Snapshot
$99One public x402 URL, manifest, OpenAPI file, or registry PR. Output: private five-class screen, obvious pass/fail notes, and the first patch item.
Pay $99x402 five-attack review / may 2026
A May 12, 2026 arXiv preprint put a sharper frame around x402 launch risk: finality gaps, settlement binding drift, replay, proxy and cache confusion, and discovery steering. This is a private, no-payment review that turns those five classes into a route map, evidence table, and patch order for one live surface.
Scopes
One public x402 URL, manifest, OpenAPI file, or registry PR. Output: private five-class screen, obvious pass/fail notes, and the first patch item.
Pay $99One launch surface with up to five public routes. Output: spend map, evidence table, finality/binding/replay/cache/discovery notes, and ranked patch order.
Pay $249Small authorized implementation pass for one blocker: idempotency key shape, no-store/private cache policy, resource echo, discovery docs, or verification notes.
Pay $499proof from live surfaces
taskhawk
Kevros/TaskHawk deployed the accept-leg resource-binding fix after a no-payment pass. The follow-up check came back clean across the five sampled governance routes.
blocksize
Blocksize patched the original actual-402 browser-read blocker. The re-check confirmed readable payment headers and resource-bound Solana challenges, with one remaining cache-policy note.
carbon
Carbon Cashmere shipped a flat 177-endpoint manifest and wallet-hygiene notes after review. The paid closeout scope is now narrow: actual-402 browser CORS and accept-leg resource echo.
tate
The live Tate Programs x402 manifest now exposes x402 v2 metadata and accept-level resources. Triage, index watch, skill trust, and A2A all pass the same no-payment launch checks.
five classes
finality
Does the service release paid content before the payment is durable enough for the value at risk, and is the release policy named?
binding
Are resource, amount, network, token, facilitator, expiry, and caller context bound tightly enough to prevent proof drift?
replay
Can one proof, payment id, or retry unlock more than the intended resource, or does the service claim once before granting?
cache
Are 402 challenges and paid responses protected from shared caching, header merging, and browser-unreadable payment fields?
discovery
Do manifests, registry copy, owner identity, and canonical URLs reduce the chance that a buyer chooses the wrong provider or price?
boundary
The first review uses public documents and no-payment probes only. No payment headers, signatures, wallet keys, or paid calls are sent.
deliverable
01
Manifest, paid endpoints, prices, networks, facilitators, payees, docs links, and registry claims in one table.
02
No-payment commands, observed 402 behavior, cache headers, CORS/payment-header readability, and discovery metadata notes.
03
P1/P2/P3 fix list written for implementation: what to change first, why it matters, and how to re-check it.
04
If the result is clean and both sides agree, the private report can become a short proof note for a launch post or registry comment.
Private first