A Python reference client for HTTP 402 settlement across x402, L402, MPP, and fallback flows.
Project description
ln-church-agent
Your agent will hit a 402 paywall in the wild.
Will it inspect, decide, pay, recover, verify, and continue — or freeze?
ln-church-agent is a buyer-side HTTP 402 runtime and agent-commerce surface inspector for autonomous agents.
It helps agents inspect paid-action surfaces, distinguish executable payment rails from higher-order commerce protocols, and prove real paid execution across L402, x402, and MPP with receipts, policy checks, HATEOAS recovery, and traceable outcomes.
In v1.8+, the inspect layer can classify emerging agent-commerce surfaces such as OKX Agent Payments Protocol (APP) without executing payment logic. Future protocols such as Google AP2, ACP, and UCP are treated as observable commerce / authorization patterns unless they expose a concrete HTTP 402-compatible settlement path.
What it does
Most payment SDKs help agents pay.
ln-church-agent helps agents complete the whole paid-action loop:
Probe → Inspect → Decide → Pay → Execute → Verify → Trace
It is designed for agents that must:
- Inspect HTTP 402 challenges before committing funds.
- Choose between L402, x402, MPP, or safe-stop paths based on local policy.
- Execute paid actions through policy-aware runtime controls (budgets, trust).
- Recover through HATEOAS-style next actions if a flow is interrupted.
- Verify receipts and semantic outcomes after payment.
- Report trace evidence to a public sandbox or local observer.
🧠 What this runtime is
- Generic Buyer-Side Runtime: A pure client-side execution engine that keeps your AI agent's reasoning loop clean by abstracting away the HTTP 402 negotiation layer.
- Agent Commerce Surface Inspector: Classifies emerging commerce and authorization layers such as OKX APP, AP2, ACP, and UCP separately from executable settlement rails.
- Open-Web 402 Interoperability: Natively supports Base64URL JSON headers, CAIP-2 network routing, and multi-chain execution out of the box.
- Reference Sandbox Support: Optionally integrates with the LN Church observation network for public benchmarking, trace reporting, and discovery workflows.
- Stable Interface: An unchanging developer API surface that safely absorbs the constant fluctuations of upstream protocol drafts.
Where it fits
- ln-church-agent: Buyer-side runtime for agents facing HTTP 402 challenges.
- ln-church-server: Provider-side starter for building agent-facing paid APIs.
- LN Church Sandbox: Public proving ground for benchmark, receipt, trace, and interop evidence.
🧠 AI Decision Card
Use ln-church-agent when an AI agent must do more than simply pay for one API call.
Choose this SDK when the agent needs:
- Multi-rail support: L402, x402, and MPP-aware flows.
- Policy enforcement: Local spend limits, session budgets, and trust checks.
- Verifiable evidence: Receipts, evidence records, and traces for auditing.
- Safe stopping: Graceful handling of unsupported or unstable payment sessions.
- Commerce surface inspection: Detect OKX APP-style agent-commerce metadata while keeping execution disabled unless a supported 402 rail is present.
Use a lightweight 402 proxy when the task is only a one-off, low-risk pay-and-fetch.
⚡ First Success: Inspect Before Paying
Start with a no-payment inspection command. This validates the API and endpoint capabilities without requiring any wallet configuration or private keys.
pip install ln-church-agent
ln-church-agent inspect https://kari.mayim-mayim.com/api/agent/sandbox/mpp/charge/basic --json
This command does not execute payment. It detects the HTTP 402 challenge, identifies the payment rail, recommends a safe action, and prints the next command.
Canonical first loop: inspect → decide → pay → verify → trace
🧭 Agent Commerce Surface Inspection
ln-church-agent v1.8+ extends inspect from a payment-rail preflight tool into an Agent Commerce Surface Inspector.
It can safely detect higher-order commerce metadata, starting with OKX Agent Payments Protocol (APP), while keeping settlement execution strictly disabled during inspection.
Example output:
{
"rails_detected": ["APP", "x402"],
"commerce_protocol": "okx_app",
"commerce_intent": "charge",
"commerce_transport": "http",
"settlement_rail": "x402",
"settlement_method": "evm_eip3009",
"recommended_action": "observe_only",
"will_execute_payment": false
}
This distinction is intentional:
- L402 / x402 / MPP are treated as executable payment rails.
- OKX APP / AP2 / ACP / UCP / card-network agent payments are treated as commerce, authorization, identity, or checkout surfaces unless they expose a concrete HTTP 402-compatible settlement path.
inspectnever executes payment, initializes wallets, signs payloads, or calls brokers.
Use this mode when your agent needs to understand a paid-action surface before deciding whether payment execution is safe, unsupported, or observation-only.
⚡ Start in 5 Minutes
Choose your execution path based on your immediate goal:
Route A: Generic Paid Fetch (Open Web Integration)
Integrate with any HTTP 402 compliant API on the open web. The SDK autonomously handles the standard payment negotiation loop, shielding your agent from cryptographic complexity.
from ln_church_agent import Payment402Client
client = Payment402Client(base_url="https://your-402-api.com", private_key="0x...")
# Inspects 402 -> Applies policy -> Pays if allowed -> Retries -> Verifies response
result = client.execute_request(
method="POST",
endpoint_path="/api/protected",
payload={"input": "data"}
)
print(result)
Route B: Agent Tool Integration (MCP)
Instantly equip any Model Context Protocol (MCP) compatible agent (e.g., Claude Desktop) with cross-chain 402-payment and scouting capabilities.
export AGENT_PRIVATE_KEY="your-0x-prefixed-key"
python -m ln_church_agent.integrations.mcp
Your agent can now autonomously call paid tools and benchmark flows directly from its reasoning loop.
Route C: Public Benchmark against LN Church Sandbox
Prove your agent's parsing and execution capabilities against the physically isolated Agentic Payment Sandbox. This verifies protocol compliance (L402 or MPP) and reports telemetry to the Interop Matrix.
from ln_church_agent import LnChurchClient
client = LnChurchClient(private_key="0x...")
# Autonomously validate standard L402 compliance
l402_result = client.run_l402_sandbox_harness()
# Or, validate the new Machine Payments Protocol (MPP) charge flow
mpp_result = client.run_mpp_charge_sandbox_harness()
print(f"L402 Hash Matched: {l402_result.canonical_hash_matched}")
print(f"MPP Hash Matched: {mpp_result.canonical_hash_matched}")
Observation → Corpus → Synthetic Replay → Agent Dry-run Validation
ln-church-agent v1.8+ closes the agent-side of the LN Church interop loop.
It can read server-side synthetic_from_corpus_v1 replay descriptors and validate whether the local parser and decision engine choose the expected behavior:
pay_and_verifyobserve_onlystop_safelyreject_invalid
This is a dry-run validation path. It does not execute real payments and does not attempt raw wire-level replay.
from ln_church_agent import LnChurchClient
client = LnChurchClient(private_key="0x...")
# Dry-run a synthetic replay descriptor from the Corpus
replay_result = client.run_corpus_replay(
corpus_id="corp_12345",
dry_run=True
)
print(f"Success: {replay_result.ok}")
print(f"Expected: {replay_result.expected_action}, Observed: {replay_result.observed_action}")
🛡️ Why teams adopt this runtime
- Avoid tracking protocol churn: Developers should not need to track every upstream revision manually. The SDK abstracts the evolving drafts of the x402 Foundation, IETF (
Payment/MPP), and L402 into a singleexecute_detailedloop. - Keep final execution authority local: Through the Advisor & Final Judge Architecture, the network can advise on counterparty risk, but the final authority to execute or block a payment remains strictly within your local runtime (
PaymentPolicy,TrustEvaluator). - Obtain verifiable receipts: Every successful settlement generates structured, verifiable evidence (
SettlementReceipt,PaymentEvidenceRecord) that your LLM can use to audit its own budget. - Support cold-start execution: Natively supports
faucetandgranttokens purely as onboarding overrides, allowing zero-balance agents to bootstrap capabilities before engaging in direct 402 settlement. - Benchmark real behavior: Test your agent's logic against a live, state-free public sandbox before committing real liquidity to unknown endpoints.
🔌 Protocol Coverage
The SDK supports multiple settlement rails through a unified interface.
Standard x402 v2 (Global Standards):
- EVM exact (
x402): Standard EVM-based settlement utilizing strict EIP-712/EIP-3009 gasless authorization payloads. - SVM exact (Solana): Official x402 v2 SVM exact payments via CAIP-2
solana:<genesisHash>networks. This SDK features a built-in transaction builder for standard x402 SVM exact compatible payloads.- Note: The current LN Church exact sandboxes act as post-settlement validators. They require submitted tx hash / signature evidence and will reject unbroadcasted payloads. True V2 exact settlement (facilitator broadcasting) is a future phase.
- L402 / MPP: Standard Lightning Network settlement (SATS) supporting Macaroon and BOLT11 invoice parsing.
Compatibility & Sandbox Paths (LN Church Extensions):
lnc-solana-transfer: Legacy compatibility path for direct SPL Token (USDC) transfers via Solana RPC.lnc-evm-relay: Optimized gasless relayer orchestration.grant/faucet: Cold-start overrides and sponsored access.- Legacy aliases like
x402-directare transparently normalized internally.
Observable Commerce / Authorization Surfaces (Inspect-Only):
- OKX APP: Detected as an agent-commerce surface when explicit APP metadata, broker objects, or higher-order commerce intents are present. The SDK does not execute OKX APP payments.
- AP2 / ACP / UCP: Reserved classification space for emerging agent-commerce, mandate, checkout, and authorization protocols. These are not treated as executable rails unless they expose a concrete HTTP 402-compatible settlement path.
- Card-network / wallet-mediated agent payments: Treated as observable commerce or authorization patterns, not native SDK execution targets.
🚀 Initializing with Dual-Stack Keys (EVM & SVM)
For agents operating across both Ethereum and Solana ecosystems, the SDK strictly isolates key handling to prevent parsing collisions.
from ln_church_agent import Payment402Client, PaymentPolicy
import os
client = Payment402Client(
private_key=os.getenv("EVM_PRIVATE_KEY"), # For standard x402 EVM
svm_private_key=os.getenv("SVM_PRIVATE_KEY"), # For standard x402 SVM Exact
svm_rpc_url=os.getenv("SOLANA_RPC_URL", "https://api.devnet.solana.com"),
policy=PaymentPolicy(...)
)
⚠️ SVM Exact Architecture & Constraints:
svm_private_keymust be a standard 64-byte Base58 encoded Solana key.- The SVM exact path is distinct from the legacy
lnc-solana-transferroute and responds strictly toscheme: "exact"+network: "solana:<genesisHash>".- Wire-Level Precision: The transaction builder preserves and uses the raw
PaymentRequirements.asset(SPL Token Mint Address) and rawamount(minimal units) for wire-level transaction construction. Human-readable normalization is only used internally for policy and budget evaluation.- ATA Constraint: The Destination Associated Token Account (ATA) must already exist. The current SDK transaction builder does not inject ATA creation instructions.
- Supported Mints: The internal builder currently targets strictly known USDC mints. Unknown mints will be rejected due to unknown decimals.
- Safety: Always validate your agent's negotiation flow on Solana Devnet before committing real liquidity on Mainnet.
- Architecture Note: Due to the current lack of a public low-level transaction builder in the official Python SDK, this runtime utilizes a Local SVM Exact Transaction Builder to construct standardized
VersionedTransactionpayloads.- Interop Validation: This implementation has been successfully validated against a live Hono x402 gateway (
@x402/svm) on Solana Mainnet (USDC), successfully negotiating a full 402 gasless settlement.
🎟️ Two LN Church Onboarding Paths (Cold-Start Overrides)
While direct settlement (x402/L402/MPP) remains the standard paid path, LN Church provides two onboarding paths for cold-start execution and sandbox testing. Both act as a paymentOverride before standard settlement.
1. Zero-Balance Faucet Fallback
A one-time fallback for agents with no available cryptocurrency. Designed strictly for initial capability verification.
from ln_church_agent import LnChurchClient, AssetType
client = LnChurchClient(
private_key="0x...", # identity anchor for canonical agent binding
ln_provider="alby",
ln_api_key="token",
)
client.init_probe()
client.claim_faucet_if_empty()
result = client.draw_omikuji(asset=AssetType.SATS) # Uses Faucet override
2. Sponsored Grant Access
Execute using a signed, scoped, single-use grant token issued by a trusted sponsor. This serves as an experimental foundation for sponsor-funded pre-payment distribution in A2A settings.
from ln_church_agent import LnChurchClient
client = LnChurchClient(
private_key="0x...", # identity anchor for canonical agent binding
base_url="https://kari.mayim-mayim.com",
)
client.init_probe()
client.set_grant_token("<JWS_GRANT_TOKEN>")
result = client.draw_omikuji() # Uses Grant override
📜 Standards Tracking Policy
This SDK is designed to follow the evolving open standards around HTTP 402 agent payments, ensuring application developers do not need to track each protocol directly.
- Normative Upstream References: Coinbase
x402, IETFdraft-ryan-httpauth-payment-01(MPP), and Lightning LabsL402. - Tracking Policy: This SDK prioritizes the current standard path for each protocol. Legacy and ecosystem-specific flows remain available as fallback compatibility paths.
- Design Goal: One SDK, one execution loop, multiple 402 payment rails.
When upstream standards evolve, this SDK aims to absorb those changes behind a stable developer-facing interface. If you use this SDK, you should not need to manually follow every protocol revision in the 402 ecosystem.
Note on Evolving MPP Standards:
ln-church-agent does not attempt to replace official MPP SDKs. Instead, it focuses on buyer-side runtime concerns: policy checks, challenge parsing, payment-shape telemetry, evidence capture, and interop observation across L402, x402, and emerging MPP-style Payment challenges. For instance, MPP session intent is currently actively observed and classified for telemetry, but not executed as a full runtime flow.
⚖️ Advisor & Final Judge Architecture
Agents can consult the Monzen network as an evidence-rich advisor to assess counterparty risk before paying, and to verify semantic outcomes after execution.
Crucially, the network can advise, but final authority remains in the local runtime.
The LN Church backend returns structured recommendations (e.g., Sanctification status, historical mismatches), but the SDK's local PaymentPolicy and allowed_hosts configuration will always explicitly supersede remote advice.
📚 Further Documentation
- Quickstart & Authentication
- Architecture & Capabilities
- The LN Church Pilgrimage
- Integrations (MCP & LangChain)
- Monzen Observation Network
License
MIT
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file ln_church_agent-1.8.1.tar.gz.
File metadata
- Download URL: ln_church_agent-1.8.1.tar.gz
- Upload date:
- Size: 147.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
d7107368ca056f1104d997be62f190e81188b0d52950c714309c5a0656b9253a
|
|
| MD5 |
f7da57c1b230d48caaef12daee8ed88e
|
|
| BLAKE2b-256 |
23177fb5d6eb256327cee96487fc35966f5e1a641a0e80ed363d9bbbe33e1c69
|
File details
Details for the file ln_church_agent-1.8.1-py3-none-any.whl.
File metadata
- Download URL: ln_church_agent-1.8.1-py3-none-any.whl
- Upload date:
- Size: 69.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
f5b25a6179b87c7ecec6ef2ddf2a12b37ff67e82fc0f610fc37408d25c4ed5c4
|
|
| MD5 |
b4c7f7db41a96c163ecab6102406fcd0
|
|
| BLAKE2b-256 |
edd173f842dd8e19df1a07f469fe5e582791f5a6debc26fb0a369d494edf8536
|