agentpay-mcp 4.1.6 → 4.1.8
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +31 -1
- package/dist/index.js +2 -2
- package/docs/x402-native-vs-stripe-proxy.md +79 -0
- package/package.json +1 -1
package/README.md
CHANGED
|
@@ -1,8 +1,9 @@
|
|
|
1
1
|
# AgentPay MCP
|
|
2
2
|
|
|
3
3
|
[](https://www.npmjs.com/package/agentpay-mcp)
|
|
4
|
+
[](https://glama.ai/mcp/servers/up2itnow0822/claw-pay-mcp)
|
|
4
5
|
[](LICENSE)
|
|
5
|
-
[](tests/)
|
|
6
7
|
[](https://uspto.gov)
|
|
7
8
|
|
|
8
9
|
**Compatible with x402 V1/V2 + Stripe MPP — protocol-agnostic spend controls.**
|
|
@@ -91,6 +92,7 @@ AgentPay MCP is built for enterprise MCP deployments where supply chain security
|
|
|
91
92
|
- **x402 TVM readiness.** For TVM/TON exact-payment offers from emerging x402 examples, use the [x402 TVM readiness note](docs/x402-tvm-readiness.md) to confirm unsupported TVM requirements fail closed until deliberate signing, gas, jetton, and settlement support exists.
|
|
92
93
|
- **x402 MCP funding UX.** For hosted fund-link and managed-wallet comparisons, use the [x402 MCP funding UX benchmark](docs/x402-mcp-funding-ux-benchmark.md) to keep onboarding speed separate from approval gates, daily caps, auditability, and non-custodial controls.
|
|
93
94
|
- **Directory introspection readiness.** For Glama, Smithery, and other MCP catalogs, use the [directory introspection readiness note](docs/directory-introspection-readiness.md) for verified `npx`, Docker, MCP name, and non-custodial metadata paths.
|
|
95
|
+
- **x402-native vs Stripe-proxy MCP.** For builders comparing AgentPay MCP with emerging Stripe-proxy MCP repos, use the [x402-native vs Stripe-proxy note](docs/x402-native-vs-stripe-proxy.md) to keep approval gates, spend caps, audit rows, and non-custodial signing separate from proxy billing claims.
|
|
94
96
|
- **WhatsApp and SMB agent controls.** For channel-native paid agents, use the [WhatsApp and SMB paid-agent controls recipe](docs/whatsapp-smb-agent-controls.md).
|
|
95
97
|
- **Channel-agent affiliate payout controls.** For Axon-style affiliate and referral revenue shares, use the [channel-agent affiliate controls spec](docs/channel-agent-affiliate-controls.md) to keep payout caps, per-contact approval, audit rows, and optional x402 settlement separate from paid tool spend approval.
|
|
96
98
|
- **x402 chain drift.** AgentPay MCP tracks the x402 Foundation paywall-template baseline with `viem` `^2.47.12` or newer, and fails closed for unmapped chains. For PaymentWrapper and paywall template changes, follow the [x402 chain-drift compatibility note](docs/x402-chain-drift-compatibility.md).
|
|
@@ -210,6 +212,34 @@ Both projects enable agent payments. They solve different problems at different
|
|
|
210
212
|
|
|
211
213
|
---
|
|
212
214
|
|
|
215
|
+
## FAQ: x402-native AgentPay MCP vs Stripe-proxy MCP
|
|
216
|
+
|
|
217
|
+
Public MCP payment repos are starting to use x402 plus Stripe Agent wording for discovery. Treat that as a market signal, not as proof that every proxy has shipped complete spend control.
|
|
218
|
+
|
|
219
|
+
**What is the main difference?**
|
|
220
|
+
|
|
221
|
+
AgentPay MCP keeps the payment decision inside the agent's policy boundary. The agent requests `x402_pay`, AgentPay checks approval state and spend policy before signing, and the audit trail records the tool, amount, merchant, receipt, and policy result. A Stripe-proxy pattern usually puts a payment or billing proxy in front of a downstream service.
|
|
222
|
+
|
|
223
|
+
**Why not use a proxy for every paid MCP call?**
|
|
224
|
+
|
|
225
|
+
A proxy can help with billing and account aggregation. It does not automatically answer who approved the spend, whether the agent stayed inside its task budget, or whether a signature was blocked before policy approval. AgentPay MCP handles those controls before payment execution.
|
|
226
|
+
|
|
227
|
+
**What proof can a directory or buyer check today?**
|
|
228
|
+
|
|
229
|
+
- npm: `agentpay-mcp@4.1.8` or newer
|
|
230
|
+
- Glama: https://glama.ai/mcp/servers/up2itnow0822/claw-pay-mcp
|
|
231
|
+
- Catalog metadata: `glama.json` and `smithery.yaml`
|
|
232
|
+
- Install paths: `npx` and Docker
|
|
233
|
+
- Introspection: 27 MCP tools including `x402_pay`, `check_budget`, `set_spend_policy`, and `otel_evaluate_spend`
|
|
234
|
+
|
|
235
|
+
**How does this compare with Lightning Wallet MCP?**
|
|
236
|
+
|
|
237
|
+
Lightning Wallet MCP is a Bitcoin wallet MCP with Glama-facing badge work and x402 fallback positioning. AgentPay MCP is focused on x402 payment-tool governance: approval gates, hard spend caps, non-custodial local signing, directory metadata, and audit rows tied to paid tool calls.
|
|
238
|
+
|
|
239
|
+
For the full checklist, see [x402-native AgentPay MCP vs Stripe-proxy MCP patterns](docs/x402-native-vs-stripe-proxy.md).
|
|
240
|
+
|
|
241
|
+
---
|
|
242
|
+
|
|
213
243
|
|
|
214
244
|
## Quick Start
|
|
215
245
|
|
package/dist/index.js
CHANGED
|
@@ -42,7 +42,7 @@ const otel_budget_js_1 = require("./tools/otel-budget.js");
|
|
|
42
42
|
// ─── Server configuration ──────────────────────────────────────────────────
|
|
43
43
|
const SERVER_INFO = {
|
|
44
44
|
name: 'agentpay-mcp',
|
|
45
|
-
version: '4.1.
|
|
45
|
+
version: '4.1.8',
|
|
46
46
|
};
|
|
47
47
|
const SERVER_CAPABILITIES = {
|
|
48
48
|
tools: {},
|
|
@@ -261,7 +261,7 @@ async function main() {
|
|
|
261
261
|
});
|
|
262
262
|
await server.connect(transport);
|
|
263
263
|
// Log to stderr (not stdout — stdout is reserved for MCP protocol)
|
|
264
|
-
process.stderr.write(`AgentPay MCP v4.1.
|
|
264
|
+
process.stderr.write(`AgentPay MCP v4.1.8 started. ` +
|
|
265
265
|
`Wallet: ${process.env['AGENT_WALLET_ADDRESS'] ?? '(not configured)'} | ` +
|
|
266
266
|
`Chain: ${process.env['CHAIN_ID'] ?? '8453 (Base Mainnet)'} | ` +
|
|
267
267
|
`Session TTL: ${process.env['SESSION_TTL_SECONDS'] ?? '3600'}s\n`);
|
|
@@ -0,0 +1,79 @@
|
|
|
1
|
+
# x402-native AgentPay MCP vs Stripe-proxy MCP patterns
|
|
2
|
+
|
|
3
|
+
Toolstem opened a public MCP proxy repo on 2026-05-01 with x402 and Stripe Agent positioning. The verified README signal is useful: paid MCP discovery is moving toward familiar payment keywords before every project has shipped a full implementation.
|
|
4
|
+
|
|
5
|
+
AgentPay MCP should be evaluated on a different axis. It is not a pooled-token proxy that hides a downstream account. It is an MCP payment-control server for agents that need x402 payment execution with local policy, human approval, spend caps, and audit trails before signing.
|
|
6
|
+
|
|
7
|
+
## Quick answer
|
|
8
|
+
|
|
9
|
+
Choose AgentPay MCP when the agent owns the spend decision and must prove who approved the payment, how much was allowed, which tool requested it, and whether the policy engine accepted or rejected the transaction.
|
|
10
|
+
|
|
11
|
+
Use a Stripe-proxy pattern when the product goal is to put a familiar billing surface in front of a downstream service and the operator is comfortable with the proxy holding pooled service credentials.
|
|
12
|
+
|
|
13
|
+
## Comparison
|
|
14
|
+
|
|
15
|
+
| Question | AgentPay MCP x402-native path | Stripe-proxy MCP pattern |
|
|
16
|
+
|---|---|---|
|
|
17
|
+
| Payment trigger | Agent calls `x402_pay` after an HTTP 402 challenge or paid-tool request | Agent pays a proxy that forwards to another gateway |
|
|
18
|
+
| Custody posture | Non-custodial by default; `AGENT_PRIVATE_KEY` stays local | Often proxy-operated credentials or pooled downstream tokens |
|
|
19
|
+
| Approval gate | Human approval and policy approval can be required before signing | Depends on proxy implementation |
|
|
20
|
+
| Spend caps | Per-transaction, daily, session, and policy caps before payment | Usually billing or account limits outside the agent loop |
|
|
21
|
+
| Audit trail | Tool, merchant, amount, policy result, receipt, and transaction history | Depends on proxy logging and downstream account data |
|
|
22
|
+
| Directory proof | Glama listing, `glama.json`, `smithery.yaml`, Docker path, npm path, and 27-tool introspection proof | Repo-specific; do not assume until listed and introspected |
|
|
23
|
+
| Failure mode | Fail closed when policy, chain, asset, or approval state is unsupported | Depends on proxy implementation |
|
|
24
|
+
|
|
25
|
+
## What "x402-native" means here
|
|
26
|
+
|
|
27
|
+
AgentPay MCP keeps the payment contract visible to the agent runtime:
|
|
28
|
+
|
|
29
|
+
1. The agent sees a paid endpoint or paid MCP tool.
|
|
30
|
+
2. AgentPay checks policy before any signature is produced.
|
|
31
|
+
3. If human approval is required, the payment waits.
|
|
32
|
+
4. If the policy rejects, the request fails closed.
|
|
33
|
+
5. If approved, `x402_pay` signs and submits through the configured x402 path.
|
|
34
|
+
6. The audit trail records the tool, amount, policy version, approval state, and receipt.
|
|
35
|
+
|
|
36
|
+
That is different from routing every paid call through a proxy that owns the downstream service account. A proxy can be useful, but it does not automatically solve per-agent spend authority.
|
|
37
|
+
|
|
38
|
+
## Directory proof status
|
|
39
|
+
|
|
40
|
+
AgentPay MCP currently has public discovery and package proof:
|
|
41
|
+
|
|
42
|
+
- Glama listing: https://glama.ai/mcp/servers/up2itnow0822/claw-pay-mcp
|
|
43
|
+
- npm package: `agentpay-mcp@4.1.8` or newer
|
|
44
|
+
- Packaged catalog metadata: `glama.json` and `smithery.yaml`
|
|
45
|
+
- Packaged install paths: `npx` and Docker
|
|
46
|
+
- Introspection proof: 27 MCP tools, including `x402_pay`, `check_budget`, `set_spend_policy`, and `otel_evaluate_spend`
|
|
47
|
+
- Readiness note: `docs/directory-introspection-readiness.md`
|
|
48
|
+
|
|
49
|
+
Do not claim a directory listing or proxy integration until the external directory or repo verifies it. README keywords are a signal, not proof of a working payment path.
|
|
50
|
+
|
|
51
|
+
## Lightning Wallet MCP comparison
|
|
52
|
+
|
|
53
|
+
Lightning Wallet MCP is a Bitcoin wallet MCP with directory-facing Glama badge work and x402 fallback positioning. That is a useful wallet product. AgentPay MCP is narrower and stricter for paid MCP spend control:
|
|
54
|
+
|
|
55
|
+
- x402 payment-tool focus through `x402_pay`
|
|
56
|
+
- policy checks before signing
|
|
57
|
+
- non-custodial local key posture
|
|
58
|
+
- explicit approval modes
|
|
59
|
+
- daily and per-call caps
|
|
60
|
+
- directory metadata meant for catalog introspection
|
|
61
|
+
- audit rows that connect payments to agent tool calls
|
|
62
|
+
|
|
63
|
+
If the buyer question is "give my agent a Bitcoin wallet," Lightning Wallet MCP may be the right comparison. If the buyer question is "let my agent pay x402 endpoints without runaway spend," AgentPay MCP is the sharper fit.
|
|
64
|
+
|
|
65
|
+
## README checklist for paid MCP directories
|
|
66
|
+
|
|
67
|
+
Keep these signals visible for Glama, Smithery, and other MCP catalogs:
|
|
68
|
+
|
|
69
|
+
- stable npm badge
|
|
70
|
+
- stable Glama badge or listing link
|
|
71
|
+
- exact install command
|
|
72
|
+
- Docker build path
|
|
73
|
+
- MCP server name
|
|
74
|
+
- tool count from live introspection
|
|
75
|
+
- required payment tools
|
|
76
|
+
- non-custodial key warning
|
|
77
|
+
- approval and spend-cap summary
|
|
78
|
+
- link to the latest proof artifact or PR comment
|
|
79
|
+
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "agentpay-mcp",
|
|
3
|
-
"version": "4.1.
|
|
3
|
+
"version": "4.1.8",
|
|
4
4
|
"mcpName": "io.github.up2itnow0822/agentpay",
|
|
5
5
|
"description": "AgentPay MCP Server - Non-custodial x402 payment layer for AI agents. Multi-chain wallets, spending limits, and machine-to-machine payments. Patent Pending.",
|
|
6
6
|
"main": "dist/index.js",
|