// manifesto

What is CONSBLOCK?

ConsBlock is the premier marketplace for autonomous AI mercenaries. We provide secure, localized infrastructure to deploy specialized AI agents that execute complex on-chain strategies, data scraping, and trading operations.

Whether you need to monitor sentiment across thousands of Discord channels or execute flash-loan arbitrages in milliseconds, our roster of pre-trained agents is ready for hire.

✓ Local Execution · Secure Keys · Zero-Dependency Deployments

Local Execution

Agents run on your machine, keys never leave.

Cryptographic Proofs

Every action signed and verifiable on-chain.

Pre-trained Logic

Zero-day setup with specialized system prompts.

EVM & Base Native

Built for low-latency L2 operations.

// manifesto

The Vision

The future of on-chain operations is autonomous. Humans are too slow, and traditional scripts are too rigid. We need intelligence built at the edge.

ConsBlock exists to bridge this gap. Our goal is a world where any trader or developer can spin up an elite, dedicated AI mercenary in under two minutes.

Protocols

  • Absolute Security — Your API keys and private keys never touch our servers. Execution is strictly local.
  • Specialization — Multi-agent frameworks fail. We build single-purpose, highly-tuned agents.
  • Transparency — Real-time terminal logs for every thought, tool call, and transaction.
  • Finality — All operations executed by our agents are final. No take-backs on the blockchain.
// manifesto

Local Execution

The CLI Architecture

To hire a mercenary from ConsBlock, you do not use a web dashboard. You pull the agent directly into your local environment via our CLI. git clone → init → up.

Tool Routing

Agents are equipped with specific 'Tools' (e.g., wallet signing, web scraping, DEX routing). The internal LLM uses function calling to route your natural language commands to exact execution paths.

Workspace Context

Every agent maintains a local workspace (usually stored in a `.consblock` hidden directory) containing its memory, active tasks, and transaction history. This state persists across sessions.

Payload Commands

You can interact dynamically via the ./consblock chat interface, or pass direct one-off payloads for automation via ./consblock run "Sell 50% of holding...".

// deployment

Quick Start

Prerequisites: Git and Node.js >= 20 installed.
1

Clone the Repository

bash
git clone https://github.com/consblock/local-agent.git
cd local-agent
2

Run the Setup Wizard

bash
./consblock init

This interactive wizard will prompt you to enter your API keys (OpenAI / Anthropic) and RPC endpoints securely.

3

Start Your Agent

bash
./consblock up

Your agent is now active, listening on a local port, and ready to stream terminal outputs directly to your CLI.

4

Send a Command Payload

bash
# Swap to conversational mode
./consblock chat

# Pass a direct one-shot task to an active agent
./consblock run "Hire AlphaQuant for 1 hour to monitor BASE pairs."
// deployment

CLI Installation

Source Installation (Recommended)

bash
git clone https://github.com/consblock/local-agent.git
cd local-agent
npm install
npm run build

NPM Global Package

If you prefer a global installation, you can install the CLI runner directly, although source installation is recommended for security auditing.

bash
npm install -g @consblock/cli
// deployment

Workspace Config

Your local configuration is securely stored in a .env file generated during the ./consblock init phase.

Variable Required Description
OPENAI_API_KEY Yes* Primary LLM provider key
ANTHROPIC_API_KEY Yes* Alternative LLM fallback
EVM_PRIVATE_KEY Optional Key used for automated execution on Base/L2s. Never expose this.
RPC_URL_BASE No Custom RPC endpoint for lower latency (default provided)
LOG_LEVEL No info / debug / error (Default: info)

* At least one LLM provider key is required for execution.

// agent catalog

AlphaQuant

The sniper. AlphaQuant is a high-frequency trading intelligence designed to analyze on-chain order books, mempool data, and DEX liquidity pools in real-time.

Capabilities

  • Flash-loan Execution — Detects arbitrage opportunities and constructs atomic flash-loan payloads.
  • Mempool Monitoring — Front-runs and back-runs pending transactions on EVM chains.
  • Risk Management — Hard-coded stop-losses and slippage protection tolerance.

Execution Example

bash
./consblock run --agent alphaquant "Monitor USDC/WETH on UniswapV3. Execute arb if spread > 0.5%."
// agent catalog

DataGoblin

The scavenger. DataGoblin is built for mass extraction. It bypasses Cloudflare, solves captchas natively, and structures unstructured web data into clean JSON feeds.

Capabilities

  • Puppeteer Integration — Headless browser control with residential proxies.
  • Dark Web Indexing — Accesses .onion routing via local Tor relays.
  • Schema Extraction — Automatically infers database schemas from raw HTML tables.

Execution Example

bash
./consblock run --agent datagoblin "Scrape all token launches on Pump.fun in the last 24h. Output to CSV."
// agent catalog

SocialSentiment

The infiltrator. SocialSentiment analyzes narratives across Twitter (X), Discord, Telegram, and Reddit to predict market movements before price translates them.

Capabilities

  • NLP Processing — Detects sarcasm, FUD, and euphoric sentiment clustering.
  • KOL Tracking — Maps wallet addresses to key opinion leaders' public statements.
  • Sybil Detection — Filters out bot engagement and artificial hype farming.

Execution Example

bash
./consblock run --agent socialsentiment "Analyze CT sentiment for $PEPE vs $DOGE. Provide a buy/sell rating."
// agent catalog

SmartReaper

The auditor. SmartReaper disassembles EVM bytecode and analyzes Solidity source code for zero-day vulnerabilities, reentrancy attacks, and logic flaws.

Capabilities

  • Symbolic Execution — Explores all possible execution paths to find edge-case exploits.
  • Bytecode Decompilation — Analyzes unverified contracts directly from the blockchain.
  • Gas Optimization — Recommends inline assembly rewrites for cheaper execution.

Execution Example

bash
./consblock run --agent smartreaper "Audit contract 0x123... on mainnet. Report critical severity findings."
// agent catalog

ZeroDay

The shadow. A highly classified, unrestricted LLM instance meant for advanced security research, penetration testing, and red-teaming protocols.

WARNING: ZeroDay operates with safety guardrails disabled. Use only on authorized infrastructure.

Capabilities

  • Exploit Generation — Drafts PoC (Proof of Concept) attack vectors.
  • Network Mapping — Scans open ports and maps infrastructure topologies.
  • Phishing Simulation — Generates highly targeted spear-phishing campaigns for corporate red teams.
// sdk & api

TypeScript SDK

bash
npm install consblock

Available Methods

Method Description
ConsBlock.create(config) Spin up or connect to a consensus node
node.propose(tx) Submit a state transition for voting
node.state.get(key) Read current state value
node.state.prove(key) Generate Merkle inclusion proof
node.peers() List connected validator peers
node.status() Get current round and phase
node.on(event, fn) Subscribe to consensus events
node.stop() Gracefully disconnect from network

Full Example

typescript
import { ConsBlock, BftEngine } from 'consblock'

const node = await ConsBlock.create({
  engine: new BftEngine({ quorum: 0.67 }),
  port: 8545,
  peers: ['peer1.consblock.xyz'],
})

node.on('block:finalized', (block) => {
  console.log(`Round ${block.round}${block.hash}`)
})

const receipt = await node.propose({
  data: { transfer: '0xabc → 0xdef', amount: 100 },
})
// sdk & api

REST API

Health

http
GET /health
json
{ "status": "ok", "block": 14823, "peers": 7 }

Consensus Status

http
GET /consensus/status
json
{
  "round": 14823,
  "phase": "PRECOMMIT",
  "leader": "0xabc…",
  "votes": { "prevote": 7, "precommit": 6 }
}

Submit Transaction

http
POST /consensus/propose
Content-Type: application/json

{ "data": { "transfer": "0xabc", "amount": 100 } }

Read State

http
GET /state/:key
json
{ "key": "balance:0xabc", "value": "1000", "root": "0x4f8a…" }
// protocols

Security & Isolation

Our philosophy is: "Do not trust the cloud."

Key Management

  • Local Only: ConsBlock never transmits your EVM_PRIVATE_KEY via any HTTP request, except directly to your configured RPC provider.
  • Memory Sandboxing: The LLM process cannot arbitrarily read from your filesystem; it only has access to its specific .consblock project workspace context.
  • Dry Runs: By default, all destructive actions require a final y/n prompt in the terminal unless started with the --auto-approve flag.