FlowAI Documentation
Everything you need to know about how FlowAI works, its architecture, security model, and how to use it.
Table of Contents
1. Overview
FlowAI is a revolutionary platform that bridges the gap between autonomous AI agents and cryptocurrency wallets. It enables users to run sophisticated AI agents on their existing crypto wallets while maintaining complete custody and control over their assets.
The Problem
Current DeFi automation solutions require users to give up custody of their assets or rely on centralized services. Manual trading is time-consuming and requires constant monitoring. There's no secure way to let AI agents manage crypto assets autonomously.
The Solution
FlowAI provides a secure, sandboxed environment where AI agents can suggest and execute transactions on your behalf, while you maintain full custody of your keys. A powerful policy engine ensures agents can only act within your defined parameters.
Key Concepts
- AI Agents: Autonomous programs that analyze market conditions and suggest transactions based on your strategies.
- Secure Enclaves: Isolated, hardware-backed environments where your private keys are stored and transactions are signed.
- Policy Engine: A rule-based system that validates every transaction against your predefined limits and constraints.
- Self-Custody: You maintain complete control over your private keys. FlowAI never has access to them.
2. How It Works
FlowAI operates through a secure, five-step process that ensures every transaction is validated, secure, and transparent.
Deploy agent
Choose from 50+ AI agents or connect your own custom agent to your wallet.
- Browse our marketplace of pre-built AI agents optimized for various DeFi strategies
- Deploy agents for trading, yield optimization, portfolio management, or arbitrage
- Connect custom agents built with popular AI frameworks (OpenAI, Anthropic, etc.)
- Configure agent parameters and initial capital allocation
Suggest transaction
Agent analyzes market conditions and suggests optimal transactions.
- AI agent continuously monitors blockchain data, market conditions, and opportunities
- Agent performs complex analysis using on-chain data, DEX prices, and market sentiment
- Transaction suggestions include detailed reasoning and risk assessment
- All suggestions are logged in real-time for full transparency
Policy engine
Your custom rules validate the transaction against spending limits and protocols.
- Define granular spending limits per transaction, per day, or per protocol
- Whitelist or blacklist specific protocols, tokens, or contract addresses
- Set risk parameters like maximum position size, leverage limits, and slippage tolerance
- Policy engine evaluates every transaction before execution
- Transactions that violate policies are automatically rejected
Secure enclave signing
Transaction is signed in an isolated, sandboxed secure enclave environment.
- Private keys never leave the secure enclave - they're generated and stored in isolation
- Hardware-backed security using Trusted Execution Environments (TEEs)
- Each transaction is cryptographically verified before signing
- Enclave is completely isolated from the agent execution environment
- Even if an agent is compromised, your keys remain secure
Executed onchain
Verified transaction is broadcast and executed on the blockchain.
- Signed transaction is broadcast to the blockchain network
- Real-time transaction status tracking and confirmation
- Complete transaction history logged for audit purposes
- Support for multiple blockchains (Ethereum, Solana, Polygon, etc.)
- Gas optimization and MEV protection built-in
Full Transparency
Every step of the process is logged and visible to you. You can see every transaction suggestion, policy evaluation result, and execution status in real-time through the FlowAI dashboard. This ensures complete transparency and allows you to audit agent behavior.
3. Features
Any AI Agent
Connect any AI agent whether it's for trading, yield optimization, or portfolio management. FlowAI works with all major AI frameworks.
Technical Details:
Supports OpenAI GPT models, Anthropic Claude, custom fine-tuned models, and agent frameworks like LangChain and AutoGPT.
Your Wallet, Your Keys
Maintain complete custody of your assets. FlowAI never has access to your private keys or seed phrases.
Technical Details:
Keys are generated and stored in hardware-backed secure enclaves. We use a zero-knowledge architecture where FlowAI cannot access your keys even if compromised.
Sandboxed Secure Enclave
Agents run in isolated, sandboxed secure enclaves. Your keys never leave the protected environment, ensuring maximum security.
Technical Details:
Built on Intel SGX secure enclaves. Each agent runs in its own isolated container with strict resource limits and network policies.
Granular Policy Engine
Set precise spending limits, approved protocols, and transaction types. Your rules, enforced automatically.
Technical Details:
Policy engine uses a declarative rule language. Rules are evaluated deterministically before every transaction. Supports complex conditions and multi-signature requirements.
Real-Time Execution
Lightning-fast transaction execution across multiple chains. Your AI agents operate at the speed of the market.
Technical Details:
Sub-second transaction processing with optimized gas strategies. Multi-chain support via cross-chain bridges and layer 2 solutions.
24/7 Automation
AI agents work around the clock, executing your strategies while you sleep. Never miss an opportunity again.
Technical Details:
Agents run continuously with automatic failover and health monitoring. Built-in circuit breakers prevent runaway agents.
4. Security Model
Zero-Knowledge Architecture
FlowAI uses a zero-knowledge architecture where your private keys are never exposed to our systems. Keys are generated, stored, and used exclusively within secure enclaves that we cannot access.
- Private keys generated using hardware random number generators
- Keys encrypted at rest using AES-256 encryption
- Secure enclaves provide hardware-backed isolation
Policy-Based Access Control
Every transaction must pass through your policy engine before execution. Policies are evaluated deterministically and cannot be bypassed.
Spending Limits
Set maximum amounts per transaction, per day, or per protocol
Protocol Whitelisting
Only allow transactions with approved protocols and contracts
Risk Parameters
Configure maximum position sizes, leverage limits, and slippage tolerance
Multi-Signature Support
Require multiple approvals for high-value transactions
Secure Enclave Technology
Secure enclaves provide hardware-backed security using Trusted Execution Environments (TEEs). These isolated environments ensure that even if the host system is compromised, your keys remain secure.
- Intel SGX secure enclave technology
- Memory encryption and attestation
- Remote attestation to verify enclave integrity
- Complete isolation from agent execution environment