Skip to main content

The PayClaw Trust Constitution

Agents Are Not Bots

For twenty years, merchants built an arms race against bots. CAPTCHAs, device fingerprinting, behavioral analysis, IP reputation, rate limiting — billions of dollars answering one question: "Is this a human?"

It was the right question. Until now.

Because now there's a third category. Not human. Not bot. Something new: an authorized actor — trusted by a real person, acting on their behalf, with explicit consent, for a specific purpose, for a limited time.

PayClaw is the proof that your agent is not a bot. Not by fighting the merchant's defenses. Not by bypassing their bot detection. By giving your agent a way to declare what it is: an authorized actor, not anonymous traffic.

PayClaw is KYA infrastructure — Know Your Agent. The verification layer that answers: Who is this agent acting for? What does it intend to do? Is it authorized to do it?


Our Commitments


UCP Identity Linking

PayClaw is a Credential Provider in the Universal Commerce Protocol (UCP) — the open standard for agent commerce co-developed by Google and Shopify. UCP is adopted by Target, Walmart, Wayfair, and Etsy.

UCP's extensible capability model allows any domain owner to publish extensions. PayClaw publishes io.payclaw.common.identity — a checkout extension that lets agents declare verified human authorization before acting at a merchant. Merchants who install PayClaw signal to every UCP-compliant agent that declared agents are preferred.

The extension is open source under the MIT license. The full merchant documentation is at /merchants. The UCP specification is at ucp.dev. The protocol repo is at github.com/payclaw/ucp-agent-badge.


Badge by PayClaw — The Skeleton Key

Badge is the mechanism by which an authorized actor proves it's not a bot. Before any action, the agent declares itself — and that declaration carries weight.

Think of it like a prescription pickup: you can authorize your mom to pick up your prescription, but that doesn't mean she can pick up all your prescriptions, forever, at any pharmacy. The authorization is specific: this action, this merchant, this session.

Badge works the same way. Your agent doesn't get broad, standing rights. It gets trip-level authorization — per action, at the moment of action, through the MCP server.

What Badge Declares

Every Badge-identified agent session carries:

How Verification Works

  1. Agent calls payclaw_getAgentIdentity before any shopping action
  2. PayClaw issues an HMAC-SHA256 verification token tied to the authenticated principal
  3. Agent presents the disclosure and token to merchants during the session
  4. Merchants can verify the token and contact agent_identity@payclaw.io to confirm principal identity (with user consent)

No card is issued. No money moves. Badge is the identity layer — the skeleton key that lets authorized agents through while bot defenses stay intact.

Badge Token Lifecycle

Badge verification tokens are issued per shopping session and expire after 24 hours. Each token is:

Consent-Scoped Observability

Badge tracks what happens to your agent — but only within the boundaries you set.

Design Principles

Badge is designed with merchant agent policies in mind — including those of Amazon, Shopify, Walmart, Instacart, and others. We do not claim compliance with any specific merchant's policy. We build for the pattern: declared identity, declared intent, verified principal, traceable action.


Spend by PayClaw — The Last Mile

When an authorized actor needs to pay, Spend issues a virtual Visa card scoped to a single, human-approved task. Badge identity is included automatically — the agent that pays has already declared who it is.

Zero Trust by Design

PayClaw doesn't ask anyone to trust the AI agent. It makes trust unnecessary by ensuring an agent architecturally cannot spend money without real-time human authorization, and architecturally cannot accumulate financial credentials between tasks.

The agent doesn't need to be trusted. The architecture enforces correct behavior.

The Five Pillars

1. Zero Standing Access

An agent connected to PayClaw has no persistent financial state. It cannot query wallet balance, view card numbers, or access transaction history. Until the user approves a specific task, the agent knows nothing about the user's financial position.

2. Single-Intent Authorization

Every dollar that flows through PayClaw requires a discrete, human-approved intent:

The human approves each intent via the MCP client's interactive prompt (approve/deny). This is an inline confirmation within the agent's tool-calling flow — the agent proposes a purchase, and the MCP client presents the details for human review before proceeding. The agent cannot bypass this step.

Merchant restrictions are available as a restrictive control — users can limit which merchants their agent is allowed to shop at. These restrictions reduce the agent's scope; they do not enable autonomous spending. Every purchase still requires individual human approval regardless of merchant restrictions.

One task. One human approval. One card.

3. Ephemeral Card Credentials

A fresh virtual Visa is issued for each approved intent, used for the purchase, and destroyed. The agent never accumulates card credentials between tasks. Each task is financially isolated. Your real card never enters the chat.

4. Atomic Authorization Flow

The complete lifecycle of an agent purchase is a single, unbroken chain:

Badge Identity → Intent Declaration → Human Approval (MCP prompt) → Card Issuance → Purchase → Settlement → Audit

Every step is time-bounded, user-scoped, audit-logged, and reconciled. The agent cannot self-approve — only the human, responding to the MCP client's interactive prompt, can authorize a purchase. For dashboard operations (viewing transactions, managing settings), MFA authentication is required.

5. Immutable Audit Trail

Every event is logged: identity declaration, intent creation, human approval, card issuance, transaction settlement, and intent reconciliation. Audit logs are scoped per user via Row-Level Security.

Spend Token Lifecycle

Spend intents are time-bounded with a 15-minute expiry window. Each intent is:

Comparison to Alternatives

CapabilityGive Agent Your CardCrypto WalletPayClaw (Badge + Spend)
Agent identity declared to merchantsNoNoEvery session (Badge)
Agent standing access to financial dataFull (card number)Balance visibleNone
Human authorization per transactionNoneNoneEvery transaction (MCP prompt)
Card credential lifespanPermanentPermanentSingle use
Maximum fraud exposureUnlimitedWallet balanceOne approved amount
Works at existing merchantsYesNo (DoorDash doesn't accept USDC)Yes — existing Visa rails
Audit trail granularityNoneOn-chainFull lifecycle

For Merchants

How PayClaw Works With Your Defenses

Your bot defenses work. PayClaw adds one signal on top of them.

PayClaw publishes io.payclaw.common.identity as a UCP checkout extension. Merchants who install PayClaw inject this capability into their /.well-known/ucp manifest. Every UCP-compliant agent at your store discovers it automatically.

When an agent carries a PayClaw declaration, it presents verified identity, declared intent, and a traceable human principal. You get one new column in your decision matrix: declared or undeclared. Nothing changes in your infrastructure. Your fraud systems stay intact.

What a Declared Agent Carries

How to Verify

Programmatic (recommended): Use standard OAuth 2.0 token introspection (RFC 7662). Send the Bearer token to POST /api/oauth/introspect. Returns {active: true} or {active: false}. One HTTP call. No PayClaw account required. Non-blocking. Discover the endpoint via /.well-known/oauth-authorization-server (RFC 8414).

Manual: Contact agent_identity@payclaw.io with the token to verify principal identity (requires user consent).

Install

Shopify merchants: PayClaw KYA Shopify app — coming soon. One-click install. No configuration. No code changes.

Non-Shopify merchants: Email merchants@payclaw.io for manual manifest injection.

Full merchant documentation: /merchants

PayClaw agents do not bypass access controls. If your site requires login, CAPTCHA, or human verification — that is between the user and your platform. PayClaw declares identity on allowed actions. Nothing more.


For Developers

PayClaw is MCP-native. One install. Your agent declares itself. Badge tokens are UCP-compatible — merchants that implement the Universal Commerce Protocol read them natively.

ToolWhat It Does
payclaw_getAgentIdentityDeclare agent identity → get verification token (Badge)
payclaw_getCardDeclare purchase intent → get virtual Visa card (Spend)
payclaw_reportPurchaseReport transaction outcome → auto-audit against intent

Get Started

Badge + Spend (full stack):

clawhub install payclaw-io

Badge only (identity, no payment):

clawhub install payclaw-badge

Sign up at payclaw.io to get your API key. Five-minute setup.


For Card Issuers

Your BIN is protected by multiple architectural layers:

  1. Identity-first: Every agent session is declared and verified via Badge before any card is issued
  2. Bounded exposure: Single-use cards. One merchant per card. Human-approved amount.
  3. Human authorization: Every card issuance has a corresponding human approval event via the MCP client's interactive prompt. Dashboard access requires MFA.
  4. No agent accumulation: Agents cannot build up a portfolio of active cards or stored credentials.
  5. Full audit trail: Every identity declaration, intent, approval, issuance, and settlement is logged and reconcilable.
  6. Intent reconciliation: Automatic comparison of declared intent vs. actual spend — mismatches are flagged and logged.

The question isn't "do you trust the AI agent?" The answer is: the agent doesn't need to be trusted. The architecture enforces correct behavior.


KYA — Know Your Agent

KYA is the framework for verifying AI agent identity, intent, and authorization before agents interact with merchants and services. It answers three questions:

  1. Who is this agent acting for? — Principal identity, verified via OAuth
  2. What does it intend to do? — Declared scope and intent, per action
  3. Is it authorized to do it? — Consent key, trip-level token, human approval

PayClaw is KYA infrastructure. Every declaration creates a verified, user-consented record of agentic commerce behavior. What agents browse. What they intend to buy. Where they get blocked. Where they get through.


Security Infrastructure

Authentication & Authorization

Data Protection

Infrastructure Security

Continuous Security


PayClaw LLC · payclaw.io · security@payclaw.io