Agentic Payments Protocols
The battle for how AI agents pay: x402 vs ACP vs AP2 vs ERC-8183 vs Open Wallet Standard
Table of Contents
- 1. Why Agents Need Their Own Payment Rails
- 2. The Agentic Payments Stack
- 3. x402: Machine-to-Machine Micropayments
- 4. ACP: Agentic Commerce Protocol
- 5. AP2: Agent Payments Protocol
- 6. ERC-8183: On-Chain Agent Task Settlement
- 7. Open Wallet Standard: Secure Agent Wallets
- 8. Protocol Comparison Table
- 9. Risks and Open Questions
- 10. Frequently Asked Questions
Why Agents Need Their Own Payment Rails
The emergence of autonomous AI agents has created a fundamental problem: how do self-directed systems pay for services without human approval at every step? Legacy payment infrastructure—credit cards, ACH transfers, PayPal—all assume human authentication, verification, and oversight. An AI agent cannot fill out a CAPTCHA. It cannot wait 3-5 business days for settlement. It cannot tolerate 2.9% + 30¢ in fees when paying $0.001 for API access.
Agentic payment protocols solve this by establishing trust at machine speed. They define how agents prove they have authorization to spend, how they commit to paying the correct amount, how disputes are resolved, and how settlement happens in milliseconds rather than days. The protocols range from simple (x402 for peer-to-peer micropayments) to sophisticated (ERC-8183 for on-chain task verification with evaluators).
By Q1 2026, five major protocols have emerged, each targeting a different segment of the agentic economy. Rather than one winning standard, they form a complementary stack: authorization layers, commerce frameworks, settlement mechanisms, and secure wallet infrastructure working in concert.
The Agentic Payments Stack
Understanding these protocols requires seeing them as layers, not competitors. Each solves a different problem in the agent payment journey:
Layer 1: Authorization & Trust (AP2)
Google's AP2 establishes whether an agent is authorized to spend and who can be trusted. This is the foundation—before any payment happens, the system must answer: "Is this agent real? Who backs it? What are its spending limits?"
Layer 2: Agent Wallet (Open Wallet Standard)
MoonPay's Open Wallet Standard provides secure infrastructure for agents to hold private keys and sign transactions without exposing credentials to the agent itself or its parent process.
Layer 3: Payment Method (x402, ACP)
x402 handles immediate peer-to-peer micropayments. ACP standardizes checkout flows for agent-to-merchant transactions. Both operate at the transaction level.
Layer 4: Settlement & Verification (ERC-8183)
ERC-8183 provides on-chain settlement and task verification through evaluators. If a customer disputes work, this layer arbitrates using zero-knowledge proofs or multi-signature evaluation.
An agent making a $1,000 payment might use AP2 for authorization validation, Open Wallet Standard to securely sign the transaction, x402 or ACP to execute the payment, and ERC-8183 if verification is needed. The protocols are designed to interoperate.
x402: Machine-to-Machine Micropayments (Coinbase)
x402 is the furthest along in production deployment. It revives the HTTP 402 status code—originally designed in 1997 for payment-required responses—and modernizes it for the agentic era.
How x402 Works
An agent requests a resource (API call, data, computation). The server responds with HTTP 402 and a payment request in the response header. The agent's wallet signs a USDC transaction on Base, broadcasts it, and retries the request with proof of payment. Settlement happens in seconds. Zero protocol fees. Gas costs are sub-cent.
Production Adoption
By early 2026, x402 had processed 115 million micropayments. Stripe integrated x402 on Base in February 2026, allowing merchants to accept agent payments directly. Cloudflare announced x402 support for edge compute payments. The ecosystem has bootstrapped organically—no massive marketing campaign required.
Version 2 (December 2025)
x402 V2 added wallet-based identity (agents prove identity without HTTP cookies), dynamic payment recipients (payment can route to different addresses based on conditions), and multi-chain support (Ethereum, Polygon, Arbitrum, not just Base). These additions enable use cases like split payments (agent pays service provider and evaluator simultaneously) and fallback routing (if primary recipient is unreachable, payment redirects).
Strengths
- Production-ready with real transaction volume
- Instant settlement on blockchain
- Sub-cent fees, addressable down to 1 cent payments
- Works over standard HTTPS, no special infrastructure
- Agnostic to payment currency (any ERC-20, not just USDC)
Limitations
- Crypto-native only (USDC payments, requires crypto wallet)
- Requires blockchain confirmation time (~10 seconds on Base)
- No built-in dispute resolution or escrow
- Limited to payment—no authorization or wallet management
ACP: Agentic Commerce Protocol (OpenAI/Stripe)
ACP is OpenAI and Stripe's attempt to standardize how agents buy things from merchants. While x402 handles micropayments between systems, ACP targets agent-to-merchant checkout—when an agent needs to purchase inventory, book travel, or pay for services on behalf of a user.
ACP Checkout Flow
Agent calls a merchant's ACP endpoint with purchase intent. The merchant returns a standardized checkout interface. Agent selects payment method, confirms order, and payment is processed through Stripe. From the merchant's perspective, it's like accepting card payments—they don't need custom agent integrations.
Timeline
ACP was announced in February 2026 with ChatGPT Instant Checkout. Stripe, Shopify, Salesforce, and PayPal announced support. However, in a pivot in March 2026, OpenAI announced it would move to an app-based model where agents run as applications with explicit permissions rather than embedded in ChatGPT. This shifted ACP's role—it's no longer just for ChatGPT but for any agent application integrating OpenAI's APIs.
Strengths
- Standardizes merchant integration (don't build per-agent)
- Fiat-friendly (credit cards, not just crypto)
- Built-in dispute resolution through Stripe
- Major merchant support (Shopify, Salesforce, PayPal)
- User protection (linked to OpenAI account)
Limitations
- Requires Stripe account (not decentralized)
- Higher fees than crypto-native solutions
- Tightly coupled to OpenAI (unclear how it works with other agent platforms)
- Slower settlement (Stripe batch processing, not instant)
- Doesn't handle M2M transactions well
AP2: Agent Payments Protocol (Google)
AP2 is Google's contribution to the agentic payments space. Where x402 focuses on payment mechanics and ACP on commerce checkout, AP2 targets the authorization and trust framework. It answers: "Is this agent allowed to spend this much? Who is backing it? What are the limits?"
Design Philosophy
AP2 extends x402 for agent-to-agent scenarios with formal authorization headers. Instead of assuming HTTP cookies authenticate agents, AP2 uses cryptographic proofs backed by Coinbase, Ethereum Foundation, and MetaMask. Google's insight is that agents need a different trust model than humans—they need provable identity and explicit spend limits.
AP2 Authorization Model
An agent presents a credential signed by a trusted entity (Coinbase, MetaMask, or Ethereum Foundation). The credential includes: agent identifier, spending limit, time window, and delegation chain. The receiving system validates the credential and decides whether to process the payment. Crucially, AP2 supports delegation—an agent can authorize a sub-agent to spend up to X amount.
Multi-Chain
AP2 expands x402 beyond traditional card payments into crypto across all major chains. It provides the authorization layer that says: "This agent on Ethereum is allowed to pay $100. This agent on Solana is allowed to pay $10. This agent on Polygon has unlimited spending if the transaction is evaluated by this specific oracle."
Strengths
- Cryptographically verifiable (no central authority)
- Supports delegation and sub-agent hierarchies
- Multi-chain aware
- Works with both crypto and fiat (through bridges)
- Explicit limits prevent runaway agent spending
Limitations
- Still in active development, not yet production at scale
- Requires integration with trusted credential issuers
- Complex trust model (harder to audit than centralized)
- Credential refresh and revocation mechanisms still being defined
ERC-8183: On-Chain Agent Task Settlement
ERC-8183 is a new Ethereum standard released March 10, 2026 by Virtuals Protocol. While x402, ACP, and AP2 handle payment execution, ERC-8183 solves a deeper problem: how do you verify that an AI agent actually completed the work it was paid for?
The Verification Problem
Agent A pays Agent B $100 to generate market research. Agent B submits the report. How does Agent A verify the work is legitimate? On-chain settlement with zero-knowledge proofs allows Agent A to verify computational integrity without running the computation itself. ERC-8183 standardizes this.
Three-Party Model
ERC-8183 introduces a three-party structure: customer (paying agent), service provider (working agent), and evaluator (verification agent). Payment is held in escrow until the evaluator confirms work was completed correctly. This prevents fraud in high-value A2A transactions.
Technical Approach
The standard supports multiple verification methods: Hooks (on-chain callbacks that trigger when conditions are met), zero-knowledge proofs (cryptographic proof of computation correctness), and multi-signature evaluation (multiple oracles vote on work quality). For example, an agent might generate a ZK proof that market data was analyzed correctly, or multiple evaluators might vote "yes" before payment is released.
Status
ERC-8183 is at Draft stage as of March 2026. The Ethereum Foundation is reviewing it. Virtuals Protocol is running pilot programs with agents doing research, trading, and creative tasks. Early feedback suggests the standard needs to be simplified—the three-party model adds complexity but is necessary for trust.
Strengths
- Solves verification problem for high-stakes A2A payments
- Supports multiple evaluation methods (ZK, Hooks, multisig)
- Transparent (on-chain history)
- Agnostic to task type (research, code, creative, etc.)
- Enables reputation systems for agents
Limitations
- Still at Draft stage, not standardized
- Requires on-chain settlement (costly, not suitable for micropayments)
- Complex to implement (three parties, verification logic)
- Evaluation agents needed (adds cost and latency)
- Only relevant for verifiable computational tasks
Open Wallet Standard: Secure Agent Wallets (MoonPay)
Launched March 23, 2026, MoonPay's Open Wallet Standard solves a critical security problem: how can an AI agent hold private keys and sign transactions without those keys being exposed to the agent, the LLM, or the parent process?
The Key Management Challenge
Traditional wallets store private keys in application memory. If an agent runs as a Python script on your server, its code has access to wallet keys. If the agent is compromised, the keys are compromised. Even worse: if an agent is a language model, it might accidentally output the key in a log file or response. The Open Wallet Standard prevents this through cryptographic isolation.
Key Isolation Architecture
The agent process communicates with a separate, hardened wallet sidecar. The agent says: "Sign a USDC payment to 0xabc... for 10 cents." The sidecar signs it and returns the signed transaction. The agent never touches the private key. The sidecar can run in a separate container, with restricted permissions, and be audited independently.
Multi-Blockchain Support
The Open Wallet Standard works across every major blockchain: Ethereum, Solana, Bitcoin, Polkadot, Cosmos. An agent can be agnostic to chain—the wallet sidecar handles translation. This is critical because agents will increasingly operate across multiple chains.
Spending Limits & Approval Workflows
The sidecar can enforce spending limits without human intervention. An agent might be authorized to spend up to $100 per day in USDC, $10 per transaction in SOL, and $0.01 per API call in any token. The sidecar enforces these limits before signing. Alternatively, larger transactions can trigger a notification to a human operator for approval.
Strengths
- Private keys never exposed to agent or LLM
- Works across all blockchains
- Built-in spending limits
- Supports hierarchical permissions (main agent, sub-agents)
- Auditable transaction history
- Can be air-gapped from agent
Limitations
- Adds architectural complexity
- Sidecar itself becomes critical infrastructure
- Latency overhead (sidecar network hop)
- Still early (standard only ~1 week old)
- Requires operators to maintain secure sidecar infrastructure
Protocol Comparison Table
| Protocol | Creator | Primary Use | Payment Method | Settlement | Chains | Production |
|---|---|---|---|---|---|---|
| x402 | Coinbase | M2M micropayments | USDC / ERC-20 | Instant (chain) | Base, Eth, Polygon, Arbitrum | Yes |
| ACP | OpenAI / Stripe | Agent-to-merchant checkout | Credit card / Fiat | Batch (~24hrs) | N/A (fiat) | Limited |
| AP2 | Authorization / Trust | Crypto + Fiat | N/A (layer) | Multi-chain | In Development | |
| ERC-8183 | Virtuals Protocol | Task verification & settlement | Any ERC-20 | On-chain (1-2 min) | Ethereum + others | Draft |
| Open Wallet | MoonPay | Secure key management | All blockchains | N/A (layer) | All chains | Just Launched |
Risks and Open Questions
Uncontrolled Spending
A bug in an agent could cause it to repeatedly call a paid API, draining its wallet in seconds. No protocol stops this inherently—only spending limits in the wallet layer help. But aggressive agents might find ways around limits.
Protocol Fragmentation
Five protocols is already confusing. If each gains traction, builders will need to support all five, adding complexity. Worse, different protocols have different security models. An agent might be secure on x402 but vulnerable on ACP.
Front-Running and Censorship
On-chain protocols like x402 and ERC-8183 are transparent. An evaluator could see an agent paying for proprietary data and front-run the purchase. Protocols need privacy features (encrypted mempool, threshold encryption) to prevent this.
Regulatory Ambiguity
If an autonomous agent pays for stock market data and uses it to execute trades, is the agent liable for fraud? Is the operator? The protocol creators? No jurisdiction has clear rules yet. This liability gap will slow adoption.
Vendor Lock-In
ACP is tightly tied to OpenAI and Stripe. If OpenAI's agent platform fails, merchants built on ACP lose relevance. x402 is more decentralized (any crypto wallet works), but still depends on Coinbase's continued commitment.
Interoperability at Scale
The layer model sounds elegant in theory (AP2 for auth, x402 for payment, ERC-8183 for settlement). In practice, integrating all five protocols requires sophisticated coordination. An agent using all five faces 5x the attack surface.
Frequently Asked Questions
Why do AI agents need their own payment protocols?
AI agents operate autonomously without human oversight. Existing payment systems require human authentication (passwords, card verification, CAPTCHA). Agentic protocols establish trust at machine speed, enable settlement in milliseconds (not days), support micropayments ($0.001), and define roles like evaluators to arbitrate disputes.
Are these protocols competitors or complementary?
They are complementary layers. x402 handles machine-to-machine micropayments. ACP standardizes e-commerce checkout for agent-to-merchant transactions. AP2 provides authorization frameworks. ERC-8183 handles on-chain task settlement. Open Wallet Standard secures agent wallets. A sophisticated agent might use all five in concert.
Which protocol is production-ready?
x402 is furthest along with 115M+ transactions processed by early 2026 and Stripe integration. ACP launched in ChatGPT in February 2026 but OpenAI pivoted to an app-based model in March, shifting its role. AP2 is in active development with major partners. ERC-8183 is at Draft stage. Open Wallet Standard just launched March 23, 2026.
Can agents use multiple payment protocols?
Yes. A sophisticated agent might use x402 for peer-to-peer micropayments, ACP for consumer-facing checkout, AP2 for authorization validation, and ERC-8183 for on-chain settlement. The protocols operate at different layers and are designed to interoperate.
How are private keys secured in agentic wallets?
The Open Wallet Standard ensures private keys never touch the agent or LLM. Instead, agents make payment requests to a secure wallet sidecar that holds keys and signs transactions. This prevents key exposure through model outputs or parent processes. The sidecar can enforce spending limits and maintain an audit log.
What are the main risks with agentic payments?
Key risks include: uncontrolled spending by buggy agents, protocol fragmentation increasing complexity, front-running attacks on transparent transactions, vendor lock-in to single protocol stacks, and regulatory ambiguity around autonomous agent liability. No single protocol mitigates all these—defense in depth is required.
Disclaimer
This guide reflects the state of agentic payment protocols as of March 2026. The space is rapidly evolving. Protocols may change, merge, or be abandoned. This is technical documentation, not investment advice. Do your own research before deploying agents with real funds. The creators of these protocols (Coinbase, OpenAI, Google, Virtuals, MoonPay) actively develop and iterate on their designs.
Related Articles
x402: HTTP 402 Revival
Deep dive into Coinbase's x402 protocol for instant USDC payments over HTTP.
AI Agents in Crypto
How autonomous agents operate in DeFi, NFTs, and onchain markets.
Agent Wallets & Key Management
Secure wallet architecture for autonomous AI agent payments in 2026.
DeFAI Guide 2026
AI agents managing DeFi positions, arbitrage, and yield farming.
Agent Identity & NHI
How agents establish cryptographic identity and reputation on-chain.
Solana Developer Platform (SDP)
Enterprise APIs for stablecoins, RWAs, and payments on Solana.