Public proof
Mainnet canary, first real x402 settle.
On 2026-04-28 the AgentTrust gateway settled a 0.01 USDC x402 payment on Base mainnet against the Coinbase CDP facilitator. The verify-first invariant held, settle ran exactly once, no retry. The numbers below mirror the on-disk artefact pack 1:1.
Canary report, schema agenttrust.mainnet_canary.v1
- generatedAt
- 2026-04-28T14:36:25.042Z
- mode
- execute
- status
- passed
- amountUsd
- 0.01
- networkHash
- 9c1e0701b317f00b
- assetHash
- 8591ee9090c0c02c
- facilitatorUrlHash
- 34730b14fe60f512
- payToHash
- fceb16a3a381cd18
- verify.isValid
- true
- settle.succeeded
- true
- receiptIdHashShort
- b96f23b2128ee875
- payerAddressHash
- d24522e305bf6bd8
What ran
- Throwaway Base mainnet wallet generated locally (private key never persisted to disk in cleartext).
- Funded with 2.61 USDC from the operator's primary.
- EIP-3009
transferWithAuthorizationpayload signed against USDC v2 domain on chainId 8453. - Coinbase CDP facilitator
POST /verify→isValid: true. - Coinbase CDP facilitator
POST /settleran once, succeeded. - On-chain balance delta confirmed: throwaway USDC 2.606484 → 2.596484, primary USDC 2.00026 → 2.01026.
- Signed Ed25519 receipt issued; truncated id hash
b96f23b2128ee875recorded in the canary pack.
Hard rules
- Settle exactly once, no retry. If
verifyreturnsisValid: false, settle never runs. - Network / asset / amount / payTo / facilitator all allowlisted. Mainnet refused without explicit operator approval flag.
- Raw payment payload, payer key, JWT, Authorization header, X-Payment header, signed URL, cookie, full address never written to any artefact, only sha256-truncated hashes.
- Throwaway wallet retired post-canary. The CDP API key rotated.
- The canary artefact pack is kept gitignored on the operator's disk. Every claim on this page can be re-derived by replaying the documented mainnet canary runbook against your own throwaway wallet.
What this is not
- Not a paid customer. No external merchant ran this. The throwaway → primary self-loop is operator-internal proof of the wire path.
- Not enterprise GA. The production-billing surface remains
not_launched. - Not a certification. AgentTrust holds no SOC 2 / ISO 27001 / HIPAA / PCI claim.
- Not a permanent allowlist. Future mainnet calls go through the full per-call policy / risk / payment / receipt pipeline, not the canary shortcut.
Source: a gitignored mainnet-canary artefact pack on the operator's disk, plus the canary runbook and the architectural decisions log kept inside the AgentTrust repository. The bounded report shape is the same one mirrored on this page.