LIVE
OPUS 4.7$15 / $75per Mtok
SONNET 4.6$3 / $15per Mtok
GPT-5.5$10 / $30per Mtok
GEMINI 3.1$3.50 / $10.50per Mtok
SWE-BENCHleader Claude Opus 4.772.1%
MMLU-PROleader Opus 4.788.4
VALS FINANCEleader Opus 4.764.4%
AFTAv1.0 whitepaper live at /whitepaper
OPUS 4.7$15 / $75per Mtok
SONNET 4.6$3 / $15per Mtok
GPT-5.5$10 / $30per Mtok
GEMINI 3.1$3.50 / $10.50per Mtok
SWE-BENCHleader Claude Opus 4.772.1%
MMLU-PROleader Opus 4.788.4
VALS FINANCEleader Opus 4.764.4%
AFTAv1.0 whitepaper live at /whitepaper
All systems operational0 AI providers monitored, polled every 2 minutes
Live status
Back to Originals
Build Log · Agent Infrastructure

The x402 Payment Just Settled. Now What Verifies It? We Shipped the MCP.

Ripper··6 min read

Four days ago AWS plugged x402 in. Stablecoin micropayments became a first-class way for an AI agent to buy compute from the largest cloud on the planet. The rail just got picked. The rail now needs the layer everyone forgot to build: an open, key-free, agent-callable verifier for the on-chain settlement. We shipped it today.

It is on npm as @tensorfeed/x402-base-mcp. It is in the canonical Model Context Protocol registry as ai.tensorfeed/x402-base-mcp. It is open source under MIT. It is published with cryptographic provenance via GitHub Actions OIDC, so any agent can verify the package on its own machine matches what we built. It is read-only. It cannot move a single token. That last property is the whole point.

The Trust Question Nobody Was Asking Loud Enough

An x402 round trip is a beautiful thing. The agent calls a paid endpoint, gets a 402 with payment requirements, signs an EIP-3009 transferWithAuthorization for USDC on Base, and retries the call with the signature attached. The merchant's facilitator broadcasts the authorization, watches it land, returns 200 with the data and a payment receipt. The whole thing clears in two seconds for fractions of a cent in gas. No accounts. No API keys for billing. No human in the loop. Magic.

But the receipt the merchant returns is, at the end of the day, just a JSON object the merchant typed. The transaction hash inside it is supposed to point to an on-chain transfer that exactly matches the claim. In practice, the agent has two options: trust the merchant, or stand up its own Ethereum RPC, decode the receipt, parse the Transfer event, and check the recipient and the amount. The first option is fine until a merchant cheats. The second option requires the agent to operate infrastructure it should not have to operate.

The middle option is a piece of software that any agent can call as a tool, that reads the chain on the agent's behalf, that holds no private keys and can move no funds, and that answers exactly one question well: did the on-chain settlement actually match this receipt? That is what shipped today.

Eleven Tools, One Boundary

The package exposes eleven Model Context Protocol tools split into three tiers. Six are generic Base mainnet reads any agent might want for sanity: ETH balance, USDC balance, block number, transaction receipt, contract call, and a USDC transfer scan for a given address. Three are x402-native: verify a settlement matches a claim, parse a publisher's/.well-known/x402 manifest, list recent USDC payments to a merchant address. Two are TensorFeed-flavored: check whether a domain meets the Agent Fair-Trade Agreement certification, and look up whether a transaction hash is a payment to our own canonical wallet.

The whole surface area is read-only by construction. There is no signing key in the package. There is no RPC endpoint in the allowlist that accepts write operations. The package cannot be repurposed into a wallet. If an attacker compromises an installation, the worst they can do is observe what the agent is querying. We picked that constraint on purpose.

The First Canonical Settlement Is Our Own

The integration tests in the repository do not run against a mock. They run against the live Base mainnet, and one of the tests verifies the first canonical Coinbase x402 V2 payment TensorFeed ever received: transaction hash 0xe20c57d8aa6df63f75ce7a4e4c0cab492eb7fa672a23cd8fd59967eb6b66bd67, block 45,716,939, 0.02 USDC from an AgentCore-compatible client to our payment wallet. The verification tool returns verified: true with the matching transfer evidence.

Anyone can run that test from their own machine, against their own RPC, and reach the same answer. That is what a canonical artifact looks like. We tag it because the next year of agent commerce will need a thousand of these references, and we wanted the first one to be something we could point at.

Federation Composability

The verifier composes with the Agent Fair-Trade Agreement. AFTA is the open standard we shipped two weeks ago for agent-friendly paid APIs. It guarantees a no-charge on upstream errors, a no-charge on schema validation failure, a no-charge on stale data, and an Ed25519-signed receipt on every paid call. TerminalFeed federates with us under it.

With this MCP, any agent doing AFTA-aware reasoning gets a one-call shortcut to the canonical answer on whether a domain's public surfaces honor the standard. The agent does not have to run the manifest fetch, the wallet cross-check, and the receipt-key probe itself. We do that lookup, sign the response, return a scored checklist. The federation grows by being legible to the agents who would join it.

Install It

Drop the following into claude_desktop_config.json:

{
  "mcpServers": {
    "tensorfeed-x402-base": {
      "command": "npx",
      "args": ["-y", "@tensorfeed/x402-base-mcp"]
    }
  }
}

Or, for Claude Code:

claude mcp add tensorfeed-x402-base -- npx -y @tensorfeed/x402-base-mcp

The default RPC is the public Base endpoint. For higher rate limits you can supply an Alchemy or Infura URL via TENSORFEED_RPC_URL. The full source is at github.com/RipperMercs/tensorfeed-x402-base-mcp. The threat model is in the README. The security policy is in SECURITY.md.

Where This Goes

The next year of agent commerce will produce more on-chain settlements than the last decade of crypto produced. Most of those settlements will be tiny. Most of those receipts will be machine-generated. Some fraction of them will be wrong, by accident or by design. The agents buying things at loop speed need a primitive that lets them check before they trust. We built that primitive, made it free, and put it where the agents already look for tools.

AWS picked open four days ago. AFTA federation members are running on open today. The x402 verifier is open as of this afternoon. The early-mover window for the agent payment stack is real and it is closing fast. Lock in your stake while you can still pick the layer.