MCP Hub
Back to servers

ag402-mcp

Ag402 is the payment layer for Coinbase's x402 protocol. Wrap any API or MCP server with a paywall in one command (ag402 serve), or let your AI agent auto-pay for paid APIs (ag402 run). Zero code changes for both buyers and sellers. Solana USDC, ~0.5s settlement, non-custodial, 648+ tests, MIT licensed. Works with Claude Code, Cursor, OpenClaw, LangChain, AutoGen, CrewAI out of the box.

glama
Stars
6
Forks
2
Updated
Mar 11, 2026
Validated
Mar 13, 2026

Ag402

Give your AI agent a wallet. It pays for APIs automatically.

GitHub Stars  PyPI Downloads  CI

Tests Coverage Security Audits Python Node.js PyPI License Last Commit

Open In Colab


Ag402 is the payment layer for the Coinbase x402 protocol. It makes AI agents pay for API calls automatically — on Solana, in USDC, with zero code changes.

Agent calls API → 402 Payment Required → Ag402 auto-pays USDC on Solana → 200 OK

Non-custodial. Zero telemetry. Already in production.


Why Ag402

Zero friction

  • Zero code changes for buyers, sellers, and MCP developers
  • One command to start paying: ag402 run -- python my_agent.py
  • One command to start selling: ag402 serve --target ... --price ... --address ...
  • One command to install MCP tools: ag402 install claude-code
  • No config files, no API keys, no accounts, no signup
  • Colab one-click demo — try it in your browser, zero install

Open standard

  • Implements Coinbase x402 — the emerging HTTP payment standard
  • MIT licensed, fully open source, extensible protocol layer (open402) with zero dependencies
  • AI-native docs — ships with llms.txt so LLM agents can read the full CLI reference natively

Battle-tested

  • Token RugChecklive on Solana mainnet with real USDC payments
  • 748+ tests, 90%+ coverage, 4 rounds of internal security review (24/24 issues fixed)
  • Multi-endpoint RPC failover + circuit breaker + async delivery retry

Blazing fast

  • ~0.5s standard payment (confirmed finality, not 13s finalized)
  • ~1ms prepaid payment (local HMAC, no on-chain call)
  • Zero overhead on non-402 requests — no body read, no allocation
  • Connection pooling, lazy imports, SQLite WAL mode

Security-first

  • 6-layer budget protection — per-tx / per-minute / daily / circuit breaker / rollback / key redaction
  • Non-custodial — private keys never leave your machine
  • Seller-No-Key — sellers only need a public address, zero private key risk
  • Zero telemetry — no tracking, no IP logging, no analytics
  • Wallet encryption: PBKDF2 (480K iter) + AES
  • CI: CodeQL + Trivy + pip-audit + Semgrep + OpenSSF Scorecard

Universal compatibility

  • Claude Code, Cursor, Claude Desktop — MCP auto-config
  • OpenClaw — native Skill (SKILL.md + TOOLS.md + skill.py), not just MCP
  • LangChain, AutoGen, CrewAI, Semantic Kernel — works automatically
  • Any Python agent using httpx or requests — zero changes
  • TypeScript/Node.js agents@ag402/fetch npm package, zero dependencies

Zero Code Changes. For Everyone.

You are...What you doCode changes
Agent user (LangChain, CrewAI, AutoGen, any Python agent)pip install ag402-core && ag402 run -- python my_agent.pyZero — your agent code is untouched
TypeScript/Node.js agent developernpm install @ag402/fetch — wrap fetch() with createX402Fetch()~2 lines — replace fetch with createX402Fetch(...)
Claude Code / Cursor userag402 install claude-code (or cursor)Zero — MCP tools appear automatically
OpenClaw userag402 install openclawZero — native Skill + MCP, auto-configured
API seller (monetize your API)ag402 serve --target http://your-api:8000 --price 0.05 --address <Addr>Zero — reverse proxy handles everything
MCP server developerag402 serve --target http://your-mcp:3000 --price 0.01 --address <Addr>Zero — wrap your existing MCP server, instant paywall

No config files. No API keys. No accounts. Minimal code changes.


Try It Now

Python (zero code changes):

pip install ag402-core
ag402 init       # Creates wallet + $100 test USDC — zero prompts
ag402 demo       # Watch the full payment flow end-to-end

TypeScript/Node.js:

npm install @ag402/fetch
import { createX402Fetch, InMemoryWallet } from "@ag402/fetch";
const apiFetch = createX402Fetch({ wallet: new InMemoryWallet(100) }); // $100 budget
const res = await apiFetch("https://paid-api.example.com/data");
// 402 → auto-pays USDC → retries → 200 OK

Claude Code / Cursor:

pip install ag402-core ag402-client-mcp && ag402 install claude-code

Sell your API (zero code changes):

pip install ag402-core ag402-mcp && ag402 serve --target http://your-api:8000 --price 0.05 --address <Addr>

Or zero install (Python): Open In Colab


Already in Production

Token RugCheck

Live on Solana mainnet. AI agents pay $0.02 USDC per audit to detect rug pulls before purchasing tokens.

  • Three-layer audit: machine verdict → LLM analysis → raw on-chain evidence
  • Seller: ag402 serve — zero code changes to the audit API
  • Buyer: ag402_core.enable() — agents auto-pay, zero code changes
  • Try it now: curl -I https://rugcheck.aethercore.dev/v1/audit/DezXAZ8z7PnrnRJjz3wXBoRgixCa6xjnB7YaB1pPB263
Agent → GET /v1/audit/{token}
     ← 402 Payment Required ($0.02)
     → Ag402 pays USDC on Solana
     → Retries with tx_hash proof
     ← 200 OK + full audit report

Not a demo. Real USDC, real Solana mainnet, real users, already running.


How It Works

For Agent Users — Zero Code Changes

Your agent already uses httpx or requests under the hood. Ag402 patches them transparently:

# Option A: CLI wrapper (easiest — zero code changes)
ag402 run -- python my_agent.py

# Option B: One-liner in code
import ag402_core; ag402_core.enable()

That's it. Every HTTP 402 response is now intercepted → paid → retried automatically. Your agent code stays completely untouched.

Works with LangChain, AutoGen, CrewAI, Semantic Kernel, and any framework built on httpx or requests.

For Claude Code / Cursor / OpenClaw — One Command

pip install ag402-core ag402-client-mcp
ag402 install claude-code    # or: cursor / claude-desktop / openclaw

Restart your tool. Three MCP tools appear:

MCP ToolWhat It Does
fetch_with_autopayHTTP request → auto-pays 402 APIs
wallet_statusCheck USDC balance + budget usage
transaction_historyView recent payments

OpenClaw gets the deepest integration — Ag402 ships as a native OpenClaw Skill (SKILL.md + TOOLS.md + skill.py), not a wrapper. The skill registers natively in OpenClaw's skill system, with full tool definitions, prepaid support, and auto-fallback.

For TypeScript/Node.js Developers — Two Lines

npm install @ag402/fetch
import { createX402Fetch, InMemoryWallet } from "@ag402/fetch";

const apiFetch = createX402Fetch({
  wallet: new InMemoryWallet(100), // $100 budget
  config: { maxAmountPerCall: 1.00, maxTotalSpend: 50.00 },
});

const res = await apiFetch("https://paid-api.example.com/data");
// 402 Payment Required → auto-pays → retries → 200 OK

Swap InMemoryWallet with your own Wallet implementation and MockPaymentProvider with @ag402/solana (coming soon — see Roadmap) for real on-chain payments. Zero runtime dependencies — Node.js 18+, Bun, Deno.

For API Sellers — Zero Code Changes

pip install ag402-core ag402-mcp
ag402 serve --target http://localhost:8000 --price 0.05 --address <YourSolanaAddress>

Your existing API runs untouched behind a reverse proxy. The proxy:

  • Returns 402 + x402 challenge to unpaid requests
  • Verifies payment on-chain (no private key needed — seller only provides a public address)
  • Proxies paid requests through to your API
  • Handles replay protection, rate limiting, header sanitization

MCP server developers: same command, same result. Wrap your MCP server, get a paywall instantly.


Performance

MetricValueHow
Payment latency~0.5sconfirmed finality — 26x faster than finalized (~13s)
Prepaid latency~1msLocal HMAC-SHA256 — no on-chain call at all
Non-402 overheadZeroChecks status code only — no body read, no allocation, no latency
RPC resilienceMulti-endpointExponential backoff → auto-failover to backup RPC → circuit breaker
Delivery guaranteeAsync retryPayment succeeds but upstream fails? Background worker retries with backoff

Prepaid System — From 500ms to 1ms

The problem: Standard x402 payments require an on-chain Solana transaction for every API call (~0.5s + gas fee). For high-frequency agents making hundreds of calls per hour, this adds up in both latency and cost.

The solution: Buy a prepaid credit pack with one on-chain payment, then use HMAC credentials for subsequent calls — zero gas, ~1ms latency.

Buy:  Agent → one Solana payment → gets HMAC-SHA256 credential (N calls / M days)
Use:  Agent → X-Prepaid-Credential header → local HMAC verify → 200 OK   ← no chain, ~1ms

5 Prepaid Tiers

PackageDurationCallsPrice (USDC)Cost per Call
Starter3 days100$1.50$0.015
Basic7 days500$5.00$0.010
Pro30 days1,000$8.00$0.008
Business365 days5,000$35.00$0.007
Enterprise730 days10,000$60.00$0.006

How it works

  1. Buyer purchases a prepaid pack → one Solana tx → receives HMAC credential
  2. Each API call includes X-Prepaid-Credential header → server verifies HMAC locally (~1ms)
  3. No on-chain tx needed per call → zero gas fees after initial purchase
  4. Auto-fallback to standard x402 payment when prepaid credits are exhausted

Quick Start (Buyer)

# Purchase a prepaid pack from any ag402 gateway
ag402 prepaid buy https://your-gateway.example.com p3d_100

# Check your credentials
ag402 prepaid status

Available package IDs: p3d_100 (Starter), p7d_500 (Basic), p30d_1000 (Pro), p365d_5000 (Business), p730d_10k (Enterprise).

In production mode (real USDC), ag402 prepaid buy will:

  1. Show the package price and seller address
  2. Ask Confirm payment? [Y/n]
  3. Broadcast the USDC on-chain automatically
  4. Store the credential at ~/.ag402/prepaid_credentials.json

If the gateway times out after payment is broadcast, your credential is not lost — retry or recover:

# Retry automatically picks up the last in-flight purchase
ag402 prepaid recover https://your-gateway.example.com

# Or provide explicit tx_hash and package_id if needed
ag402 prepaid recover https://your-gateway.example.com <tx_hash> <package_id>
# Manage credentials
ag402 prepaid status   # View all credentials grouped by seller (calls remaining / expiry)
ag402 prepaid purge    # Remove expired or depleted credentials

Seller Setup

# Start gateway with prepaid support
ag402 serve --target http://localhost:8000 \
            --price 0.01 \
            --address <YourSolanaAddress> \
            --prepaid-signing-key <secret-key>

# Or via environment variable
AG402_PREPAID_SIGNING_KEY=<secret-key> ag402 serve --target http://localhost:8000 --price 0.01 --address <Addr>

Buyers can then discover packages at GET /prepaid/packages and purchase at POST /prepaid/purchase.

Security

  • HMAC-SHA256 signatures prevent credential forgery
  • Constant-time comparison prevents timing attacks
  • Credentials are scoped per buyer-seller pair
  • Server-side cache (5 min TTL) for repeat verification

Security — Built for Real Money

Your agent holds private keys and moves real USDC. Security is not a feature — it's the foundation.

4 rounds of internal security review · 24 issues found, 24 fixed · 109 dedicated security TDD tests · 748+ total tests · 90%+ coverage

6-Layer Budget Protection

LayerWhat It DoesDefault
Per-transaction capHard ceiling on single payment$5.00
Per-minute rate limitDollar + count cap$2.00 / 5 txns
Daily spend capMaximum daily spend$10.00 (ceiling: $1,000)
Circuit breakerAuto-stop after consecutive failures3 fails → 60s cooldown
Auto-rollbackInstant reversal on failed paymentsAlways on
Key redactionPrivate keys scrubbed from all logsAlways on

Architecture Principles

PrincipleHow
Non-custodialPrivate keys never leave your machine. No server. No account.
Seller-No-KeySellers only need a public address — zero private key risk
Wallet encryptionPBKDF2-HMAC-SHA256 (480K iterations) + Fernet/AES
Zero telemetryNo tracking, no IP logging, no analytics. Period.
Replay protectionTimestamp + nonce + persistent tx_hash dedup (SQLite)
SSRF protectionBlocks private IPs, non-HTTPS, reserved ranges
Header sanitizationStrips Cookie, X-Forwarded-For, Authorization before proxy

CI Pipeline (Every PR)

CodeQL · Trivy · pip-audit · Semgrep · 748+ tests · 90%+ coverage · OpenSSF Scorecard


Protocol

HTTP/1.1 402 Payment Required
WWW-Authenticate: x402 chain="solana" token="USDC" amount="0.05" address="..."

→ Client pays on-chain, retries with:

GET /data HTTP/1.1
Authorization: x402 tx_hash="abc123..." chain="solana" payer_address="..." request_id="..."

→ Server verifies on-chain → 200 OK

Compatible with the Coinbase x402 open payment standard.


Architecture

┌─────────────────────────────────────────────────────────────────┐
│  Your Agent (LangChain / CrewAI / AutoGen / any Python)        │
│  ┌──────────────────────────────────────────────────────────┐   │
│  │  ag402_core.enable()  ← monkey-patches httpx / requests  │   │
│  └──────────────┬───────────────────────────────────────────┘   │
│                 │ HTTP request                                   │
│                 ▼                                                │
│  ┌──────────────────────────┐    ┌────────────────────────┐     │
│  │  x402 Middleware         │───▶│  BudgetGuard (6 layers)│     │
│  │  Intercepts 402 response │    │  Circuit Breaker       │     │
│  └──────────┬───────────────┘    └────────────────────────┘     │
│             │ Pay                                                │
│             ▼                                                    │
│  ┌──────────────────────────┐    ┌────────────────────────┐     │
│  │  SolanaAdapter           │───▶│  RPC Failover          │     │
│  │  USDC transfer + verify  │    │  Exponential backoff   │     │
│  └──────────┬───────────────┘    └────────────────────────┘     │
│             │ tx_hash                                            │
│             ▼                                                    │
│  Retries with: Authorization: x402 tx_hash="..." chain="solana" │
└─────────────────────────────────────────────────────────────────┘
                              │
                              ▼
┌─────────────────────────────────────────────────────────────────┐
│  Seller Gateway  (ag402 serve)                                  │
│  ┌────────────┐  ┌──────────────┐  ┌────────────────────────┐  │
│  │ 402 + x402 │  │ On-chain     │  │ Replay Guard           │  │
│  │ Challenge   │  │ Verification │  │ Rate Limiter           │  │
│  └────────────┘  └──────────────┘  │ Header Sanitization    │  │
│                                     └────────────────────────┘  │
│  → Proxies to your API (unchanged)                              │
└─────────────────────────────────────────────────────────────────┘

Full architecture diagrams & state machines → docs/architecture_state.md


Packages

PackageRegistryRole
open402PyPIProtocol standard — zero dependencies
ag402-corePyPIPayment engine + CLI + wallet (buyer)
ag402-mcpPyPIReverse-proxy gateway (seller) — zero code changes
ag402-client-mcpPyPIMCP client for AI tools (buyer)
@ag402/fetchnpmTypeScript/Node.js buyer SDK — zero runtime deps

CLI Reference

CommandDescription
ag402 initNon-interactive setup — for AI agents (zero prompts)
ag402 setupInteractive wizard — for humans
ag402 demoFull E2E payment demo
ag402 run -- <cmd>Run any script with automatic x402 payment
ag402 pay <url>Single paid request
ag402 serveStart payment gateway (seller)
ag402 install <tool>One-command MCP setup (claude-code / cursor / openclaw)
ag402 statusDashboard: balance, budget, security
ag402 balanceQuick balance check
ag402 historyTransaction history
ag402 doctorEnvironment health check
ag402 upgradeMigrate test → production
ag402 exportExport history (JSON/CSV)
ag402 prepaid buy <url> <pkg>Purchase a prepaid credit pack
ag402 prepaid statusView all prepaid credentials (calls left / expiry)
ag402 prepaid purgeRemove expired or depleted credentials
ag402 prepaid recover <url>Recover a credential after gateway timeout
ag402 prepaid pendingShow any in-flight (unconfirmed) purchase

Full CLI reference → llms.txt (AI-readable, paste into your agent's context)


Documentation

ResourceDescription
llms.txtAI-readable CLI reference — paste into your agent's context
TypeScript SDK README@ag402/fetch — Node.js/Bun/Deno buyer SDK
Claude Code GuideStep-by-step MCP integration
Cursor GuideStep-by-step MCP integration
OpenClaw GuideNative Skill + MCP integration
ArchitectureSystem diagrams & state machines
x402 Protocol SpecFull protocol specification
OpenClaw SkillNative OpenClaw skill definition
Localnet GuideLocal Solana validator setup
SECURITYSecurity policy & audit history
CHANGELOGVersion history
CONTRIBUTINGContribution guide

Community


Roadmap

MilestoneStatusDescription
✅ Solana USDC paymentsShippedStandard x402 on-chain payments (~0.5s)
✅ Prepaid systemShippedHMAC credentials, ~1ms, zero gas per call
✅ Claude Code / Cursor / OpenClawShippedOne-command install, native MCP support
✅ 4 internal security reviewsShipped24/24 issues fixed, 748+ tests
TypeScript SDKShipped@ag402/fetch — zero-dep Node.js/Bun/Deno buyer SDK. 100 tests, dual ESM+CJS, full protocol utilities
🔜 @ag402/solanaPlannedReal Solana USDC payment provider for TypeScript
🔜 Multi-chainPlannedBase, Polygon, Arbitrum USDC support
🔜 Stripe fallbackPlannedFiat payment fallback for non-crypto users
🔜 DashboardPlannedWeb UI for sellers — revenue, analytics, API keys

License

MIT — Open source, free forever.

Reviews

No reviews yet

Sign in to write a review