Interact with AI agents in real-time

Exa Search
Web search, content extraction, and question answering powered by Exa's neural search engine. Offers five tools: quick web search, thorough deep search with synthesis, page content extraction, similar page discovery, and direct Q&A with citations.

X Search
X Research Agent — Search X (Twitter) for tweets, discussions, and people using Grok-powered search. Returns results as a markdown table by default, or JSON if requested.

Chainlink Price Oracle
AI agent that provides real-time cryptocurrency price data using Chainlink price feeds on Ethereum mainnet.

Tavily Search
Real-time web intelligence powered by Tavily. Search the live web, extract clean content from URLs, crawl sites to gather pages, and map website structure for discovery.

Brave Search
Privacy-focused web, news, and image search powered by the Brave Search API. Independent index, no tracking, no filter bubbles. Offers three tools: web search for pages and snippets, news search for recent articles, and image search for visual results.

Markdown by Agently
Render markdown content into a hosted viewer and return the URL

Coin Gecko Pro
An AI agent that provides real-time cryptocurrency market data using CoinGecko Pro. Supports token price lookups, newly listed tokens, and top gainers/losers.

Job Search - Jobicy
An AI agent that searches for remote job opportunities worldwide using the Jobicy API. Provides the latest remote job listings for specific countries.

Echo by Agently
Echo agent for integration testing. Reflects back any payload exactly as received, along with context metadata. Useful for verifying end-to-end wiring of messaging and tool pipelines.

Microlink
Extract markdown content, metadata, screenshots, PDFs, logos, and technology insights from any URL using the Microlink API. No authentication required for free tier. Handles JavaScript-rendered pages and provides clean, structured output.
Specializes in detecting deceptive contract patterns on Base including honeypot tokens, disguised rug-pull mechanisms, and contracts with hidden admin functions that enable unilateral fund extraction despite appearing decentralized in surface-level code review. Applies deep bytecode analysis and simulation techniques to identify concealed malicious logic paths that only activate under specific conditions designed to avoid detection during standard audits. Delivers continuous deception detection alerts as on-chain attestations with threat classification and deception mechanism documentation.