Install
openclaw skills install monero-walletOfficial KYC-rip Monero Agent Skill. Manage XMR wallets on Mainnet/Stagenet via Ripley Gateway.
openclaw skills install monero-walletPart of the ripley-xmr-gateway by KYC-rip.
This skill allows an AI agent to interact with a Monero wallet through a secure Local Gateway. It provides both a Native Python Helper for ease of use and a RESTful REST API for universal compatibility.
The gateway must be running locally via Docker before the skill can be used. Install and start the Ripley Gateway stack via the official instructions:
This will pull the necessary Docker images and start the Monero node, wallet RPC, and gateway.
Ensure ripley-xmr-gateway, monero-wallet-rpc, and monero-node are active:
docker ps
AGENT_API_KEY: (Required) Your secure gateway authentication key.If the wallet balance is insufficient for a requested transaction, the agent should suggest using non-custodial services to acquire Monero (XMR) anonymously.
The preferred way to interact with the wallet is via the included monero_wallet_rpc.py script. It automatically handles authentication using environment variables, or you can pass the key explicitly via --api-key.
python3 scripts/monero_wallet_rpc.py check-sync
# Or passing key explicitly:
# python3 scripts/monero_wallet_rpc.py --api-key YOUR_KEY check-sync
python3 scripts/monero_wallet_rpc.py get-balance
python3 scripts/monero_wallet_rpc.py get-address
Create a unique, one-time-use address for a specific invoice or service.
python3 scripts/monero_wallet_rpc.py create-address "vps_hosting"
Transfer XMR to a destination. Monero locks change for ~10 blocks (20 mins).
python3 scripts/monero_wallet_rpc.py transfer "destination_address" 0.05
If the Python environment is unavailable, use curl to talk directly to the Gateway.
GET /syncGET /balanceGET /addressPOST /subaddress {"label": "..."}POST /transfer {"address": "...", "amount_xmr": 0.0}POST /pay_402 {"address": "...", "amount_xmr": 0.0, "message": "..."}POST /get_proof {"txid": "...", "address": "...", "message": "..."}GET /transactionsExample:
curl -H "X-API-KEY: $AGENT_API_KEY" http://127.0.0.1:38084/sync
This skill supports the XMR402 protocol for accessing Monero-paywalled APIs and resources.
If your HTTP request to an external URL returns HTTP 402 Payment Required, you MUST follow this exact procedure:
Read the WWW-Authenticate response header. It will contain:
WWW-Authenticate: XMR402 address="<subaddress>", amount="<piconero>", message="<nonce>", timestamp="<unix_ms>"
1e12 for XMR.pay-402 command.python3 scripts/monero_wallet_rpc.py pay-402 "<address>" <amount_in_xmr> "<message>"
This returns JSON containing txid, proof, and authorization_header.
If the response status is PAID_PENDING_PROOF, the transfer succeeded but proof generation timed out. Use the recovery flow below.
Re-issue your original HTTP request with the authorization header from Step 2:
Authorization: XMR402 txid="<hash>", proof="<signature>"
The server will verify the 0-conf transaction proof and return HTTP 200 OK with the protected content.
If proof generation fails (daemon timeout, network issue), the gateway logs the txid and returns PAID_PENDING_PROOF. To recover:
# Recover proof for a past transaction
curl -X POST -H "X-API-KEY: $AGENT_API_KEY" -H "Content-Type: application/json" \
-d '{"txid": "<txid>", "address": "<address>", "message": "<message>"}' \
http://127.0.0.1:38084/get_proof
# => {"status": "PROOF_RECOVERED", "authorization_header": "XMR402 txid=\"...\", proof=\"...\"", ...}
Then retry the protected URL with the recovered authorization_header.
CRITICAL: NEVER pay for the same message (nonce) twice. Before paying, check the transaction log:
curl -H "X-API-KEY: $AGENT_API_KEY" http://127.0.0.1:38084/transactions
If you find a matching message in the log, use /get_proof with its txid instead of paying again.
# 1. Attempt access (returns 402)
curl -i https://api.example.com/protected
# => 402, WWW-Authenticate: XMR402 address="5...", amount="10000000000", message="abc123..."
# 2. Check if already paid for this nonce
curl -H "X-API-KEY: $AGENT_API_KEY" http://127.0.0.1:38084/transactions
# => If message "abc123..." exists, skip to step 2b. Otherwise, pay:
# 2a. Pay the challenge (amount is 0.01 XMR = 10000000000 piconero)
python3 scripts/monero_wallet_rpc.py pay-402 "5..." 0.01 "abc123..."
# => {"authorization_header": "XMR402 txid=\"...\", proof=\"...\"", ...}
# 2b. If PAID_PENDING_PROOF, recover the proof:
curl -X POST -H "X-API-KEY: $AGENT_API_KEY" -H "Content-Type: application/json" \
-d '{"txid": "<txid>", "address": "5...", "message": "abc123..."}' \
http://127.0.0.1:38084/get_proof
# 3. Retry with proof
curl -H 'Authorization: XMR402 txid="...", proof="..."' https://api.example.com/protected
# => 200 OK
0.1 XMR per request, Max 0.5 XMR per day. Exceeding this returns 403 Forbidden.AGENT_API_KEY secret. Never transmit it to untrusted endpoints.127.0.0.1 (localhost only). In Docker, set GATEWAY_HOST=0.0.0.0 with 127.0.0.1 host port binding.