The payment layer for AI agents. One install. Pay any x402 endpoint on Solana or Base from your agent. Browse a federated index of thousands of machine payable APIs without a single provider account.
Most agent stacks stop at "the model can call a function." That works until the function costs money. The moment your agent needs premium data, a paid model, a trading signal, or a token analytics call, you are back to building accounts, storing API keys, watching budgets, and writing custom 402 handlers for every provider.
MPP32 replaces all of that. Your agent asks for a service by name. The proxy finds it in a federated catalog of thousands of machine payable APIs, signs payment with a key on your own machine, and returns the data. You write zero billing code. You manage zero provider accounts. Settlement lands on chain in seconds. MPP32 never touches the money.
- A live catalog of over 4,500 paid and free APIs across token intelligence, market data, web search, image generation, embeddings, DeFi analytics, wallet scoring, on chain queries, trading signals, and more.
- Automatic x402 payment on Solana (USDC) and Base (USDC), picked per call based on which signing key you configured.
- Real time Solana token intelligence with alpha scoring, rug risk, whale flow, smart money signals, and 24 hour pump probability.
- A dashboard at mpp32.org that tracks every call, every dollar settled, every protocol used, every latency reading.
- End to end audit. Every settlement comes back with an on chain signature you can verify on Solscan or Basescan.
| Rail | Status | Settles in | Network | Verification |
|---|---|---|---|---|
| x402 | Production | USDC | Solana mainnet | Solana facilitator |
| x402 | Production | USDC | Base | Base facilitator |
| Tempo | Envelope wired, disabled in production | pathUSD | Ethereum L2 | mppx SDK (client signer pending) |
| ACP | Envelope wired, disabled in production | Checkout session | Multi chain | Database backed flow |
| AP2 | Envelope wired, disabled in production | Verifiable credentials | Chain agnostic | ECDSA P-256 |
| AGTP | Envelope wired, disabled in production | Agent certificates | Chain agnostic | HMAC SHA256 |
The proxy implements every envelope and verifies challenges in tests, but only x402 has a tested end to end client flow in this MCP today. The other rails light up as their signers ship.
The MCP server is on npm and listed in the official Model Context Protocol registry.
npx -y mpp32-mcp-server@latestDrop this into the MCP servers section of Claude Desktop, Claude Code, Cursor, Windsurf, or any MCP compatible client.
{
"mcpServers": {
"mpp32": {
"command": "npx",
"args": ["-y", "mpp32-mcp-server@latest"],
"env": {
"MPP32_AGENT_KEY": "mpp32_agent_…",
"MPP32_SOLANA_PRIVATE_KEY": "<your base58 Solana secret key>"
}
}
}
}MPP32_SOLANA_PRIVATE_KEY is the base58 encoded 64 byte Solana secret key — the value Phantom exports under show private key, not the seed phrase. From a keypair.json file run node -e "console.log(require('bs58').encode(Buffer.from(JSON.parse(require('fs').readFileSync('keypair.json')))))" once and paste the result.
The wallet needs both USDC (for the payment) and a small amount of native SOL (for transaction fees). About 0.001 SOL covers many calls. A USDC only wallet returns insufficient funds for rent.
Get an MPP32_AGENT_KEY at mpp32.org/agent-console. The form returns the key and a ready to paste config snippet. With an agent key every call is attributed to your dashboard. Without it the server still works but only on free services. Private keys never leave your machine.
Three tools any MCP compatible agent can call.
list_mpp32_servicesbrowses the federated catalog. Returns native, curated free, x402 bazaar, and MCP registry entries with pricing, supported protocols, and a clear flag on every row that tells the agent whether it can actually call the service through this MCP or whether the entry is for discovery only.call_mpp32_endpointinvokes any HTTP callable service. Free services return immediately. Paid services return a 402 challenge that this tool signs locally and retries automatically when a payment key is configured.get_solana_token_intelligenceruns the MPP32 native oracle. Pulls live data from DexScreener, Jupiter, and CoinGecko, merges it into one report, returns alpha score, rug risk, whale activity, smart money signals, 24 hour pump probability, projected ROI, and full market data. Costs $0.008 per call, paid automatically when a key is set.
The protocol integrations are running in production. You can confirm them against any registered endpoint without writing code.
See the 402 challenge with every protocol header:
curl -i https://mpp32.org/api/proxy/mpp32-intelligenceThe response will include the x402 Payment-Required envelope and an X-Payment-Methods: x402 advertisement. Tempo, ACP, AP2, and AGTP challenge headers are gated off in production until each protocol's client signer ships; flip the matching *_ENABLED env var in backend/.env to test them locally.
Read the full OpenAPI spec with per endpoint protocol and pricing detail:
curl https://mpp32.org/openapi.jsonRead the federated catalog directly:
curl https://mpp32.org/api/agent/servicesUse the single execute endpoint that wraps every protocol:
curl -X POST https://mpp32.org/api/agent/execute \
-H 'X-Agent-Key: mpp32_agent_…' \
-H 'Content-Type: application/json' \
-d '{"service":"mpp32-intelligence","method":"POST","body":{"token":"SOL"}}'List your endpoint once and start receiving x402 payment automatically. MPP32 handles the payment negotiation, on chain verification, discovery listings via OpenAPI and A2A and MCP standards, periodic health re checks, and a full analytics dashboard. Settlement lands in USDC on Solana or Base directly to your wallet. Three consecutive verification failures suspend the listing so dead endpoints do not pollute the catalog.
Register at mpp32.org/build. Manage your listing at mpp32.org/manage using a recovery code delivered to your email.
MPP32 was built with the assumption that everything will eventually be probed.
- Production environment refuses to boot if the signing secret is missing or matches a known committed default.
- All outbound URLs from user submissions and agent execute calls run through an SSRF guard that blocks private, loopback, link local, IPv6 unique local, and cloud metadata addresses.
- Agent session API keys are hashed at rest using SHA256. A database leak does not surrender live credentials.
- AGTP agent identity uses HMAC SHA256 with a server held salt so signatures cannot be forged from a public agent id.
- Recovery one time codes refuse to issue in production when the email channel is not configured. Codes are never logged in plaintext when the system is configured correctly.
- The idempotency cache is bounded with LRU eviction. Admin endpoints are rate limited per IP on top of the secret check.
| Endpoint | Format | Purpose |
|---|---|---|
/openapi.json |
OpenAPI 3.1 | Full API spec with per endpoint protocol and pricing info |
/.well-known/agent.json |
A2A Agent Card | Agent to agent discovery with skills and auth schemes |
/api/mcp-config |
MCP Config | MCP compatible agent integration |
/api/submissions |
JSON | Public directory of all registered API providers |
/api/agent/services |
JSON | Federated catalog including native, curated, x402 bazaar, MCP registry |
- Frontend: React 18, Vite, React Router v6, Tailwind, shadcn/ui, Framer Motion
- Backend: Hono on Bun, Zod validation, Prisma, SQLite
- Protocols: Mppx SDK (Tempo), in house verification (x402, AP2, ACP, AGTP)
- Distribution: npm (mpp32-mcp-server), official MCP registry, published agent card
| Resource | URL |
|---|---|
| Website | mpp32.org |
| Docs | mpp32.org/docs |
| Playground | mpp32.org/playground |
| Ecosystem | mpp32.org/ecosystem |
| Agent Console | mpp32.org/agent-console |
| MCP package | npmjs.com/package/mpp32-mcp-server |
| MCP registry | registry.modelcontextprotocol.io |
MIT