Discover tools
Connect to the hosted MCP endpoint and enumerate available tools.
MCP tool discoveryAgent Discovery
Use TruCore ATF to probe, simulate, protect, verify, and explain AI-driven transactions through a hosted MCP endpoint or direct API.
ATF is a policy-enforced transaction firewall for AI agents. MCP is a hosted integration surface for agent runtimes. Advisory tools help plan safely. Protect provides the binding enforcement decision. Machine-readable discovery is available at /.well-known/agent.json.
The recommended integration path for agent runtimes using the Model Context Protocol. ATF exposes a hosted MCP endpoint with five tools covering the full advisory-to-enforcement loop.
MCP does not sign or submit transactions. The agent retains full signing authority. Protect is the only authoritative gate.
Connect to the hosted MCP endpoint and enumerate available tools.
MCP tool discoverySubmit one candidate intent for lightweight policy evaluation before committing resources.
probe_transactionRun a full simulation of the candidate intent against active policies and market conditions.
simulate_transactionSubmit the intent for binding policy enforcement. This is the authoritative gate. Only approved intents should proceed to signing.
protect_transactionConfirm the execution receipt hash integrity after on-chain settlement.
verify_receiptRequest a human-readable explanation of the decision, including reason codes and policy triggers.
explain_decisionMCP does not sign or submit transactions. The agent retains full signing authority. Stop the MCP flow here and proceed to your own signer.
Agent-sideFive tools available through the hosted MCP endpoint. Advisory tools are policy-aware but not authoritative. Only protect_transaction produces a binding enforcement decision.
| Tool | Purpose | Advisory | Authoritative |
|---|---|---|---|
probe_transaction | Lightweight policy pre-check on a candidate intent | Yes | No |
simulate_transaction | Full simulation against active policies and conditions | Yes | No |
protect_transaction | Binding policy enforcement decision (approve or deny) | No | Yes |
verify_receipt | Verify execution receipt hash integrity | No | No |
explain_decision | Human-readable explanation of a decision with reason codes | Yes | No |
MCP boundaries
The direct REST API flow for bots that integrate without MCP.
Submit one intent for simulation and policy evaluation before execution.
/v1/bot/preflightRank multiple candidate intents to find the best option based on policy score and simulated outcome.
/v1/bot/preflight/compareEstimate safe throughput and batch sizes within current quota limits.
/v1/bot/quota/planSelect and execute the highest-ranking option. This mutates state and produces a transaction.
/v1/bot/execute-bestCheck _meta.upgrade in responses to detect quota pressure and upgrade recommendations.
Any bot endpointRequest a plan upgrade if policy permits. Blocked upgrades return a deterministic denial.
/v1/bot/self-upgradeAll endpoints available for agent integration.
| Method | Endpoint | Purpose | Read-Only | Mutates State |
|---|---|---|---|---|
| POST | /v1/bot/preflight | Simulate one intent against policy | Yes | No |
| POST | /v1/bot/preflight/compare | Rank multiple candidate intents | Yes | No |
| GET | /v1/bot/quota/plan | Estimate safe throughput within quota | Yes | No |
| POST | /v1/bot/quota/plan-batch | Estimate safe batch size within quota | Yes | No |
| POST | /v1/bot/execute-best | Select and execute the best option | No | Yes |
| POST | /v1/bot/self-upgrade | Request free-to-pro plan upgrade | No | Yes |
| GET | /v1/bot/upgrade/status | Check current plan and upgrade eligibility | Yes | No |
Bots may receive _meta.upgrade in responses when approaching or exceeding quota limits. This signal includes:
recommended: true when upgrade would helpreason indicating the trigger (e.g., quota_near_limit)upgrade_endpoint pointing to self-upgradeSelf-upgrade requests may be blocked by operator policy. When blocked, the response includes:
allowed: falsereason such as self_serve_upgrade_disabled or monetization_disablednext_action: contact_operatorWhen blocked, bots should stop retrying and follow next_action.
Key resources for agent discovery and integration.
Create scoped API keys for API, CLI, and MCP access from a single self-serve flow.
For API and CLI testing, use a minimum set of read-only scopes:
atf:probeatf:simulateatf:verifyatf:explainFor MCP access, add atf:mcp.
A single customer API key works across all surfaces. Pass it as the X-API-Key header for REST calls and MCP JSON-RPC requests, or set the ATF_API_KEY environment variable for the CLI.
If the key is exposed, rotate or revoke it immediately from /customer/keys.
Canonical environment conventions and self-verification steps for zero-human bot setup.
ATF_API_KEY~/.openclaw/secrets/atf.envsource ~/.openclaw/secrets/atf.envvalid:false confirms authisError:false confirms MCP accessatf --help— confirms CLI surfaceIf OpenClaw exec policy blocks a CLI command, that is environment friction, not an ATF failure.
Start with the sandbox or request early access for production integration.