.3.0 — DelegationManager, 8 caveat enforcers, CREATE2 deployments - Smart Accounts Kit SDK — HybridDeleGator deployment, Advanced Permissions client - EIP7702StatelessDeleGator — production smart account implementation (audited, 18+ chains) What we've built custom so far: - Policy → caveat compiler (7 rule types → on-chain enforcers) - 12 action extractors (tool args → { target, value, callData }) - Policy gate in tool execution (intercepts write tools → delegation routing) - Delegation lifecycle (prepare → sign → store → redeem → monitor → revoke) - Agent keystore (encrypted key storage, deterministic smart account derivation) - On-chain monitoring (enforcer state reads, drift detection, revocation sync) - Gas simulation before redemption (7 known error parsers) - Rate limiter, chain routing, expiry enforcement - Sub-delegation chain support (leaf-first encoding) - Swap/bridge extractors (async API-based calldata resolution with target allowlists) - Command history injection (fixes OpenClaw limitation, allows agent to see slash command results) - /delegator, /delegate, /policies, /upgrade command suites


















