VaultPilot logo: emerald checkmark on a dark shield with circuit pattern
Open source · MIT

Hardware-verified DeFi for AI agents.

The agent proposes, you approve on your Ledger. VaultPilot MCP is built for the realistic case where the AI, the MCP server, or your computer can be compromised — only your hardware wallet is trusted, and every transaction is cryptographically bound across every layer so tampering produces a visible mismatch on the device screen.

See it in action

An end-to-end Solana send: the agent prepares the transaction, you match the message hash on the Ledger device, and approve. Whatever the agent claims it's doing, the Ledger screen is the source of truth.

Why this exists

An AI agent that holds your private keys is a private key on the internet. An AI agent connected to your wallet through an MCP server is the same problem in slower motion — a malicious prompt, a hijacked tool call, or a compromised dependency can quietly rewrite a recipient address or smuggle in an unbounded approval, and a software wallet has no independent eyes on what gets signed.

VaultPilot draws the trust boundary at the only place that really holds: the hardware wallet's screen. Every transaction the agent prepares is rendered to you in human-readable form, then re-rendered on the Ledger device itself. If anything between the two has been tampered with — a swapped recipient, a different chain, an inflated amount — the device shows you bytes that don't match what you asked for, and you reject before signing.

How it works

01 / READ

Agent reads on-chain state

Portfolio, lending positions, staking, swap quotes — all read-only via your configured RPCs. No keys involved.

02 / PREPARE

Server builds an unsigned tx

VaultPilot MCP prepares the transaction bytes, computes a payload-hash fingerprint, and decodes the calldata via its local ABI registry. Returns the structured view (function, arguments) plus an opaque handle.

03 / CHECK

Independent verification

The agent cross-checks the function selector against 4byte.directory, re-derives the pre-sign hash, and renders a verification block. A mismatch on any layer aborts before the device prompt — the swiss-knife decoder URL is included for an out-of-band browser check.

04 / APPROVE

You sign on Ledger

EVM goes to Ledger Live over WalletConnect; TRON and Solana go to a directly-connected Ledger over USB. The device clear-signs known protocols, blind-signs everything else with a hash that must match what the agent showed you.

Layered defenses

VaultPilot assumes the AI agent, MCP server, and host computer can all be compromised. Single-layer attacks are caught by overlapping checks; coordinated multi-layer attacks are narrowed by every layer that still works.

Coverage

Chains Ethereum, Arbitrum, Polygon, Base, Optimism (EVM via Ledger Live + WalletConnect); TRON and Solana via Ledger USB HID.
Lending Aave V3, Compound V3, Morpho Blue (EVM); MarginFi (Solana); Kamino in flight.
Staking Lido, EigenLayer (EVM); TRON Stake 2.0; Marinade, Jito reads, native SOL delegation (Solana).
LP / Swap Uniswap V3 LP positions; LiFi-aggregated EVM swaps and EVM↔Solana cross-chain bridges; Jupiter v6 on Solana.
Sends Native + ERC-20 on EVM; native + TRC-20 on TRON; SOL + SPL on Solana with durable-nonce protection.
Risk tooling Liquidation alerts, contract verification, privileged-role enumeration, DefiLlama-backed protocol risk score, market incident scan.

Install

Three install paths — pick whichever matches your setup. The full step-by-step is on the dedicated install page; the short version:

npm install -g vaultpilot-mcp
vaultpilot-mcp-setup

The setup wizard handles RPC configuration, optional API keys, and detects Claude Desktop, Claude Code, and Cursor on your machine to register itself in their MCP-server config automatically. See the full install guide →

Honest limits

Hardware-verified does not mean infallible. VaultPilot's threat model is documented openly in SECURITY.md, including the cases the layered defenses can degrade against — coordinated agent + server compromise on a blind-sign chain, a fully owned Ledger Live host swapping the WalletConnect session, oracle drift on lending markets. The point of writing it down is that you can decide what you trust before approving a 6-figure send, not after.

Software wallets and Ledger live in different security tiers. Software-wallet support is on the roadmap (MetaMask Mobile via WalletConnect) and will be clearly labelled as the weaker anchor — the existing pre-sign defenses still apply, but the on-device cryptographic binding does not.

Contact

Questions, security disclosures, integration requests — drop a line.