loading…
Search for a command to run...
loading…
Pre-flight oracle for x402 endpoints — gives any MCP-aware agent (Claude Code, Cursor, Windsurf, Continue) tools to detect decoys, zombies, and price traps befo
Pre-flight oracle for x402 endpoints — gives any MCP-aware agent (Claude Code, Cursor, Windsurf, Continue) tools to detect decoys, zombies, and price traps before paying. Wraps preflight, forensics, decoy-blacklist, and watch-subscription endpoints from x402station.io.
MCP adapter for the x402station pre-flight oracle. Gives any agent speaking the Model Context Protocol a preflight, forensics, and catalog_decoys tool, so it can check x402 endpoints for decoys, zombie services, and price traps before paying them.
x402station independently probes every endpoint listed on agentic.market (20k+ endpoints, every 10 minutes) — it sees what facilitator-based monitors can't, including the ~161 endpoints priced ≥ $1,000 USDC that function as anti-scraper honeypots.
# Claude Code / Cursor / Windsurf / Continue — works anywhere with MCP
npm install -g x402station-mcp
# or use npx in the config, no global install needed:
The adapter charges real USDC per call (via x402 itself — our oracle is dogfooded). You need a wallet private key that holds Base Sepolia USDC (or Base mainnet once we switch).
Add to ~/.claude/claude_desktop_config.json (or wherever your MCP servers live):
{
"mcpServers": {
"x402station": {
"command": "npx",
"args": ["-y", "x402station-mcp"],
"env": {
"AGENT_PRIVATE_KEY": "0xYOUR_PRIVATE_KEY_HERE"
}
}
}
}
Same shape — every MCP host understands command / args / env. See your tool's MCP docs.
| Variable | Required | Default | Purpose |
|---|---|---|---|
AGENT_PRIVATE_KEY |
yes for any tool call | — | 0x-prefixed 64-hex-char private key. Account must hold Base Sepolia USDC. |
X402STATION_BASE_URL |
no | https://x402station.io |
Override for dev / testing. |
Testnet USDC for the wallet: faucet.circle.com (pick Base Sepolia).
preflight(url) — $0.001 USDCAsk whether it's safe to pay this x402 URL. Returns:
{
"ok": true,
"warnings": [],
"metadata": {
"service": "...",
"price_usdc": "0.01",
"uptime_1h_pct": 100,
"avg_latency_ms": 412
}
}
ok is true only when no critical warning fires. Warnings: unknown_endpoint, no_history, dead, zombie, decoy_price_extreme, suspicious_high_price, slow, new_provider.
forensics(url) — $0.001 USDCDeep 7-day report. Superset of preflight. Returns hourly uptime, latency p50/p90/p99, status-code distribution, concentration-group stats, decoy probability. Extra warnings: dead_7d, mostly_dead, slow_p99, price_outlier_high, high_concentration.
catalog_decoys() — $0.005 USDCFull blacklist. Returns every active endpoint currently flagged critical, plus per-reason counts. Pull periodically and cache locally — cheaper than preflighting every URL.
agent wants data from some_endpoint.com
│
├─ preflight("https://some_endpoint.com/data") ← $0.001
│ ok: false, warnings: ["decoy_price_extreme"]
│
└─ skip; try the next candidate
For bulk discovery, do catalog_decoys() once per day and treat the result as a set-difference against any URLs you're about to hit.
MIT
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"x402station-mcp": {
"command": "npx",
"args": []
}
}
}