@execra/daemon
v2.0.0
Published
Execra daemon — Solana wallet daemon for autonomous agents
Maintainers
Readme
@execra/daemon
The Execra daemon — a Solana wallet daemon built for autonomous AI agents.
Runs a local WebSocket server that agents connect to for signing, and an interactive CLI dashboard to manage accounts and monitor activity. Also includes a built-in MCP server so it can work directly with Claude Desktop.
Installation
npm install -g @execra/daemonOr run without installing:
npx @execra/daemon <command>Quick start
# Create your encrypted vault (one-time setup)
execra init
# Start the daemon + CLI dashboard
execra startSet WALLET_PASSWORD in your environment to skip the unlock prompt:
export WALLET_PASSWORD=your-password
execra startCommands
execra init
Creates a new encrypted vault at ~/.wallet/. Generates a BIP-39 mnemonic and encrypts it with your password using AES-256-GCM.
execra initRun this once. All wallet accounts are derived from this vault.
execra start
Starts the daemon with the interactive CLI dashboard.
execra start
execra start --password your-password
execra start --cluster mainnet-beta
execra start --cluster https://mainnet.helius-rpc.com/?api-key=...The dashboard shows live account balances, connected agents, and incoming transaction requests.
execra accounts
List all accounts in the vault.
execra accountsexecra new-account <name>
Create a new named account derived from the vault mnemonic.
execra new-account "Trading Bot"
execra new-account "Treasury"execra balance <name>
Check the SOL balance of an account.
execra balance "Trading Bot"Daemon WebSocket API
When running, the daemon listens on ws://localhost:3000:
/ws/agent— for AI agents using the SDK/ws/dapp— for the Chrome extension / browser dApps (WalletConnect v2)
Agents using @execra/sdk connect automatically. If the daemon isn't running, the SDK falls back to reading directly from the vault.
Built-in MCP server
The daemon exposes an MCP server on startup. To use it with Claude Desktop without a separate @execra/mcp install:
{
"mcpServers": {
"execra": {
"command": "execra",
"args": ["mcp"],
"env": {
"WALLET_PASSWORD": "your-password"
}
}
}
}Vault location
The encrypted vault is stored at ~/.wallet/:
~/.wallet/
├── vault.json # AES-256-GCM encrypted mnemonic
└── config.json # cluster, account indexPrivate keys are never written to disk — only the BIP-39 mnemonic, encrypted.
License
MIT
