Logrunner turns EVM event logs into evidence-backed agent answers and monitors.
Logrunner is a Web3 intelligence runtime that lets an agent use decoded blockchain event logs as evidence to answer user inquiries. Rather than guessing / hallucinating or asking the user to inspect block explorers manually, Logrunner gives the agent typed tools for querying EVM event history, reconstructing event-sourced state, comparing data across chains, as well as the ability to respond to events that occur on the blockchain by registering webhook-backed monitors.
The demo focuses on Arbitrum governance after the KelpDAO exploit, where the Arbitrum Security Council froze about 30,765 ETH. The agent can provide an overview of the incident, verify what live event data does and does not prove, check whether a release proposal has reached onchain governance, and set a webhook monitor for the next relevant smart contract event. As a broader capability example, it can also reconstruct top ARB holders on Ethereum from ERC-20 Transfer events.
Note: The bot is deployed to the Discord using a cloud VM, but due to current model size and token-output limitations imposed by the 0G-hosted inference path, testing indicates that live Discord performance may be significantly less reliable than the local/recorded demo path.
Logrunner is built as a TypeScript / Node.js runtime with a stdio MCP server that plugs into NanoClaw, the Discord/chat agent harness. The core runtime exposes blockchain intelligence tools instead of allowing the model author random API calls.
MultiBaas is a blockchain development server that provides the live EVM indexing, decoded event queries, contract / address registry, webhooks, and serves as the backend queries to Ethereum Mainnet and Arbitrum One.
The architecture has a few layers:
NanoClaw handles chat sessions and inference model provider plumbing. I used a lightly modified NanoClaw fork.
0G Compute is used for the hosted inference path.
As for hacky but noteable, I would say the tool call “receipt block” style qualifies. The agent answers include compact event_query or monitor_activation blocks so users can see what tool was used, what fields mattered, and what evidence boundary applies.

