You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-Added macOS Keychain fallback for agent credentials, so Mony and other local agents can resolve the `EvaWallet` / `EvaMain` sovereign wallet after OpenClaw secrets and env vars and before the encrypted keystore path
12
-
-Made Polymarket orderbook handling deterministic by sorting visible bids highest-first and asks lowest-first before pricing, preflight, and sell-fill estimation
13
-
-Preserved the `v1.9.0` Polymarket withdrawal flow while promoting the Mony-tested Evalanche runtime fixes into the public release line
14
-
-Added focused regression coverage for keychain credential resolution and unsorted CLOB orderbook arrays
11
+
-Hardened MCP HTTP mode so it now requires an explicit bearer token, binds to loopback by default, enforces request timeouts, and rejects oversized request bodies before parsing.
12
+
-Routed high-risk execution helpers through active spending-policy checks, including approve-and-call, UUPS proxy upgrades, Li.Fi bridge/swap execution, and Gas.zip funding.
13
+
-Tightened x402 paid-service hosting so settled endpoints require a settlement verifier by default, while preserving explicit `signed-intent` mode for trusted peer flows and tests.
14
+
-Fixed Polymarket collateral normalization for live pUSD spender allowances, and made `pm_approve` / `pm_deposit` sync both wallet USDC.e -> CLOB approval and Polygon pUSD spender approvals.
15
15
- Docs:
16
16
-[Release notes](docs/releases/README.md)
17
17
-[Roadmap](ROADMAP.md)
@@ -45,6 +45,11 @@ npx evalanche-mcp
45
45
```
46
46
47
47
Evalanche ships an MCP server for wallet actions, holdings discovery, DeFi, bridge and swap flows, Polymarket, and perpetual venues.
48
+
The default MCP transport is stdio. HTTP mode is available for local automation, but requires an explicit bearer token:
-Added macOS Keychain fallback for agent credentials, so Mony and other local agents can resolve the `EvaWallet` / `EvaMain` sovereign wallet after OpenClaw secrets and env vars and before the encrypted keystore path
11
-
-Made Polymarket orderbook handling deterministic by sorting visible bids highest-first and asks lowest-first before pricing, preflight, and sell-fill estimation
12
-
-Preserved the `v1.9.0` Polymarket withdrawal flow while promoting the Mony-tested Evalanche runtime fixes into the public release line
13
-
-Added focused regression coverage for keychain credential resolution and unsorted CLOB orderbook arrays
-Hardened MCP HTTP mode so it now requires an explicit bearer token, binds to loopback by default, enforces request timeouts, and rejects oversized request bodies before parsing.
11
+
-Routed high-risk execution helpers through active spending-policy checks, including approve-and-call, UUPS proxy upgrades, Li.Fi bridge/swap execution, and Gas.zip funding.
12
+
-Tightened x402 paid-service hosting so settled endpoints require a settlement verifier by default, while preserving explicit `signed-intent` mode for trusted peer flows and tests.
13
+
-Fixed Polymarket collateral normalization for live pUSD spender allowances, and made `pm_approve` / `pm_deposit` sync both wallet USDC.e -> CLOB approval and Polygon pUSD spender approvals.
- Hardened MCP HTTP mode so it requires an explicit bearer token, binds to loopback by default, enforces request timeouts, and rejects oversized request bodies.
4
+
- Routed high-risk helper execution through the active spending policy, including generic approve-and-call, UUPS proxy upgrade, Li.Fi bridge/swap execution, and Gas.zip funding.
5
+
- Made MCP policy removal explicit with `remove=true` and `confirm="remove"` instead of treating an empty policy payload as removal.
6
+
- Changed x402 service hosting so paid endpoints require a settlement verifier by default, while preserving explicit `signed-intent` mode for trusted peer demos and tests.
7
+
- Added an adversarial threat model documenting resolved threats, residual risks, and focus paths for future AppSec review.
8
+
9
+
## Validation
10
+
11
+
-`npm run typecheck`
12
+
-`npm run test -- test/mcp/server.test.ts test/economy/service.test.ts`
13
+
-`npm run test`
14
+
-`npm run build`
15
+
16
+
## Notes
17
+
18
+
- HTTP MCP users must now set `EVALANCHE_MCP_HTTP_TOKEN` or pass `startHTTP({ authToken })`.
19
+
-`v1.9.3` was intentionally skipped; `v1.9.4` is the next published patch after `v1.9.2`.
20
+
- Remaining follow-up work is tracked in the updated threat model: scoped MCP tokens, production x402 settlement verifier adapters, semantic quote invariant checks, and dependency reachability triage.
- Hardened MCP HTTP mode so it now requires an explicit bearer token, binds to loopback by default, enforces request timeouts, and rejects oversized request bodies before parsing.
4
+
- Routed high-risk execution helpers through active spending-policy checks, including approve-and-call, UUPS proxy upgrades, Li.Fi bridge/swap execution, and Gas.zip funding.
5
+
- Tightened x402 paid-service hosting so settled endpoints require a settlement verifier by default, while preserving explicit `signed-intent` mode for trusted peer flows and tests.
6
+
- Fixed Polymarket collateral normalization for live pUSD spender allowances, and made `pm_approve` / `pm_deposit` sync both wallet USDC.e -> CLOB approval and Polygon pUSD spender approvals.
7
+
8
+
## Validation
9
+
10
+
-`npm test`
11
+
-`npm run typecheck`
12
+
-`npm run build`
13
+
14
+
## Notes
15
+
16
+
- HTTP MCP users must now set `EVALANCHE_MCP_HTTP_TOKEN` or pass `startHTTP({ authToken })`.
17
+
- Polymarket venue balance reads now prefer live pUSD spender approvals over the stale single-allowance assumption, with wallet-side USDC.e -> CLOB approval retained as fallback.
18
+
- This release folds the previously prepared 1.9.4/1.9.5 hardening work together with the pending Polymarket allowance fix into one clean public release line: `v1.9.7`.
0 commit comments