Skip to content

stubbies/ai-agent-toll

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

AI Agent Toll

Stop blocking AI agents and start charging them. This sdk enforces HTTP 402 Payment Required at the Cloudflare Edge using USDC on Base.

Features

  • 99% Agent Detection: Uses TLS Fingerprinting (JA4), Cloudflare Bot Scores, and behavioral heuristics (OpenClaw/Markdown detection).
  • Zero-Latency: Performs all checks locally on the Edge. No third-party API round-trips.
  • EIP-712 AccessGrants: Cryptographically secure off-chain signatures for machine-to-machine payments.
  • Multi-Chain Support: Native support for Base (USDC), Polygon, and Solana.
  • Universal: Native support for Hono and Vanilla Workers.

Installation

npm install ai-agent-toll

Usage (Hono)

import { Hono } from 'hono';
import { gatekeeper, TOKENS } from 'ai-agent-toll';

const app = new Hono();

app.use('/api/premium/*', gatekeeper({
  paymentAddress: '0xYourWalletAddress',
  rules: [
    { 
      pattern: '^/api/premium/research/.*', 
      price: '1.00', 
      token: TOKENS.USDC_BASE, 
      strategy: 'PAY' ,
      duration: 3600 // 1 hour of access per payment
    },
    { 
      pattern: '^/api/premium/blog/.*', 
      price: '0.05', 
      token: TOKENS.USDC_BASE, 
      strategy: 'PAY' 
    }
  ]
}));

export default app;

Usage (Vanilla Worker)

import { withGatekeeper } from 'ai-agent-toll';

const worker = {
  async fetch(req, env, ctx) {
    return new Response("Welcome, Verified Agent.");
  }
};

// Wrap the default export
export default {
  fetch: withGatekeeper(worker.fetch, {
    paymentAddress: '0x...',
    rules: [...]
  })
};

Privacy & Compliance

"Dark" by design.

  • No Data Exfiltration: We never see your users' IPs, Headers, or Payloads.
  • Local Verification: AccessGrants are verified cryptographically within your Worker.
  • GDPR Ready: No PII is ever sent to our servers.

How it Works for Agents

  1. Challenge: Agent hits a protected path -> Proxy returns 402 Payment Required.
  2. Payment: Agent (or human) pays via the Link header or signs an EIP-712 message.
  3. Access: Agent retries with Authorization: Gatekeeper <payload>.<signature>.
  4. Verification: SDK verifies the on-chain transaction and signature locally.

🛠️ Roadmap & Development Status

Incoming: TLS Fingerprinting (JA4)

We are currently implementing JA4 Fingerprinting to provide 99.9% detection accuracy against "Stealth" bots that spoof headers.

  • Header-based Agent Detection (User-Agent, Accept: markdown)
  • Cloudflare Bot Score Integration (v1.0)
  • TODO: JA4 TLS Fingerprinting (Requires Cloudflare Enterprise/Business)
  • TODO: Global JA4 Reputation Database (Crowdsourced bot signatures)

Note: JA4 detection is currently in "Beta". If you are on a Cloudflare Pro plan, the SDK will fallback to high-accuracy Header and Behavioral analysis.

About

HTTP 402 Payment Required proxy for AI agents. Enforce USDC payments on Base via Cloudflare Workers.

Resources

Stars

Watchers

Forks

Contributors