teleton-agent
AgentFreeTeleton: Autonomous AI Agent for Telegram & TON Blockchain
Capabilities16 decomposed
multi-turn agentic loop with tool-calling orchestration
Medium confidenceImplements a 5-iteration maximum agentic loop via AgentRuntime.processMessage() that accepts user messages, routes them through an LLM provider (15+ supported via @mariozechner/pi-ai), parses tool-call responses, executes registered tools with argument validation, and returns final responses. Uses a schema-based function registry where each tool declares input/output types and scopes, enabling the LLM to autonomously decide which of 125+ built-in tools to invoke based on user intent and conversation context.
Combines observation masking (hiding sensitive tool outputs from LLM context) with Reciprocal Rank Fusion-based memory retrieval, allowing the agent to reason over historical context without exposing raw blockchain data or private keys to the LLM
Unlike LangChain or LlamaIndex agents that require explicit chain definitions, Teleton's agentic loop is implicit in the message processing pipeline and natively integrated with Telegram MTProto, eliminating middleware overhead
hybrid rag memory with sqlite-vec and fts5 fusion
Medium confidenceImplements a dual-index memory system using SQLite with sqlite-vec extension for semantic similarity search (cosine distance on embeddings) and FTS5 for full-text BM25 ranking, fused via Reciprocal Rank Fusion (RRF). Automatically compacts old messages via CompactionManager, which summarizes conversation segments using the LLM and replaces them with condensed entries, maintaining a bounded context window while preserving semantic information. Supports configurable embedding providers (OpenAI, Ollama, local) and stores all data locally in a single SQLite file.
Combines semantic search (sqlite-vec) with BM25 full-text search (FTS5) and fuses results via RRF, then applies AI-driven auto-compaction that summarizes old context rather than discarding it, preserving semantic information across long conversations
Pinecone or Weaviate require cloud infrastructure and API calls; Teleton's local sqlite-vec approach eliminates network latency and keeps all memory on-device, while RRF fusion outperforms single-index retrieval for mixed semantic/keyword queries
session management with automatic reconnection and state recovery
Medium confidenceManages Telegram session persistence via session.json (encrypted) or phone number + 2FA, with automatic reconnection on network failures. Implements exponential backoff for reconnection attempts and state recovery to resume message processing after interruptions. The SessionStore class handles session serialization and encryption, and the TelegramBridge manages connection lifecycle and event routing.
Implements encrypted session persistence with automatic reconnection and exponential backoff, enabling the agent to survive network interruptions and crashes without manual re-authentication
GramJS provides basic session management; Teleton's wrapper adds automatic reconnection, state recovery, and encrypted storage, improving reliability for production deployments
multi-provider llm abstraction with 15+ model support
Medium confidenceAbstracts LLM provider differences via @mariozechner/pi-ai, supporting 15+ providers (OpenAI, Anthropic, Ollama, Groq, Together, Mistral, etc.) and 70+ models. The LLM provider is configured in config.yaml and can be switched at runtime without code changes. Implements provider-agnostic message formatting, token counting, and error handling. Supports streaming responses and function calling across all providers with normalized schemas.
Leverages @mariozechner/pi-ai to provide a unified interface across 15+ LLM providers and 70+ models, enabling provider switching via config.yaml without code changes and supporting both proprietary and open-source models
LangChain's LLM abstraction is less complete; Teleton's pi-ai integration provides broader provider coverage and simpler configuration-based switching
journal system for transaction and operation auditing
Medium confidenceMaintains an immutable audit log (Journal) of all significant operations: tool executions, blockchain transactions, message sends, and configuration changes. Each journal entry includes timestamp, user, operation type, parameters, and result. The journal is stored in SQLite and queryable via workspace tools. Supports filtering by operation type, user, or date range. Integrates with access control to ensure users can only view their own operations (unless admin).
Provides an immutable audit log integrated with access control, enabling compliance-grade operation tracking without requiring external logging infrastructure
Most agent frameworks lack built-in audit logging; Teleton's journal system provides out-of-the-box compliance support
dex integration with ston.fi and dedust swap execution
Medium confidenceIntegrates with STON.fi and DeDust decentralized exchanges to enable the agent to execute token swaps autonomously. Implements price quote fetching, slippage calculation, and transaction building for both DEXes. Supports jetton-to-jetton swaps and includes built-in tools for querying liquidity pools and swap rates. All swaps are executed via the TON wallet with transaction signing and blockchain confirmation.
Provides native STON.fi and DeDust integration with quote fetching and transaction building, enabling autonomous DEX swaps without external APIs or middleware
Web3.py or ethers.js require manual DEX interaction; Teleton's built-in DEX tools abstract away quote fetching and transaction building
nft and dns operations on ton
Medium confidenceSupports NFT operations (querying collections, checking ownership, transferring NFTs) and TON DNS operations (resolving DNS names to addresses, registering domains, managing DNS records). Implements tools for NFT metadata retrieval, transfer execution, and DNS name resolution. All operations are executed via the TON blockchain with transaction signing.
Provides native TON NFT and DNS tools integrated with the wallet system, enabling autonomous NFT management and DNS operations without external APIs
Most blockchain agents lack TON-specific NFT/DNS support; Teleton's built-in tools provide native TON ecosystem integration
deals system for multi-step transaction workflows
Medium confidenceImplements a Deals system that enables the agent to coordinate multi-step workflows involving multiple parties or transactions. A deal is a structured agreement with defined steps, participants, and conditions. The agent can propose deals, track their status, and execute steps as conditions are met. Deals are stored in the workspace and can be queried or modified via tools.
Provides a structured deals system for coordinating multi-step workflows with participant tracking and condition-based execution, enabling complex transaction orchestration
Most agent frameworks lack built-in workflow coordination; Teleton's deals system provides out-of-the-box support for multi-step transactions
mtproto userbot integration via gramjs layer 222
Medium confidenceOperates as a real Telegram user account (not a bot) by implementing the MTProto protocol through GramJS Layer 222, enabling the agent to send/receive messages, join groups, manage chats, and access user-only features. Wraps GramJS in a TelegramBridge class that handles session persistence (phone number or session.json), automatic reconnection, event routing to the message processing pipeline, and inline query handling via Grammy. Supports both direct messages and group chats with configurable access control policies per workspace.
Uses GramJS Layer 222 (MTProto) to operate as a real user account rather than a bot, enabling access to user-only Telegram features and group participation without bot API limitations, while maintaining session persistence via encrypted session.json storage
Telegram Bot API is restricted to bot accounts and lacks group participation features; Teleton's MTProto userbot approach enables full user-level functionality, though with higher risk of rate-limiting
native ton blockchain wallet and transaction execution
Medium confidenceIntegrates TON blockchain operations through a W5R1 wallet implementation that signs and broadcasts transactions directly from the agent. Supports jetton transfers, NFT operations, DEX swaps (STON.fi, DeDust), DNS operations, and signed message verification. Implements a TON Proxy layer that manages wallet state, validates transaction parameters, and enforces tool-scope permissions before execution. All private keys are stored encrypted in the workspace secrets store, and transactions are auditable via the Journal system.
Implements W5R1 wallet with encrypted key storage and tool-scope permission enforcement, allowing the agent to autonomously execute blockchain transactions while maintaining audit trails via the Journal system and preventing unauthorized operations through access control policies
Web3.js or ethers.js require external wallet management; Teleton's native TON integration with encrypted key storage and permission scoping provides self-custody with built-in security controls
plugin sdk with typescript-first extensibility
Medium confidenceProvides @teleton-agent/sdk, a TypeScript SDK that enables developers to create plugins that extend the agent with custom tools, LLM providers, or Telegram handlers. Plugins are loaded dynamically at runtime via the plugin system, which discovers plugins from npm packages or local directories, validates their schemas, and registers their tools into the global tool registry. Each plugin has access to namespaced SDK methods (Telegram, TON, Memory, Workspace) and can declare dependencies, permissions, and configuration schemas. Plugins are sandboxed via workspace isolation and subject to module-level permission checks.
Provides a TypeScript-first SDK with namespaced access to Telegram, TON, Memory, and Workspace APIs, combined with workspace-level sandboxing and permission enforcement, enabling safe third-party plugin development without core modifications
LangChain tools require manual registration; Teleton's plugin SDK provides automatic discovery, schema validation, and permission scoping, making it easier to build and distribute reusable extensions
mcp (model context protocol) client with multi-transport support
Medium confidenceIntegrates with external MCP servers via stdio, SSE (Server-Sent Events), or HTTP transports, allowing the agent to access tools and resources exposed by MCP-compatible services. The MCP client is initialized during TeletonApp startup, discovers available tools from connected servers, and registers them into the global tool registry alongside built-in tools. Supports multiple concurrent MCP connections, each with independent transport configuration and tool namespacing.
Supports three MCP transport types (stdio, SSE, HTTP) with independent configuration per connection, enabling flexible integration with diverse MCP server deployments while maintaining a unified tool registry
LangChain's MCP support is limited to stdio; Teleton's multi-transport approach enables integration with cloud-hosted MCP servers via HTTP/SSE without requiring local processes
access control and permission scoping per tool and module
Medium confidenceImplements a fine-grained access control system where each tool declares a scope (e.g., 'telegram:send', 'ton:transfer', 'memory:write') and each workspace defines access control policies that grant or deny scopes to specific users or groups. The system enforces permissions at tool execution time via the ToolExecutor, preventing unauthorized operations. Supports role-based access control (RBAC) via admin commands and per-module permission checks. Integrates with input sanitization to prevent prompt injection attacks that might bypass permission checks.
Combines tool-level scope declarations with workspace-level access control policies and input sanitization, enabling fine-grained permission enforcement while defending against prompt injection attacks that might attempt to bypass controls
Most agent frameworks lack built-in access control; Teleton's scope-based system with RBAC and audit logging provides production-grade permission management out of the box
input sanitization and prompt injection defense
Medium confidenceImplements multi-layer input sanitization to defend against prompt injection attacks. Sanitizes user messages before passing them to the LLM, validates tool arguments against declared schemas, and masks sensitive outputs (private keys, transaction hashes) before returning them to the LLM context. Uses a combination of regex-based filtering, schema validation, and observation masking to prevent attackers from manipulating the agent's behavior through crafted prompts or tool outputs.
Combines regex-based message sanitization, schema-based argument validation, and observation masking to create a multi-layer defense against prompt injection, while maintaining usability by only masking sensitive outputs rather than blocking entire message classes
Most LLM frameworks lack built-in prompt injection defense; Teleton's multi-layer approach with observation masking provides protection without requiring external security middleware
workspace and personality configuration with yaml schema
Medium confidenceManages agent configuration via a single config.yaml file that defines workspace settings (name, personality, LLM provider, embedding provider), Telegram credentials, TON wallet configuration, tool enablement, plugin loading, and access control policies. The configuration is validated against a JSON schema at startup, and changes can be applied via the WebUI configuration interface or CLI. Supports environment variable substitution for secrets (API keys, phone numbers) to enable secure deployment without hardcoding credentials.
Provides a single config.yaml file that centralizes all agent configuration (workspace, LLM, Telegram, TON, plugins, access control) with JSON schema validation and environment variable substitution, enabling reproducible deployments
LangChain requires programmatic configuration; Teleton's YAML-based approach enables non-technical users to configure agents and supports infrastructure-as-code patterns
webui dashboard with real-time monitoring and configuration
Medium confidenceProvides an optional Hono + React web interface (localhost:7777 by default) that displays agent status, message history, tool execution logs, and memory statistics in real-time. Enables configuration changes via the UI (LLM provider, tool enablement, access control policies), plugin marketplace browsing, and setup wizard for initial configuration. The dashboard connects to the agent via a REST API and WebSocket for real-time updates.
Combines real-time monitoring (WebSocket-based message and log streaming) with configuration UI and plugin marketplace, providing a complete management interface without requiring CLI or YAML editing
LangChain lacks a built-in dashboard; Teleton's WebUI provides out-of-the-box visibility and configuration capabilities, reducing operational overhead
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with teleton-agent, ranked by overlap. Discovered automatically through the match graph.
ragflow
RAGFlow is a leading open-source Retrieval-Augmented Generation (RAG) engine that fuses cutting-edge RAG with Agent capabilities to create a superior context layer for LLMs
RAGFlow
RAG engine for deep document understanding.
MiniMax: MiniMax M2
MiniMax-M2 is a compact, high-efficiency large language model optimized for end-to-end coding and agentic workflows. With 10 billion activated parameters (230 billion total), it delivers near-frontier intelligence across general reasoning,...
@blade-ai/agent-sdk
Blade AI Agent SDK
Mastra
TypeScript AI framework — agents, workflows, RAG, and integrations for JS/TS developers.
Anthropic: Claude Opus 4.7
Opus 4.7 is the next generation of Anthropic's Opus family, built for long-running, asynchronous agents. Building on the coding and agentic strengths of Opus 4.6, it delivers stronger performance on...
Best For
- ✓Teams building autonomous Telegram bots that need to execute blockchain transactions, fetch data, and respond intelligently
- ✓Developers creating self-hosted agents that must operate without cloud dependencies
- ✓Solo developers building self-hosted agents that must operate without cloud storage
- ✓Teams requiring GDPR/data-residency compliance — all memory stays local
- ✓Production deployments requiring high availability
- ✓Self-hosted agents that must survive network outages
- ✓Teams wanting flexibility in LLM provider selection
- ✓Developers building cost-optimized agents that can switch providers dynamically
Known Limitations
- ⚠Maximum 5 tool-call iterations per message — complex multi-step workflows may require external orchestration
- ⚠Tool execution is sequential, not parallel — concurrent operations require custom tool implementation
- ⚠No built-in rollback mechanism — failed tool calls are logged but not automatically reversed
- ⚠Embedding generation adds latency (~100-500ms per message depending on provider) — not suitable for sub-100ms response requirements
- ⚠RRF fusion requires tuning of k-parameter for optimal ranking — default may not suit all use cases
- ⚠Auto-compaction uses LLM tokens — high-volume agents may see increased API costs
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
Repository Details
Last commit: Apr 17, 2026
About
Teleton: Autonomous AI Agent for Telegram & TON Blockchain
Categories
Alternatives to teleton-agent
Are you the builder of teleton-agent?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →