Overview
LuckyLobster uses two authentication systems:- User Authentication - For accessing the dashboard (email/password, social login, passkeys)
- API Key Authentication - For agent/programmatic access to the trading API
User Authentication
Supported Methods
Email & Password
Traditional email/password with optional 2FA
Social Login
Google, GitHub, and more
Passkeys
Biometric authentication (Face ID, Touch ID, Windows Hello)
Magic Links
Passwordless email login
Two-Factor Authentication (2FA)
We strongly recommend enabling 2FA for additional security:- Go to Dashboard > Settings > Security
- Click Enable 2FA
- Scan the QR code with your authenticator app (Google Authenticator, Authy, etc.)
- Enter the verification code to confirm
API Key Authentication
Creating an API Key
- Navigate to Dashboard > API Keys
- Click Create New API Key
-
Configure:
- Name: Descriptive name (e.g., “ClawdBot Production”)
- Permissions: Select required scopes
- Budget Limit: Maximum spending allowed
- Rate Limit: Requests per minute
- Expiration: Optional expiry date
- Click Create
- Copy the key immediately - it’s only shown once!
API Key Format
- Prefix:
ll_live_(production) orll_test_(sandbox) - Length: 64 characters total
Using API Keys
Include your API key in theAuthorization header:
Permission Scopes
| Scope | Description | Endpoints |
|---|---|---|
read | Read-only access | Markets, balance, positions, order history |
trade | Place and cancel orders | POST /orders, DELETE /orders |
redeem | Redeem settled markets | POST /settlements/redeem |
admin | Full account access | All endpoints |
Rate Limiting
Each API key has configurable rate limits:- Default: 100 requests/minute
- Headers: Check
X-RateLimit-*headers in responses
429 Too Many Requests response:
Budget Limits
API keys can have spending limits:| Setting | Description |
|---|---|
budgetLimit | Maximum total USDC spend |
budgetUsed | Amount already spent |
budgetPeriod | Reset period (daily, weekly, monthly, never) |
Revoking API Keys
To revoke an API key:- Go to Dashboard > API Keys
- Find the key you want to revoke
- Click the Revoke button
- Confirm the action
Security Best Practices
Never expose API keys in client-side code
Never expose API keys in client-side code
API keys should only be used server-side or in secure agent environments.
Never include them in browser JavaScript, mobile apps, or public repositories.
Use separate keys for different agents
Use separate keys for different agents
Create dedicated API keys for each agent or use case.
This allows you to revoke access individually and track usage separately.
Set expiration dates
Set expiration dates
For temporary access, set an expiration date on your API keys.
Expired keys are automatically disabled.
Use conservative budget limits
Use conservative budget limits
Start with low budget limits and increase as needed.
This protects against bugs or unexpected agent behavior.
Rotate keys regularly
Rotate keys regularly
Periodically generate new keys and revoke old ones.
This limits the impact of any potential key compromise.
Wallet Security
Your Polymarket wallet private key is protected with:- AES-256-GCM encryption at rest
- Per-wallet unique IV (initialization vector)
- Server-side only decryption during order signing
- No client-side key exposure
Audit Logging
All sensitive operations are logged:- API key creation/revocation
- Order placement
- Wallet operations
- Login attempts
- Permission changes
API Reference
Auth Endpoints
Full API authentication documentation
