Your limits are public
Plaintext spending caps and allowlists on-chain are observable, front-runnable, and exploitable. The agent's competitor sees exactly where it stops.
Learn moreConfidential wallet layer for AI agents
Set a private spending limit on a Solana smart-wallet PDA. Jupiter DCA and Ika dWallet signings all pass the same on-chain policy gate, nothing leaks, nothing bypasses.
F7Xd…rS99p49+ tests passingJupiter + Ika devnet verifiedBuilt on · Integrated with
By the numbers
Tests passing
Frontend TS suite
Contract instructions
Single program ID
Execution rails
Jupiter + Ika
Policy gate
Confidential, on-chain
The delegation problem
Giving your agent a wallet means giving up everything, spending, allowlists, cross-chain signing, all under one key. Three structural problems every team rebuilds from scratch:
Plaintext spending caps and allowlists on-chain are observable, front-runnable, and exploitable. The agent's competitor sees exactly where it stops.
Learn moreA trusted proxy that enforces your policy is a single compromise away from losing it. One leaked server key and the guardrail is gone.
Learn moreA dWallet that approves any message means a compromised agent can drain bridgeless assets through rails your policy never saw.
Learn moreThree rails. One gate.
Encrypt keeps the limits private. Ika carries the signing across chains. Jupiter routes the trade. All three pass through the same on-chain gate before a single lamport moves.
Encrypt
Max-per-run and daily-cap stay encrypted on-chain. The contract enforces the guardrail before any spend without ever revealing your private thresholds, built against Encrypt pre-alpha.
Ika
After Polet policy approves, the contract CPI-calls Ika `approve_message` so a dWallet can sign multi-chain intents. No bridge, no asset wrapping, pure cryptographic signing.
Jupiter
Tokens v2, Price v3, and Swap v2 build composed into a route preview. The smart wallet PDA executes the approved instruction with raw control, no off-chain signing trust.
Try it · no wallet needed
Run the three demo outcomes against a mock API. The block scenario shows how Polet rejects an over-limit agent action without revealing your private threshold.
Watch the policy gate evaluate confidential numbers, the agent’s amounts and routes glitch into ciphertext, the gate evaluates blind, and only you can decrypt.
Security model
Polet's smart wallet PDA, session-key model, anti-replay, and multisig-lite quorum compose into one defensive system that no single party can override.
Assume the agent is compromised. Assume the proxy is compromised. Assume a session key leaks. Polet's smart-wallet PDA still owns the funds, the confidential policy still blocks over-limit spends, and policy_seq still rejects replayed attestations.
Funds custody under a program-derived address. The contract, not the agent, controls execution.
Temporary signing authority with expires_at and granted_slot. Revoke single keys or all sessions in one tx.
policy_seq increments on every change. Stale attestations are rejected before any spend.
Optional M-of-N quorum for Ika approvals. Recovery authority rotates compromised sessions and dWallet controllers.
Next steps
Connect a devnet wallet, set a confidential policy, grant an agent session key, and run the three demo outcomes.