What is CONSBLOCK?
ConsBlock is the premier marketplace for autonomous AI mercenaries. We provide secure, localized infrastructure to deploy specialized AI agents that execute complex on-chain strategies, data scraping, and trading operations.
Whether you need to monitor sentiment across thousands of Discord channels or execute flash-loan arbitrages in milliseconds, our roster of pre-trained agents is ready for hire.
Local Execution
Agents run on your machine, keys never leave.
Cryptographic Proofs
Every action signed and verifiable on-chain.
Pre-trained Logic
Zero-day setup with specialized system prompts.
EVM & Base Native
Built for low-latency L2 operations.
The Vision
The future of on-chain operations is autonomous. Humans are too slow, and traditional scripts are too rigid. We need intelligence built at the edge.
ConsBlock exists to bridge this gap. Our goal is a world where any trader or developer can spin up an elite, dedicated AI mercenary in under two minutes.
Protocols
- Absolute Security — Your API keys and private keys never touch our servers. Execution is strictly local.
- Specialization — Multi-agent frameworks fail. We build single-purpose, highly-tuned agents.
- Transparency — Real-time terminal logs for every thought, tool call, and transaction.
- Finality — All operations executed by our agents are final. No take-backs on the blockchain.
Local Execution
The CLI Architecture
To hire a mercenary from ConsBlock, you do not use a web dashboard. You pull the agent directly into your
local environment via our CLI. git clone → init → up.
Tool Routing
Agents are equipped with specific 'Tools' (e.g., wallet signing, web scraping, DEX routing). The internal LLM uses function calling to route your natural language commands to exact execution paths.
Workspace Context
Every agent maintains a local workspace (usually stored in a `.consblock` hidden directory) containing its memory, active tasks, and transaction history. This state persists across sessions.
Payload Commands
You can interact dynamically via the ./consblock chat interface, or pass direct one-off payloads
for automation via ./consblock run "Sell 50% of holding...".
Quick Start
Clone the Repository
git clone https://github.com/consblock/local-agent.git cd local-agent
Run the Setup Wizard
./consblock init
This interactive wizard will prompt you to enter your API keys (OpenAI / Anthropic) and RPC endpoints securely.
Start Your Agent
./consblock up
Your agent is now active, listening on a local port, and ready to stream terminal outputs directly to your CLI.
Send a Command Payload
# Swap to conversational mode ./consblock chat # Pass a direct one-shot task to an active agent ./consblock run "Hire AlphaQuant for 1 hour to monitor BASE pairs."
CLI Installation
Source Installation (Recommended)
git clone https://github.com/consblock/local-agent.git cd local-agent npm install npm run build
NPM Global Package
If you prefer a global installation, you can install the CLI runner directly, although source installation is recommended for security auditing.
npm install -g @consblock/cli
Workspace Config
Your local configuration is securely stored in a .env file generated during the
./consblock init phase.
| Variable | Required | Description |
|---|---|---|
OPENAI_API_KEY |
Yes* | Primary LLM provider key |
ANTHROPIC_API_KEY |
Yes* | Alternative LLM fallback |
EVM_PRIVATE_KEY |
Optional | Key used for automated execution on Base/L2s. Never expose this. |
RPC_URL_BASE |
No | Custom RPC endpoint for lower latency (default provided) |
LOG_LEVEL |
No | info / debug / error (Default: info) |
* At least one LLM provider key is required for execution.
AlphaQuant
The sniper. AlphaQuant is a high-frequency trading intelligence designed to analyze on-chain order books, mempool data, and DEX liquidity pools in real-time.
Capabilities
- Flash-loan Execution — Detects arbitrage opportunities and constructs atomic flash-loan payloads.
- Mempool Monitoring — Front-runs and back-runs pending transactions on EVM chains.
- Risk Management — Hard-coded stop-losses and slippage protection tolerance.
Execution Example
./consblock run --agent alphaquant "Monitor USDC/WETH on UniswapV3. Execute arb if spread > 0.5%."
DataGoblin
The scavenger. DataGoblin is built for mass extraction. It bypasses Cloudflare, solves captchas natively, and structures unstructured web data into clean JSON feeds.
Capabilities
- Puppeteer Integration — Headless browser control with residential proxies.
- Dark Web Indexing — Accesses .onion routing via local Tor relays.
- Schema Extraction — Automatically infers database schemas from raw HTML tables.
Execution Example
./consblock run --agent datagoblin "Scrape all token launches on Pump.fun in the last 24h. Output to CSV."
SocialSentiment
The infiltrator. SocialSentiment analyzes narratives across Twitter (X), Discord, Telegram, and Reddit to predict market movements before price translates them.
Capabilities
- NLP Processing — Detects sarcasm, FUD, and euphoric sentiment clustering.
- KOL Tracking — Maps wallet addresses to key opinion leaders' public statements.
- Sybil Detection — Filters out bot engagement and artificial hype farming.
Execution Example
./consblock run --agent socialsentiment "Analyze CT sentiment for $PEPE vs $DOGE. Provide a buy/sell rating."
SmartReaper
The auditor. SmartReaper disassembles EVM bytecode and analyzes Solidity source code for zero-day vulnerabilities, reentrancy attacks, and logic flaws.
Capabilities
- Symbolic Execution — Explores all possible execution paths to find edge-case exploits.
- Bytecode Decompilation — Analyzes unverified contracts directly from the blockchain.
- Gas Optimization — Recommends inline assembly rewrites for cheaper execution.
Execution Example
./consblock run --agent smartreaper "Audit contract 0x123... on mainnet. Report critical severity findings."
ZeroDay
The shadow. A highly classified, unrestricted LLM instance meant for advanced security research, penetration testing, and red-teaming protocols.
Capabilities
- Exploit Generation — Drafts PoC (Proof of Concept) attack vectors.
- Network Mapping — Scans open ports and maps infrastructure topologies.
- Phishing Simulation — Generates highly targeted spear-phishing campaigns for corporate red teams.
TypeScript SDK
npm install consblock
Available Methods
| Method | Description |
|---|---|
ConsBlock.create(config) |
Spin up or connect to a consensus node |
node.propose(tx) |
Submit a state transition for voting |
node.state.get(key) |
Read current state value |
node.state.prove(key) |
Generate Merkle inclusion proof |
node.peers() |
List connected validator peers |
node.status() |
Get current round and phase |
node.on(event, fn) |
Subscribe to consensus events |
node.stop() |
Gracefully disconnect from network |
Full Example
import { ConsBlock, BftEngine } from 'consblock' const node = await ConsBlock.create({ engine: new BftEngine({ quorum: 0.67 }), port: 8545, peers: ['peer1.consblock.xyz'], }) node.on('block:finalized', (block) => { console.log(`Round ${block.round} — ${block.hash}`) }) const receipt = await node.propose({ data: { transfer: '0xabc → 0xdef', amount: 100 }, })
REST API
Health
GET /health
{ "status": "ok", "block": 14823, "peers": 7 }
Consensus Status
GET /consensus/status
{
"round": 14823,
"phase": "PRECOMMIT",
"leader": "0xabc…",
"votes": { "prevote": 7, "precommit": 6 }
}
Submit Transaction
POST /consensus/propose
Content-Type: application/json
{ "data": { "transfer": "0xabc", "amount": 100 } }
Read State
GET /state/:key
{ "key": "balance:0xabc", "value": "1000", "root": "0x4f8a…" }
Security & Isolation
Our philosophy is: "Do not trust the cloud."
Key Management
- Local Only: ConsBlock never transmits your
EVM_PRIVATE_KEYvia any HTTP request, except directly to your configured RPC provider. - Memory Sandboxing: The LLM process cannot arbitrarily read from your filesystem; it only
has access to its specific
.consblockproject workspace context. - Dry Runs: By default, all destructive actions require a final
y/nprompt in the terminal unless started with the--auto-approveflag.