Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Conto Hermes

v1.8.0

Enforce fine-grained spending policies before executing any payment, transfer, swap, or bridge. Checks Conto policy engine for approval before money leaves y...

0· 153·0 current·0 all-time
byConto@kwattana

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for kwattana/conto-hermes.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Conto Hermes" (kwattana/conto-hermes) from ClawHub.
Skill page: https://clawhub.ai/kwattana/conto-hermes
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install conto-hermes

ClawHub CLI

Package manager switcher

npx clawhub@latest install conto-hermes
Security Scan
Capability signals
CryptoRequires walletCan make purchasesCan sign transactions
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The SKILL.md, README, and conto-check.sh consistently implement a Conto policy gate for payments and require a Conto SDK key and network access to conto.finance — this is coherent with the skill's purpose. However, the top-level registry metadata included with the skill (the summary at the top of the report) lists no required env vars or binaries, while clawhub.json and SKILL.md declare CONTO_SDK_KEY and binaries (curl, jq, python3). That mismatch in metadata is inconsistent and could mislead installers.
Instruction Scope
The runtime instructions focus on policy checks, setup, and using conto-check.sh for approve/confirm/x402/policy management. The script only interacts with the Conto API and the agent's Hermes config; it does not attempt to read unrelated system files. It does run a temporary local HTTP server during setup to receive an SDK key callback and writes the SDK key into ~/.hermes/.env (see persistence notes).
Install Mechanism
This is an instruction-only skill with a helper shell script (no download/install of arbitrary code). No high-risk remote installs are present. The SKILL.md does reference installing from a well-known URL, but no packaged install script or remote archive extract is included in the repository itself.
!
Credentials
The skill legitimately needs a single service credential (CONTO_SDK_KEY) to call Conto APIs. Concern arises because: (1) the top-level metadata omitted this requirement while the bundled clawhub.json and SKILL.md require it, (2) the script suggests generating Admin vs Standard SDK keys but will save whatever key is returned into ~/.hermes/.env (no safeguard to enforce least privilege). If an Admin-scoped key is used, the agent could create/update/delete policies and manage agents/wallets. Also, the SDK key is stored in plaintext in the user's ~/.hermes/.env file — expected for CLI helpers but sensitive.
Persistence & Privilege
The skill does not request 'always: true' and does not modify other skills. It will persist the SDK key and API URL by writing/overwriting CONTO_SDK_KEY and CONTO_API_URL in ~/.hermes/.env during setup, which is normal for a CLI helper but means the secret is stored on disk for future autonomous agent use. The setup also starts a short-lived local HTTP server to receive a callback; that is ephemeral but noteworthy.
What to consider before installing
Before installing or running this skill: - Verify the installation source and that https://conto.finance is the official Conto site (inspect TLS certs if unsure). - Expect to provide a CONTO_SDK_KEY; prefer issuing a least-privilege (Standard) SDK key for runtime policy checks. Do NOT use an Admin key for normal operation unless you explicitly need the skill to create/manage policies or agents. - Review the conto-check.sh script yourself (it’s included). The script will open a browser for setup, start a temporary local HTTP server to receive an SDK key, and then write CONTO_SDK_KEY and CONTO_API_URL in plaintext to ~/.hermes/.env — treat that file as sensitive. - Because the package metadata in this bundle is inconsistent, confirm required binaries (curl, jq, python3) are available before running, and confirm the key scope you receive during dashboard provisioning. - If you allow the agent to invoke the skill autonomously, be aware that the stored SDK key enables the agent to call Conto APIs; combine that with least-privilege keys and appropriate Conto policies (require human approvals for high-value transactions) to reduce risk. - If you need higher assurance, obtain the SDK key with the desired scope from the Conto dashboard manually and add it to ~/.hermes/.env yourself rather than using the automated setup callback.

Like a lobster shell, security has layers — review code before you run it.

latestvk971tmx2z9jr9rx1cdtsf5mnth84as54
153downloads
0stars
4versions
Updated 3w ago
v1.8.0
MIT-0

Conto Policy Enforcement

You are a spending policy enforcement layer. Before executing ANY payment, transfer, swap, or bridge, you MUST check Conto's policy engine for approval. Never send money without policy clearance.

Prerequisites

Before using this skill, you need:

  1. A Conto account — Sign up at conto.finance
  2. A CONTO_SDK_KEY (required) — Generated from the Conto dashboard (format: conto_agent_...). See Getting Started below.
  3. curl and jq — Command-line tools (pre-installed on most systems)
  4. CONTO_API_URL (optional) — API base URL (default: https://conto.finance). Must use https:// in production (localhost allowed for development only).

When This Skill Activates

This skill applies whenever you are about to:

  • Transfer tokens (USDC, ETH, SOL, etc.) to any address
  • Swap tokens on any DEX
  • Bridge tokens between chains
  • Pay for an API call (x402, paid endpoints)
  • Make any onchain transaction that moves value

Getting Started

Step 1: Install the skill

hermes skills install well-known:https://conto.finance/.well-known/skills/conto

Step 2: Set up your agent

Run the setup command with your agent name and wallet address:

{baseDir}/conto-check.sh setup "my-agent" "0xYourWalletAddress" EVM 42431

This opens your browser to sign in to Conto. After you approve, the agent is automatically provisioned with:

  • An agent record linked to your organization
  • Your wallet registered as EXTERNAL custody
  • Default spend limits ($100/tx, $500/day)
  • An SDK key saved to ~/.hermes/.env

To find your wallet address, ask the agent: "What is my wallet address?" If you don't have a wallet yet, ask "Show me my wallet balances" — one will be provisioned automatically.

Arguments:

  • agent_name: Name for your agent (e.g., "my-hermes-agent")
  • wallet_address: Your wallet address (0x... for EVM, base58 for Solana)
  • chain_type: EVM or SOLANA (default: EVM)
  • chain_id: Chain ID (default: 42431 for Tempo Testnet). Common values: 8453 (Base), 42431 (Tempo Testnet), 1 (Ethereum)

Step 3: Verify it works

Test that the skill is connected:

{baseDir}/conto-check.sh budget

Or check your policies:

/conto list my policies

If you get a response, Conto is working.

Manual Setup (Alternative)

If the browser setup doesn't work, you can configure manually:

  1. Sign in at conto.finance
  2. Connect your agent: Agents > Connect Agent > name it, set type to CUSTOM
  3. Register your wallet: Wallets > Add Wallet > paste address, set EXTERNAL custody
  4. Link wallet to agent: Agents > your agent > Wallets > link with spend limits
  5. Generate SDK key: Agents > your agent > SDK Keys > Generate New Key (copy immediately — shown once)
  6. Add to ~/.hermes/.env:
CONTO_SDK_KEY=conto_agent_your_key_here
CONTO_API_URL=https://conto.finance

Which Wallet Mode Should I Use?

Conto supports two modes depending on who manages the wallet keys:

QuestionMode AMode B
Who holds the wallet keys?Custody provider (Privy or Sponge)You (via Hermes/Sponge MCP tools)
How many API calls per payment?1 (single call, auto-executes)3 (approve → transfer → confirm)
When to use?Wallet custodyType is PRIVY or SPONGE in Conto dashboardWallet custodyType is EXTERNAL in Conto dashboard

Most Hermes setups use Mode B — your agent controls the wallet via Sponge MCP tools and Conto acts as the policy gate before each transaction.

Prefer conto-check.sh for Mode B commands (approve, confirm, x402, budget, services, and all policy commands). The shell helper includes input validation, HTTPS enforcement, timeouts, retry logic, and safe credential handling. Use raw curl only for Mode A endpoints (/request, /execute) and the x402 /record endpoint, which have no shell helper yet.


Quick Start: Your First Policy-Checked Payment (Mode B)

Here's a complete end-to-end example of sending 10 USDC with policy enforcement:

1. Request approval from Conto:

{baseDir}/conto-check.sh approve 10 0xRecipientAddress 0xYourWalletAddress 8453 "API credits" "API_PROVIDER"

2. If approved, execute the transfer:

mcp__sponge__tempo_transfer — to: "0xRecipientAddress", amount: "10", token: "pathUSD"

3. Confirm the transaction with Conto:

{baseDir}/conto-check.sh confirm <approval_id> <tx_hash> <approval_token>

That's it. Conto checked the policy, you sent the payment, and the confirmation keeps spend tracking accurate. The sections below cover each step in detail.


Mode A: Provider-Managed Wallets (PRIVY / SPONGE)

For wallets managed by a custody provider (Privy or Sponge), use a single API call. Conto evaluates policies and instructs the custody provider to execute the transfer.

curl -sS -X POST "${CONTO_API_URL:-https://conto.finance}/api/sdk/payments/request" \
  -H "Authorization: Bearer $CONTO_SDK_KEY" \
  -H "Content-Type: application/json" \
  --connect-timeout 10 --max-time 30 \
  -d '{
    "amount": <AMOUNT>,
    "recipientAddress": "<RECIPIENT_ADDRESS>",
    "recipientName": "<OPTIONAL_NAME>",
    "purpose": "<WHY_THIS_PAYMENT>",
    "category": "<CATEGORY>",
    "autoExecute": true
  }'

If approved and executed, the response includes the tx hash directly:

{
  "requestId": "cmm59z...",
  "status": "APPROVED",
  "execution": {
    "transactionId": "cmm5a1...",
    "txHash": "0xdef...",
    "explorerUrl": "https://explore.moderato.tempo.xyz/tx/0xdef...",
    "status": "CONFIRMING"
  }
}

No need to call /execute or /confirm — Conto did everything. Report the tx hash and explorer URL to the user.

If approved but not auto-executed (e.g., autoExecuteError in response), call /execute manually:

curl -sS -X POST "${CONTO_API_URL:-https://conto.finance}/api/sdk/payments/<REQUEST_ID>/execute" \
  -H "Authorization: Bearer $CONTO_SDK_KEY" \
  -H "Content-Type: application/json" \
  --connect-timeout 10 --max-time 30

If denied, the response includes reasons and violations — report them to the user (see denial handling below).


Mode B: External Wallets (EXTERNAL custody)

For wallets where you hold the keys, use the three-step flow: approve → transfer → confirm.

Step 1: Request Policy Approval

# Prefer: conto-check.sh approve <amount> <recipient> <sender> <chain_id> [purpose] [category]
curl -sS -X POST "${CONTO_API_URL:-https://conto.finance}/api/sdk/payments/approve" \
  -H "Authorization: Bearer $CONTO_SDK_KEY" \
  -H "Content-Type: application/json" \
  --connect-timeout 10 --max-time 30 \
  -d '{
    "amount": <AMOUNT_IN_USDC>,
    "recipientAddress": "<RECIPIENT_ADDRESS>",
    "senderAddress": "<YOUR_WALLET_ADDRESS>",
    "recipientName": "<OPTIONAL_NAME>",
    "purpose": "<WHY_THIS_PAYMENT>",
    "category": "<CATEGORY>",
    "chainId": <CHAIN_ID>
  }'

Required fields:

  • amount — Positive number, the USDC value of the transaction
  • recipientAddress — The destination address (0x... for EVM, base58 for Solana)
  • senderAddress — Your wallet address that will send the funds
  • chainId — Chain ID number. Required. Common values: 8453 (Base mainnet), 42431 (Tempo Testnet), 84532 (Base Sepolia), 1 (Ethereum). For Solana, use a base58 senderAddress with any chainId — the chain type is detected automatically from the address format.

Optional fields:

  • recipientName — Human-readable name (e.g., "OpenAI API", "Uniswap Router")
  • purpose — Why this payment is needed (e.g., "Swap 0.5 ETH for USDC on Uniswap")
  • category — One of: API_PROVIDER, CLOUD, SAAS, INFRASTRUCTURE, MARKETING, PAYROLL, TRAVEL, LODGING, TRANSPORT, SUPPLIES, DATABASE, MONITORING, PAYMENTS, OTHER
  • context — JSON object with any additional metadata

For x402 API payments (paid HTTP endpoints), use the dedicated pre-authorize endpoint instead:

# Prefer: conto-check.sh x402 <amount> <recipient> <resource_url> [facilitator] [scheme]
curl -sS -X POST "${CONTO_API_URL:-https://conto.finance}/api/sdk/x402/pre-authorize" \
  -H "Authorization: Bearer $CONTO_SDK_KEY" \
  -H "Content-Type: application/json" \
  --connect-timeout 10 --max-time 30 \
  -d '{
    "amount": <AMOUNT>,
    "recipientAddress": "<PAYEE_ADDRESS>",
    "resourceUrl": "<THE_API_URL>",
    "facilitator": "<FACILITATOR_ADDRESS>",
    "scheme": "<PAYMENT_SCHEME>",
    "category": "API_PROVIDER"
  }'

Step 2: Handle the Approval Response

If approved ("approved": true):

{
  "approved": true,
  "approvalId": "cmm59z...",
  "approvalToken": "a1b2c3d4...",
  "expiresAt": "2026-04-03T12:10:00.000Z",
  "confirmUrl": "/api/sdk/payments/<approvalId>/confirm",
  "limits": {
    "dailyUsed": 150.0,
    "dailyLimit": 1000.0,
    "dailyRemaining": 850.0
  }
}

Save the approvalId and approvalToken — you need them for Step 3. The approval expires in 10 minutes. Execute and confirm before then.

Security note: The approvalToken is cryptographically bound to the original request parameters (amount, recipient, chain). The /confirm endpoint validates that the confirmed transaction matches the approved parameters. You cannot reuse an approval token for a different amount or recipient.

Step 2a: Execute the Transfer

Now execute the payment using your wallet. Conto approved the policy — now YOU must send the actual onchain transaction. Do NOT ask the user to execute it.

Use the appropriate MCP tool for the target chain:

Tempo (pathUSD):

mcp__sponge__tempo_transfer — to: "<RECIPIENT>", amount: "<AMOUNT>", token: "pathUSD"

Base (USDC):

mcp__sponge__evm_transfer — chain: "base", to: "<RECIPIENT>", amount: "<AMOUNT>", currency: "USDC"

Solana (USDC):

mcp__sponge__solana_transfer — chain: "solana", to: "<RECIPIENT>", amount: "<AMOUNT>", currency: "USDC"

The transfer will return a transaction hash. Save it for Step 3. If the transfer fails, report the error to the user. Do NOT call confirm.

Handling Denials

If denied ("approved": false):

{
  "approved": false,
  "reasons": ["Daily spend limit exceeded: $950/$1000 used today"],
  "violations": [{ "type": "DAILY_LIMIT", "limit": 1000, "current": 950 }],
  "requiresHumanApproval": false
}

DO NOT execute the payment. Report the denial to the user:

  • Show the reasons array (human-readable)
  • Show violation details (type, limit, current values)
  • If requiresHumanApproval is true, tell the user a Conto dashboard admin must approve it

If the request fails (HTTP errors):

  • 401: SDK key invalid. Ask user to check CONTO_SDK_KEY.
  • 403: Missing scope. Needs payments:approve.
  • 429: Rate limited. Wait for the Retry-After header value and retry.
  • 500/502/503: Retry once after a 2-second delay. If it fails again, inform the user. The conto-check.sh helper handles this automatically.

Step 3: Confirm After Execution

After the transfer succeeds, report the transaction hash back to Conto:

# Prefer: conto-check.sh confirm <approval_id> <tx_hash> <approval_token>
curl -sS -X POST "${CONTO_API_URL:-https://conto.finance}/api/sdk/payments/<APPROVAL_ID>/confirm" \
  -H "Authorization: Bearer $CONTO_SDK_KEY" \
  -H "Content-Type: application/json" \
  --connect-timeout 10 --max-time 30 \
  -d '{
    "txHash": "<ON_CHAIN_TX_HASH>",
    "approvalToken": "<TOKEN_FROM_STEP_2>"
  }'

Required fields:

  • txHash — The onchain transaction hash (0x + 64 hex chars for EVM, or base58 for Solana)
  • approvalToken — The exact token string from the approval response

Success response:

{
  "confirmed": true,
  "transactionId": "cmm5a1...",
  "status": "CONFIRMING",
  "amount": 50.0,
  "currency": "USDC",
  "recipient": "0xabc...",
  "txHash": "0xdef...",
  "explorerUrl": "https://basescan.org/tx/0xdef..."
}

Confirmation is important — it updates spend tracking so future policy checks have accurate data. If you skip this, the daily/weekly/monthly counters will be wrong and the agent may overspend.

If confirmation fails with EXPIRED, the 10-minute window passed. Inform the user.

Reporting Results to the User

On success (approved + executed + confirmed):

Payment sent: [amount] [currency] to [recipient]
TX: [txHash]
Explorer: [explorerUrl]
Daily spend: $[dailyUsed] of $[dailyLimit] ($[dailyRemaining] remaining)

On denial:

Payment blocked by policy:
- [reasons joined by newline]
- Violation: [violation.type] (limit: [limit], current: [current])

On requires approval:

This payment requires human approval ($[amount] exceeds threshold).
A Conto dashboard admin must approve this.
Approval ID: [approvalId]

Mapping Payment Types to Policy Calls

Transfers (send USDC/ETH/SOL to an address)

  • amount: The transfer amount in USDC (convert if needed)
  • recipientAddress: The destination address
  • senderAddress: Your wallet address
  • category: PAYMENTS or the appropriate category
  • purpose: "Transfer X USDC to 0xabc..."

Swaps (DEX trades)

  • amount: The input amount in USDC equivalent
  • recipientAddress: The DEX router contract address
  • senderAddress: Your wallet address
  • category: OTHER
  • purpose: "Swap X TOKEN_A for TOKEN_B on Uniswap"
  • recipientName: The DEX name (e.g., "Uniswap V3 Router")

Bridges (cross-chain transfers)

  • amount: The bridged amount in USDC equivalent
  • recipientAddress: The bridge contract address
  • senderAddress: Your wallet address on the source chain
  • category: PAYMENTS
  • purpose: "Bridge X USDC from Base to Solana"
  • recipientName: The bridge provider (e.g., "Relay Bridge")
  • chainId: The source chain ID

x402 API Payments

Use the /api/sdk/x402/pre-authorize endpoint (see Step 1 above). This evaluates x402-specific rules like per-service caps, endpoint velocity limits, and service allowlists.

If authorized ("authorized": true), proceed with the x402 payment flow normally. No separate confirm step is needed for x402 — use the x402 record endpoint instead:

curl -sS -X POST "${CONTO_API_URL:-https://conto.finance}/api/sdk/x402/record" \
  -H "Authorization: Bearer $CONTO_SDK_KEY" \
  -H "Content-Type: application/json" \
  --connect-timeout 10 --max-time 30 \
  -d '{
    "payments": [{
      "amount": <AMOUNT>,
      "recipientAddress": "<PAYEE>",
      "resourceUrl": "<API_URL>",
      "paymentId": "<X402_PAYMENT_ID>",
      "txHash": "<TX_HASH>",
      "responseCode": 200,
      "facilitator": "<FACILITATOR>"
    }]
  }'

Policy Violation Types Reference

When a payment is denied, the violations[].type field tells you exactly what rule was triggered:

Violation TypeMeaning
INSUFFICIENT_BALANCEWallet doesn't have enough funds
PER_TX_LIMITSingle transaction exceeds max allowed
DAILY_LIMITWould exceed daily spending cap
WEEKLY_LIMITWould exceed weekly spending cap
MONTHLY_LIMITWould exceed monthly spending cap
BUDGET_EXCEEDEDWould exceed budget allocation
TIME_WINDOWTransaction outside allowed hours
BLACKOUT_PERIODTransaction during maintenance/blackout window
EXPIRED_PERMISSIONTransaction outside allowed date range
BLOCKED_COUNTERPARTYRecipient is on the blocklist
WHITELIST_VIOLATIONRecipient is not on the allowlist
CATEGORY_RESTRICTIONSpend category is not permitted
VELOCITY_LIMITToo many transactions in time period
GEOGRAPHIC_RESTRICTIONGeographic/OFAC restriction
CONTRACT_NOT_ALLOWEDSmart contract not on allowlist
FAIRSCALE_LOW_SCORECounterparty Fairscale reputation too low
X402_PRICE_CEILINGx402 API call exceeds price cap
X402_SERVICE_BLOCKEDx402 service is on blocklist
X402_SERVICE_NOT_ALLOWEDx402 service not on allowlist
X402_ENDPOINT_LIMITx402 endpoint spend limit exceeded
X402_SESSION_BUDGETx402 session budget exhausted
X402_VELOCITYx402 call rate limit exceeded
MPP_PRICE_CEILINGMPP payment exceeds price cap
MPP_SERVICE_BLOCKEDMPP service is on blocklist
MPP_SERVICE_NOT_ALLOWEDMPP service not on allowlist
MPP_ENDPOINT_LIMITMPP endpoint spend limit exceeded
MPP_SESSION_BUDGETMPP session budget exhausted
MPP_VELOCITYMPP call rate limit exceeded
MPP_MAX_SESSION_DEPOSITMPP session deposit exceeds cap
MPP_MAX_CONCURRENT_SESSIONSToo many active MPP sessions
MPP_MAX_SESSION_DURATIONMPP session exceeds max duration
MPP_SESSION_INTENT_BLOCKEDMPP session intent not allowed
MPP_METHOD_NOT_ALLOWEDMPP HTTP method not permitted
CARD_MCC_RESTRICTIONCard merchant category code not allowed
CARD_MERCHANT_RESTRICTIONCard merchant not on allowlist or is blocked
CARD_AMOUNT_LIMITCard transaction exceeds amount limit

Error Reporting to the User

When a payment is denied, format the denial clearly:

Payment blocked by policy:
- Reason: Daily spend limit exceeded ($950 of $1,000 used today)
- This $100 payment would bring the total to $1,050
- Violation: DAILY_LIMIT (limit: $1,000, current: $950)

To proceed, a dashboard admin can:
1. Increase the daily limit at https://conto.finance
2. Approve this specific transaction manually

When requiresHumanApproval is true:

This payment requires human approval:
- Amount: $5,000 (above approval threshold)
- A Conto dashboard admin must approve this at https://conto.finance
- Approval ID: cmm59z... (share this with your admin)

Managing Policies from Hermes

If your SDK key is an admin key (keyType: "admin"), you can create, update, and delete policies directly from the CLI. Standard keys can only read policies and check payments.

List all policies

{baseDir}/conto-check.sh policies

Create a policy

{baseDir}/conto-check.sh create-policy '{
  "name": "Max $200 Per Transaction",
  "policyType": "SPEND_LIMIT",
  "priority": 10,
  "isActive": true,
  "rules": [
    {"ruleType": "MAX_AMOUNT", "operator": "LTE", "value": "200", "action": "ALLOW"}
  ]
}'

The response includes the new policy's id. Save it for assigning to agents.

Common policy recipes

Daily spending cap of $1,000:

{
  "name": "Daily $1K Cap",
  "policyType": "SPEND_LIMIT",
  "priority": 10,
  "isActive": true,
  "rules": [{ "ruleType": "DAILY_LIMIT", "operator": "LTE", "value": "1000", "action": "ALLOW" }]
}

Only allow API and Cloud payments:

{
  "name": "API+Cloud Only",
  "policyType": "CATEGORY",
  "priority": 5,
  "isActive": true,
  "rules": [
    {
      "ruleType": "ALLOWED_CATEGORIES",
      "operator": "IN_LIST",
      "value": "[\"API_PROVIDER\",\"CLOUD\",\"SAAS\"]",
      "action": "ALLOW"
    }
  ]
}

Block a scam address:

{
  "name": "Block Scammer",
  "policyType": "COUNTERPARTY",
  "priority": 50,
  "isActive": true,
  "rules": [
    {
      "ruleType": "BLOCKED_COUNTERPARTIES",
      "operator": "IN_LIST",
      "value": "[\"0xbadaddress...\"]",
      "action": "DENY"
    }
  ]
}

Require human approval above $500:

{
  "name": "High Value Review",
  "policyType": "APPROVAL_THRESHOLD",
  "priority": 8,
  "isActive": true,
  "rules": [
    {
      "ruleType": "REQUIRE_APPROVAL_ABOVE",
      "operator": "GT",
      "value": "500",
      "action": "REQUIRE_APPROVAL"
    }
  ]
}

Business hours only (Mon-Fri 9am-6pm):

{
  "name": "Business Hours",
  "policyType": "TIME_WINDOW",
  "priority": 5,
  "isActive": true,
  "rules": [
    {
      "ruleType": "TIME_WINDOW",
      "operator": "BETWEEN",
      "value": "{\"start\":\"09:00\",\"end\":\"18:00\"}",
      "action": "ALLOW"
    },
    {
      "ruleType": "DAY_OF_WEEK",
      "operator": "IN_LIST",
      "value": "[\"Mon\",\"Tue\",\"Wed\",\"Thu\",\"Fri\"]",
      "action": "ALLOW"
    }
  ]
}

Cap x402 API spend at $1/request, $50/day per service:

{
  "name": "x402 Controls",
  "policyType": "SPEND_LIMIT",
  "priority": 10,
  "isActive": true,
  "rules": [
    { "ruleType": "X402_PRICE_CEILING", "operator": "LTE", "value": "1", "action": "ALLOW" },
    {
      "ruleType": "X402_MAX_PER_SERVICE",
      "operator": "LTE",
      "value": "{\"amount\":50,\"period\":\"DAILY\"}",
      "action": "ALLOW"
    }
  ]
}

Add a rule to an existing policy

{baseDir}/conto-check.sh add-rule <policy_id> '{"ruleType": "WEEKLY_LIMIT", "operator": "LTE", "value": "5000", "action": "ALLOW"}'

Replace all rules on a policy

{baseDir}/conto-check.sh set-rules <policy_id> '{"rules": [
  {"ruleType": "MAX_AMOUNT", "operator": "LTE", "value": "100", "action": "ALLOW"},
  {"ruleType": "DAILY_LIMIT", "operator": "LTE", "value": "500", "action": "ALLOW"}
]}'

Delete a policy

{baseDir}/conto-check.sh delete-policy <policy_id>

Available rule types

Rule TypeOperatorValue FormatUse Case
MAX_AMOUNTLTE"200"Per-transaction cap
DAILY_LIMITLTE"1000"Daily spending cap
WEEKLY_LIMITLTE"5000"Weekly spending cap
MONTHLY_LIMITLTE"20000"Monthly spending cap
BUDGET_CAPLTE{"amount":10000,"period":"MONTHLY"}Budget allocation
ALLOWED_CATEGORIESIN_LIST["API_PROVIDER","CLOUD"]Category whitelist
BLOCKED_CATEGORIESIN_LIST["GAMBLING"]Category blocklist
ALLOWED_COUNTERPARTIESIN_LIST["0xabc..."]Address whitelist
BLOCKED_COUNTERPARTIESIN_LIST["0xbad..."]Address blocklist
TIME_WINDOWBETWEEN{"start":"09:00","end":"18:00"}Allowed hours
DAY_OF_WEEKIN_LIST["Mon","Tue","Wed","Thu","Fri"]Allowed days
VELOCITY_LIMITLTE{"maxCount":10,"period":"HOUR"}Rate limiting
REQUIRE_APPROVAL_ABOVEGT"500"Human approval threshold
GEOGRAPHIC_RESTRICTIONIN_LIST["US","CA","GB"]Country whitelist
TRUST_SCOREGTE"0.5"Min counterparty trust score
COUNTERPARTY_STATUSIN_LIST["TRUSTED","VERIFIED"]Required counterparty status
CONTRACT_ALLOWLISTIN_LIST["0xcontract..."]Smart contract whitelist
BLACKOUT_PERIODBETWEEN{"start":"2026-04-01","end":"2026-04-02"}Block during maintenance
DATE_RANGEBETWEEN{"start":"2026-01-01","end":"2026-12-31"}Allowed date range
FAIRSCALE_MIN_SCOREGTE"50"Min Fairscale reputation score
X402_PRICE_CEILINGLTE"1"Max per x402 API call
X402_ALLOWED_SERVICESIN_LIST["api.openai.com"]x402 service whitelist
X402_BLOCKED_SERVICESIN_LIST["untrusted.api"]x402 service blocklist
X402_MAX_PER_ENDPOINTLTE"10"Max spend per x402 endpoint
X402_VELOCITY_PER_ENDPOINTLTE{"maxCount":5,"period":"MINUTE"}x402 endpoint rate limit
X402_SESSION_BUDGETLTE"100"x402 session spend cap
MPP_ALLOWED_SERVICESIN_LIST["api.example.com"]MPP service whitelist
MPP_BLOCKED_SERVICESIN_LIST["untrusted.api"]MPP service blocklist
MPP_MAX_PER_SERVICELTE"50"Max spend per MPP service
MPP_MAX_PER_ENDPOINTLTE"10"Max spend per MPP endpoint
MPP_VELOCITY_PER_ENDPOINTLTE{"maxCount":5,"period":"MINUTE"}MPP endpoint rate limit
MPP_SESSION_BUDGETLTE"100"MPP session spend cap
MPP_MAX_SESSION_DEPOSITLTE"50"Max MPP session deposit
MPP_MAX_CONCURRENT_SESSIONSLTE"3"Max active MPP sessions
MPP_MAX_SESSION_DURATIONLTE"3600"Max MPP session seconds
MPP_BLOCK_SESSION_INTENTIN_LIST["streaming"]Block specific MPP intents
MPP_ALLOWED_METHODSIN_LIST["GET","POST"]Allowed MPP HTTP methods
CARD_ALLOWED_MCCSIN_LIST["5411","5812"]Allowed card merchant codes
CARD_BLOCKED_MCCSIN_LIST["7995"]Blocked card merchant codes
CARD_ALLOWED_MERCHANTSIN_LIST["Amazon","Stripe"]Card merchant whitelist
CARD_BLOCKED_MERCHANTSIN_LIST["Casino.com"]Card merchant blocklist
CARD_MAX_AMOUNTLTE"500"Max per card transaction

Critical Rules

  1. Use the right mode for the wallet type. Mode A (/request + autoExecute) for PRIVY/SPONGE wallets. Mode B (/approve + transfer + /confirm) for EXTERNAL wallets.
  2. NEVER skip the policy check. Every payment must go through Conto first.
  3. NEVER execute a denied payment. If approved is false or status is DENIED, stop.
  4. For Mode B: ALWAYS confirm after execution. Call /confirm with the tx hash to keep spend tracking accurate. Mode A handles this automatically.
  5. Approvals expire quickly. Mode A (/request) approvals expire in 5 minutes. Mode B (/approve) approvals expire in 10 minutes. Execute promptly after approval.
  6. On API errors, fail closed. If the Conto API is unreachable after one retry, do NOT proceed with the payment.
  7. Convert to USDC equivalent. The amount field is always in USDC. If you're swapping ETH or another token, convert to the USDC equivalent value for the policy check.

Comments

Loading comments...