7bins-mcp
v1.0.7
Published
OpenClaw plugin — 7bins Meteora LP position manager MCP bridge
Downloads
835
Readme
7bins MCP Plugin — Installation and Usage Guide
Complete step-by-step guide for installing OpenClaw and the 7bins MCP plugin to manage Meteora DLMM liquidity positions.
Table of Contents
Prerequisites
Before you begin, ensure you have:
- Node.js 22+ installed (Download)
- npm 10+ or pnpm 9+
- LLM Provider Credentials (OpenAI, Anthropic, or Google Gemini API key)
- A Solana wallet with a private key (for authentication)
- Access to a 7bins MCP server (your deployed server URL or
http://localhost:3100for local development)
Installing OpenClaw
Step 1: Install OpenClaw globally
npm install -g openclaw@latestStep 2: Verify installation
openclaw --versionYou should see the version number (e.g., 0.8.0 or higher).
Step 3: Run onboarding
openclaw onboard --install-daemonThis will:
- Set up the OpenClaw configuration directory (
~/.openclaw/) - Create the initial
openclaw.jsonconfiguration file - Prompt you to configure your LLM provider (OpenAI, Anthropic, or Gemini)
- Install the OpenClaw daemon service
Follow the prompts to:
- Select your LLM provider
- Enter your API key
- Choose your preferred model
Installing the 7bins MCP Plugin
Step 1: Install the plugin from npm
openclaw plugins install 7bins-mcpThis will:
- Download the plugin from npm
- Install it to
~/.openclaw/extensions/7bins-mcp/ - Register it with OpenClaw
Step 2: Verify installation
openclaw plugins listYou should see 7bins-mcp in the list of installed plugins.
Configuring the Plugin
Step 1: Open your OpenClaw configuration
The configuration file is located at:
- macOS/Linux:
~/.openclaw/openclaw.json - Windows:
%USERPROFILE%\.openclaw\openclaw.json
You can edit it with any text editor, or use:
openclaw config editStep 2: Enable the plugin and tools
Add the following to your openclaw.json:
{
"plugins": {
"allow": ["7bins-mcp"]
},
"tools": {
"allow": ["7bins-mcp", "group:openclaw"]
}
}Step 3: Configure your MCP server URL (optional)
If your MCP server is deployed on AWS or another remote server, configure the URL:
{
"plugins": {
"allow": ["7bins-mcp"],
"entries": {
"7bins-mcp": {
"config": {
"serverUrl": "https://your-mcp-server.com"
}
}
}
},
"tools": {
"allow": ["7bins-mcp", "group:openclaw"]
}
}Important notes:
- The
serverUrlshould be the base URL of your MCP server (without/mcpsuffix) - The plugin automatically appends
/mcpto the URL when making requests - If you include
/mcpin the URL, it will be automatically removed - Examples:
- ✅
"serverUrl": "https://mcp.7bins.com"→ requests go tohttps://mcp.7bins.com/mcp - ✅
"serverUrl": "https://mcp.7bins.com/mcp"→ automatically becomeshttps://mcp.7bins.com/mcp - ✅
"serverUrl": "http://localhost:3100"→ requests go tohttp://localhost:3100/mcp
- ✅
- If
serverUrlis not specified, it defaults tohttp://localhost:3100
Step 4: Save and restart OpenClaw
After making changes, restart OpenClaw:
openclaw restartOr if running manually:
# Stop the daemon
openclaw stop
# Start it again
openclaw startAuthentication
Before you can use the position management tools, you must authenticate with your Solana wallet. The plugin supports two authentication methods:
Method 1: In-Chat Authentication (Recommended)
This method uses the meteora_auth tool directly in your OpenClaw chat session.
Step 1: Start OpenClaw
openclaw chatStep 2: Authenticate with your private key
In the chat, ask OpenClaw to authenticate you. You can provide your private key in one of these formats:
Base58 keypair string (as exported by Solana CLI or Phantom):
Authenticate me for Meteora LP bot. My private key is: 5J3mBbA58q6W1... (your full base58 keypair)JSON byte array (Solana CLI format):
Authenticate me for Meteora LP bot. My private key is: [12,34,56,...,128 numbers]Hex string (128 characters):
Authenticate me for Meteora LP bot. My private key is: 010203... (128 hex characters)Step 3: The plugin handles the rest
The meteora_auth tool will:
- Parse your private key locally (it never leaves your machine)
- Derive your wallet address
- Fetch a challenge message from the server
- Sign the challenge locally using your private key
- Exchange the signature for a session token
- Save the token to
~/.openclaw/extensions/7bins-mcp/.token
You're now authenticated! The token is valid for 7 days.
Method 2: CLI Authentication (Alternative)
If you have a Solana keypair JSON file (e.g., from solana-keygen), you can authenticate via the command line:
Step 1: Run the authentication CLI tool
npx 7bins-mcp-auth --keypair ~/.config/solana/id.json --url https://your-mcp-server.comOptions:
--keypair <path>: Path to your Solana keypair JSON file (default:~/.config/solana/id.json)--url <server-url>: MCP server base URL (default:http://localhost:3100)--no-save: Don't save the token (it will still be printed to stdout)
Step 2: Token is saved automatically
The token is automatically saved to ~/.openclaw/extensions/7bins-mcp/.token, and the plugin will use it on the next request.
For Node.js < 19:
npm install @noble/ed25519
npx 7bins-mcp-auth --keypair ~/.config/solana/id.jsonToken Refresh
Tokens expire after 7 days. To refresh:
- In-chat: Simply call
meteora_authagain with your private key - CLI: Run
npx 7bins-mcp-authagain
The plugin automatically picks up the new token on the next request.
Using the Plugin
Starting OpenClaw Chat
openclaw chatAvailable Tools
Once authenticated, you can use these tools in your chat:
| Tool | Description |
|------|-------------|
| meteora_auth | Authenticate with your Solana wallet |
| get_pool_data | Get information about a Meteora DLMM pool |
| list_opened_positions | List all your active positions |
| get_position_data | Get detailed data for a specific position |
| get_position_status | Get the current status of a position |
| get_position_configuration | Get the full configuration of a position |
| get_dashboard_stats | Get portfolio dashboard statistics |
| open_position | Open a new DLMM liquidity position |
| add_liquidity | Add liquidity to an existing position |
| withdraw_liquidity | Withdraw liquidity from a position |
| close_position | Close a position |
Example Conversations
Check your positions:
> List all my active positionsGet pool information:
> Get pool data for address 7t4on6jZvR4Satv6h2WRhWXhfMHmggszk4uVv29CfCaqOpen a new position:
> Open a new position on pool 7t4on6jZvR4Satv6h2WRhWXhfMHmggszk4uVv29CfCaq with 100 USDC of token X and 50 USDC of token Y, using SPOT strategyCheck position details:
> Get full details for position address ABC123...View dashboard:
> Show me my portfolio dashboard statsTroubleshooting
Plugin not found after installation
Problem: openclaw plugins list doesn't show 7bins-mcp
Solution:
- Verify npm installation:
npm list -g openclaw - Check plugin installation:
ls ~/.openclaw/extensions/7bins-mcp/ - Reinstall:
openclaw plugins uninstall 7bins-mcp && openclaw plugins install 7bins-mcp
Authentication fails with 401 error
Problem: Tools return "Not authenticated" errors
Solution:
- Check if token exists:
cat ~/.openclaw/extensions/7bins-mcp/.token - Verify token is not expired (tokens last 7 days)
- Re-authenticate using
meteora_authtool ornpx 7bins-mcp-auth - Ensure your wallet is registered on the 7bins platform
Server connection errors
Problem: "MCP server 500" or connection refused errors
Solution:
- Verify your
serverUrlinopenclaw.jsonis correct - Test the server URL manually:
curl https://your-mcp-server.com/mcp - Check if the server requires authentication (some endpoints may be public)
- Verify network connectivity and firewall settings
Tools not available in chat
Problem: OpenClaw doesn't recognize the tools
Solution:
- Verify plugin is enabled in
openclaw.json:{ "plugins": { "allow": ["7bins-mcp"] }, "tools": { "allow": ["7bins-mcp", "group:openclaw"] } } - Restart OpenClaw:
openclaw restart - Check plugin logs:
openclaw logs
Private key parsing errors
Problem: meteora_auth fails with "Invalid private key"
Solution:
- Ensure your private key is in one of the supported formats:
- Base58: 64-byte keypair string
- JSON array:
[1,2,3,...,64](exactly 64 numbers) - Hex: 128 hexadecimal characters
- Remove any extra whitespace or newlines
- For JSON array format, ensure it's valid JSON
Token not persisting
Problem: Token is not saved after authentication
Solution:
- Check directory permissions:
ls -la ~/.openclaw/extensions/7bins-mcp/ - Ensure write permissions:
chmod -R u+w ~/.openclaw/extensions/ - Try saving manually:
echo "your-token-here" > ~/.openclaw/extensions/7bins-mcp/.token
Node.js version issues
Problem: npx 7bins-mcp-auth fails on older Node versions
Solution:
- Upgrade to Node.js 19+ (recommended)
- Or install the fallback dependency:
npm install @noble/ed25519 npx 7bins-mcp-auth --keypair ~/.config/solana/id.json
Advanced Configuration
Using a custom token
If you have a token from another source, you can set it directly in openclaw.json:
{
"plugins": {
"allow": ["7bins-mcp"],
"entries": {
"7bins-mcp": {
"config": {
"serverUrl": "https://your-mcp-server.com",
"sessionToken": "your-token-here"
}
}
}
}
}Token priority order:
plugins.entries.7bins-mcp.config.sessionToken(fromopenclaw.json)~/.openclaw/extensions/7bins-mcp/.token(from authentication tools)- No token (unauthenticated requests)
