loading…
Search for a command to run...
loading…
Safety layer for autonomous DeFi agents. Scans contracts for exploit patterns, simulates transactions, blocks honeypots.
Safety layer for autonomous DeFi agents. Scans contracts for exploit patterns, simulates transactions, blocks honeypots.
Safety layer for autonomous DeFi agents. | Website | Docs
AI agents trading on-chain have no way to tell a legitimate token from a honeypot. Aegis fixes that. It's an MCP server that any agent can plug into, backed by on-chain contracts that enforce the safety checks.
Before an agent swaps, Aegis scans the target contract, simulates the transaction, and returns a simple go/no-go. If the contract has a 99% sell tax or a hidden pause function, the agent never touches it.
We watched an agent lose its entire wallet to a honeypot token in under 30 seconds. The token looked fine on the surface - verified contract, decent liquidity, active trading. But buried in the code was a 99% sell tax and a hidden owner behind a fake renounceOwnership().
No agent framework had a way to catch this. So we built one.
Agent -> Aegis (scan + simulate + decide) -> Chain
assess_risk# Add to Claude Code
claude mcp add aegis npx aegis-defi
# Or clone and try the demo
git clone https://github.com/StanleytheGoat/aegis
cd aegis && npm install
npx tsx demo/catch-honeypot.ts
The demo deploys a deliberately malicious token (99% sell tax, fake ownership renounce, hidden admin) and watches Aegis catch every red flag:
Aegis Risk Assessment
Risk Score: 100/100
Findings:
[CRITICAL] Fake Ownership Renounce
[CRITICAL] Asymmetric Buy/Sell Tax (99% sell)
[CRITICAL] Sell Pause Mechanism
[HIGH] Hidden Max Sell Amount
[HIGH] Hidden Admin Functions
Decision: BLOCK
MCP Server (TypeScript) - 6 tools available to any MCP-compatible agent:
| Tool | Purpose |
|---|---|
scan_contract |
Pattern matching against 165 known exploit types |
simulate_transaction |
Dry-run on a forked chain |
check_token |
Anti-honeypot checks (sellability, concentrated holdings) |
assess_risk |
All-in-one risk assessment with signed attestation |
trace_transaction |
Traces every internal call, scans each contract |
search_solodit |
Cross-references against 50K+ real audit findings |
Smart Contracts (Solidity) - deployed on Base mainnet:
| Contract | Address | Purpose |
|---|---|---|
| AegisGateway | 0x62c6...0fa3 | Safety wrapper for any DeFi interaction. Verifies attestations, checks risk scores. |
| AegisSafetyHook | 0xaEE5...40C0 | Uniswap v4 beforeSwap hook. Blocks swaps without valid safety attestation. |
Built following Ethereum security best practices (informed by ethskills):
npm test # TypeScript unit tests (123)
npm run test:contracts # Solidity contract tests (42)
npm run demo # Honeypot detection demo
assess_risk now returns both gateway and hook attestations for Uniswap v4 protected poolssearch_solodit tool queries 50K+ real audit findings from Cyfrin, Sherlock, Code4rena, Trail of Bits, and othersassess_risk cross-references detected patterns against real audit findings when SOLODIT_API_KEY is settrace_transaction tool follows every internal call and scans each contractMIT
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"aegis-defi": {
"command": "npx",
"args": []
}
}
}