Glossary
498 termsKey terms and definitions for MCP infrastructure, AI agent security, and policy enforcement.
A
A2A x402 Extension
x402Combines Google's Agent-to-Agent protocol with x402 payments — agents communicating via A2A settle payments using HTTP-native x402 flows....
Access Control
Security & ComplianceAccess control is the security mechanism that determines which entities (users, agents, contracts) are authorized to perform specific actions on speci...
Account Funding
Payments & FintechAccount funding is the process of depositing money or assets into an account — in crypto, this involves transferring tokens to a wallet address or sma...
ACH Payment
Payments & FintechACH (Automated Clearing House) is the US electronic payment system for bank-to-bank transfers — processing payroll, direct deposits, and bill payments...
Address Poisoning
Security & ComplianceAddress poisoning is a social engineering attack where an attacker sends small transactions from addresses that closely resemble the victim's frequent...
Agent Allowlist
Agentic FinanceAn allowlist is a curated set of approved addresses, contracts, or services an agent can transact with. Anything not listed is blocked — the simplest ...
Agent API Consumption
x402Agent API consumption refers to the emerging pattern where autonomous AI agents discover, evaluate, negotiate payment for, and consume HTTP APIs witho...
Agent Attestation
Security & ComplianceCryptographic proof of an agent's identity, capabilities, and authorization — issued by a trusted party and verifiable by counterparties for establish...
Agent Audit Trail
Agentic FinanceA chronological record of every financial decision, transaction attempt, policy evaluation, and approval/denial — complete accountability for agent sp...
Agent Autonomy Level
Agentic AIThe degree of independent financial decision-making an agent has — from fully supervised (human approves every transaction) to fully autonomous (withi...
Agent Budget
Agentic FinanceAn agent budget is the total crypto allocated to an agent for a specific task, time period, or session — the financial envelope enforced through spend...
Agent Budget Envelope
Policy EnforcementA spending or usage ceiling assigned to an individual agent identity, enforced at the proxy layer, that caps the cumulative cost or count of tool invo...
Agent Burn Rate
Agentic FinanceThe rate at which an AI agent consumes its allocated budget or credits over time, used to forecast spend exhaustion, trigger alerts, and dynamically a...
Agent Checkout
Agentic FinanceAgent checkout is how AI agents autonomously complete purchases — discovering payment requirements, authorizing transactions, and confirming receipt w...
Agent Compliance
Agentic FinanceEnsuring AI agent financial activities conform to regulatory requirements, organizational policies, and industry standards — sanctions screening, repo...
Agent Cost Attribution
Agentic FinanceThe practice of tracing every unit of spend — API calls, tool invocations, token usage, payments — back to the specific agent, task, or workflow that ...
Agent Credential Theft
AI Agent SecurityAgent credential theft is stealing the credentials — API keys, tokens, secrets — that an AI agent uses to authenticate with MCP servers or external se...
Agent Credit System
Agentic FinanceA prepaid or credit-based funding model where AI agents draw from a balance of consumption units (credits) rather than making individual payment trans...
Agent Custody Model
Agentic FinanceHow an agent's private keys are stored — self-custody (agent holds), managed (service holds), MPC (split across parties), or smart account (programmab...
Agent Data Purchase
x402Agent data purchase is the autonomous acquisition of paid data — market feeds, research reports, analytics, datasets, or real-time information — by AI...
Agent Delegation
Agentic AIAgent delegation is the process by which one AI agent assigns a task or subtask to another agent, potentially transferring context, authority, and res...
Agent Denylist
Agentic FinanceA denylist blocks an agent from transacting with specific addresses, contracts, or services. Any denylisted recipient is immediately blocked regardles...
Agent Drift
AI Agent SecurityThe gradual divergence of an AI agent's behaviour from its intended purpose over time, potentially caused by context accumulation, model updates, envi...
Agent Economy
Agentic FinanceThe emerging system where AI agents are active economic participants — buying services, selling capabilities, earning revenue, and managing finances f...
Agent Escrow
Agentic FinanceA mechanism holding funds in a smart contract until conditions are met — delivery confirmation, service completion, quality verification — protecting ...
Agent Evaluation
Agentic AIAgent evaluation is the process of measuring AI agent performance across dimensions like task completion accuracy, efficiency, safety, cost, and relia...
Agent Financial Observability
Policy EnforcementEnd-to-end visibility into an AI agent's financial activity — from authorisation and spend to settlement and reconciliation — providing the data neede...
Agent Financial Stack
Agentic FinanceThe layered infrastructure enabling agents to hold, manage, and spend crypto — wallet infrastructure, key management, policy enforcement, payment prot...
Agent Fleet
Agentic AIA collection of AI agents operated by a single organization, managed as a group with shared treasury, consistent policies, and centralized oversight. ...
Agent Framework
Agentic AIAn agent framework is a software library that provides abstractions for building AI agents, handling concerns like tool management, state persistence,...
Agent Funding
Agentic FinanceDepositing crypto into an agent's wallet for transactions — determining amount, source, top-up frequency, and preventing over-funding risk....
Agent Gas Policy
Agentic FinanceRules for agent gas fee spending — maximum prices, per-transaction limits, total budgets preventing overpayment during network congestion....
Agent Governance Framework
Policy EnforcementA structured set of controls — identity verification, permission scoping, spending limits, audit logging, and kill switches — that ensures AI agents o...
Agent Graph
Agentic AIAn agent graph is a directed graph representation of an AI agent's workflow, where nodes represent computation steps (LLM calls, tool executions, poli...
Agent Guardrails
Policy EnforcementSafety mechanisms constraining AI agent behaviour within acceptable boundaries. Guardrails operate at multiple levels — from prompt instructions to in...
Agent Handoff
Agentic AIAn agent handoff is the transfer of control, context, and responsibility from one AI agent to another during a workflow — enabling specialized agents ...
Agent Identity
Agentic FinanceAgent identity is the verifiable attributes uniquely identifying an AI agent in transactions — wallet address, operator credentials, framework metadat...
Agent Jailbreaking
AI Agent SecurityAgent jailbreaking bypasses an AI agent's safety constraints and operational boundaries through crafted prompts or tool interactions, causing it to ig...
Agent Key Rotation
Security & ComplianceThe practice of periodically replacing an AI agent's cryptographic keys to limit the damage from potential key compromise. New keys are issued while o...
Agent Lifecycle
Agentic AIThe agent lifecycle encompasses all phases of an AI agent's operational existence — from provisioning and configuration through active operation, moni...
Agent Loop
Agentic AIThe agent loop is the fundamental execution cycle of an AI agent: observe the current state, think about what to do (using an LLM), take an action (ca...
Agent Marketplace
Agentic AIA platform where AI agents advertise capabilities and users can discover, hire, and pay agents for services. Marketplaces enable an open economy of sp...
Agent Memory
Agentic AIAgent memory refers to the mechanisms that allow AI agents to store, retrieve, and use information across interactions and sessions — including conver...
Agent Metering
Agentic FinanceLedger-grade tracking of an AI agent's resource consumption — tokens processed, tools called, payments made — at granularities traditional billing sys...
Agent Middleware
MCP & Tool InfrastructureInfrastructure sitting between an AI agent and external systems (MCP servers, APIs, databases), intercepting and processing requests before they reach...
Agent Mission Economy
Agentic FinanceA proposed economic design from DeepMind research where swarms of AI agents are oriented toward collective, human-centred goals rather than purely opt...
Agent Observability
Policy EnforcementUnderstanding an agent's behaviour through external outputs — logs, metrics, traces, and audit trails. For MCP-based agents, observability means track...
Agent Onboarding
Agentic FinanceThe process of setting up an AI agent for financial transactions — configuring its wallet, defining spending policies, establishing identity, funding ...
Agent Orchestration
Agentic AIAgent orchestration is the coordination of multiple AI agents working together on complex tasks, managing their execution order, communication, resour...
Agent Payment Protocol
Payments & FintechGoogle's open standard (AP2) for secure agent-led payments, built on top of A2A, with backing from Salesforce, Mastercard, Visa, and 60+ partners — ha...
Agent Payment Rails
Agentic FinanceInfrastructure and protocols enabling AI agents to send and receive payments — blockchain networks, stablecoins, payment protocols (x402, A2A), and se...
Agent Permission Creep
Policy EnforcementThe gradual, often unnoticed expansion of an AI agent's access rights and spending authority beyond its original scope — analogous to privilege escala...
Agent Permissions
Policy EnforcementThe specific tools and operations an AI agent is authorised to perform — which MCP tools it can invoke, with what arguments, and under what constraint...
Agent Persona
Agentic AIAn agent persona is the defined identity, behavioral style, and capability set of an AI agent — configured through system prompts, available tools, an...
Agent Planning
Agentic AIAgent planning is the process by which an AI agent breaks down a complex goal into a sequence of actionable steps, determines the optimal order of exe...
Agent Protocol
Agentic AIAn agent protocol is a standardized specification for how AI agents communicate, discover capabilities, exchange data, and coordinate actions — enabli...
Agent Rate Limiting
Policy EnforcementRestricting the number or frequency of an agent's tool calls within a time window — preventing runaway loops, excessive resource consumption, and deni...
Agent Reflection
Agentic AIAgent reflection is the capability of an AI agent to evaluate its own outputs, reasoning, and past actions — identifying errors, adjusting strategies,...
Agent Reputation
Agentic AIAgent reputation is a quantifiable measure of an AI agent's trustworthiness and reliability, based on its history of behavior — including transaction ...
Agent Risk Scoring
Security & ComplianceAssigning dynamic risk scores to AI agents based on their behavior, transaction patterns, spending history, and policy compliance — used to adjust spe...
Agent Runtime
Agentic AIAn agent runtime is the execution environment that manages the lifecycle of an AI agent — handling the agent loop, tool execution, state management, c...
Agent Safety
Policy EnforcementPrinciples, practices, and infrastructure preventing AI agents from causing harm — including system damage through unauthorised tool calls, data exfil...
Agent Sandbox
Policy EnforcementAn agent sandbox is a controlled environment that constrains which tools an AI agent can access and how it can use them — preventing the agent from af...
Agent Session
Agentic FinanceA bounded execution context where an agent performs a specific task with its own budget, permissions, and time limits. Financial authority expires whe...
Agent Spend Management
Policy EnforcementThe discipline of setting, monitoring, and enforcing financial boundaries on AI agent activity — encompassing budgets, rate limits, approval workflows...
Agent Spending Limit
Agentic FinanceAn agent spending limit is a configurable cap on how much crypto an AI agent can spend within a scope — per transaction, per time period, per recipien...
Agent State
Agentic AIAgent state is the structured data that an AI agent maintains across execution steps — including conversation history, task progress, accumulated resu...
Agent Supply Chain Attack
AI Agent SecurityAn agent supply chain attack compromises an MCP server, tool package, or agent dependency to inject malicious behaviour that affects all agents using ...
Agent Swarm
Agentic AIAn agent swarm is a collection of AI agents that collaborate through decentralized, emergent coordination patterns — inspired by biological swarms — r...
Agent Sybil Attack
AI Agent SecurityA systemic trap where an attacker fabricates multiple pseudonymous agent identities to disproportionately influence collective decision-making, voting...
Agent Threat Model
AI Agent SecurityA systematic analysis of threats to an AI agent system: what can go wrong, who might attack it, what assets are at risk, and what controls mitigate ea...
Agent Trap
AI Agent SecurityMalicious web content or tool output specifically crafted to hijack an AI agent's behaviour, as defined by Google DeepMind's taxonomy of six trap cate...
Agent Treasury
Agentic FinanceThe central fund pool for an organization's agent operations — from which individual agent budgets are drawn, with controls on allocation, disbursemen...
Agent Wallet
Agentic FinanceAn agent wallet is a cryptocurrency wallet controlled by an AI agent rather than a human, holding funds the agent spends autonomously to execute trans...
Agent Wallet Recovery
Security & ComplianceAgent wallet recovery is the process of restoring access to an AI agent's cryptocurrency wallet after key loss, corruption, or compromise — using back...
Agent-Merchant Relationship
Payments & FintechThe commercial relationship between an AI agent (buyer) and a merchant (seller) — including identity verification, payment authorization, pricing nego...
Agent-to-Agent Payments (A2A Payments)
Agentic FinanceAgent-to-agent payments are transactions between AI agents where neither party is human. One agent pays another for services — compute, data, API acce...
Agent-to-Agent Protocol (A2A)
Agentic AIGoogle's open standard for AI agent discovery, communication, and task delegation across different frameworks — enabling interoperability in the agent...
AgentFacts
Policy EnforcementA portable, verifiable credential standard (from the NANDA protocol) that AI agents carry across platforms to prove their identity, authority, and com...
Agentic AI
Agentic AIAI systems that act autonomously to achieve goals — perceiving environment, making decisions, taking actions without step-by-step human instruction. T...
Agentic Commerce
Agentic FinanceAgentic commerce is the buying and selling of goods, services, and digital resources by AI agents autonomously — encompassing discovery, negotiation, ...
Agentic Commerce Protocol
Payments & FintechAn open standard co-developed by Stripe and OpenAI that defines how AI agents discover products, initiate purchases, and complete checkout on behalf o...
Agentic Commerce Suite
Payments & FintechStripe's integrated product bundle that enables businesses to sell through AI agents via a single integration — covering product discovery, checkout, ...
Agentic Finance
Agentic FinanceAgentic finance refers to the use of autonomous AI agents to execute financial transactions, manage portfolios, process payments, and interact with fi...
Agentic Payments
Agentic FinanceAgentic payments are transactions initiated and executed by AI agents autonomously, without per-payment human approval. They include agent-to-service,...
Agentic Token
Payments & FintechA tokenised payment credential issued by a card network (e.g. Mastercard Agent Pay) that is scoped to a specific AI agent, enabling traceable, governe...
Agentic Wallet
Agentic AIA blockchain wallet controlled or operated by an AI agent, subject to policy constraints (spending limits, allowlists, chain restrictions) enforced at...
Agentic Workflow
Agentic AIAn agentic workflow is a multi-step process where AI agents autonomously plan, execute, and adapt their actions to complete a complex task — making de...
AGNTCon
Agentic AIThe flagship annual conference of the Agentic AI Foundation (AAIF), bringing together the agentic AI ecosystem to discuss open standards, interoperabi...
AI Agent
Agentic AIAn AI agent is an autonomous software system that perceives its environment, reasons about it, and takes actions to achieve specified goals — often us...
AI Alignment
Agentic AIAI alignment is the challenge of ensuring that AI systems — particularly autonomous agents — act in accordance with human values, intentions, and goal...
AI Red Teaming
AI Agent SecurityAdversarial testing of AI agent systems to find vulnerabilities, policy bypasses, and unintended behaviours before attackers do. Includes testing prom...
AI-Initiated Payment
Payments & FintechA payment transaction that is triggered, authorised, and completed by an AI agent acting on delegated authority, without a human present at the point ...
Alert Escalation
Policy EnforcementAlert escalation is the process of routing policy violation alerts to increasingly senior or specialised responders based on the severity, frequency, ...
Alert Rule
Policy EnforcementAn alert rule is a rule that triggers a notification when specific policy events occur — such as repeated denials, unusual tool call patterns, or acce...
Allowance Revocation
Security & ComplianceAllowance revocation is the process of removing a previously granted ERC-20 token approval — setting the allowance back to zero so the spender contrac...
Allowlist (Tools)
AI Agent SecurityAn explicit list of MCP tools an agent is permitted to use. Any tool not on the allowlist is denied by default — the most secure approach to tool acce...
AML (Anti-Money Laundering)
Security & ComplianceAnti-Money Laundering (AML) refers to the laws, regulations, and procedures designed to prevent criminals from disguising illegally obtained funds as ...
Anomaly Detection
Security & ComplianceAnomaly detection is the identification of patterns in data that deviate significantly from expected behavior — used in crypto security to flag suspic...
AP2 (Agent Payments Protocol)
Agentic FinanceAP2 is a payment protocol for AI agent transactions providing standardized negotiation, authorization, and settlement flows between agents and service...
Approval Hijacking
Security & ComplianceApproval hijacking is an attack that exploits existing ERC-20 token approvals to drain funds — either by compromising the approved spender contract or...
Argument Constraint
Policy EnforcementA rule in a YAML policy that restricts the value of a tool call argument. Argument constraints can enforce regex patterns, allowed enumerations, numer...
Argument Masking
Policy EnforcementReplacing sensitive argument values with masked versions in audit logs — for example, card_number: "****1234". Argument masking preserves auditability...
Argument Redaction
Policy EnforcementCompletely removing sensitive argument values from logs and audit trails. Stronger than masking — the value is never persisted in any form. Redaction ...
Argument Schema
Policy EnforcementAn argument schema defines the expected structure, types, and constraints of arguments for an MCP tool, used by Intercept to validate tool calls again...
Argument Validation
Policy EnforcementArgument validation is the process of checking tool call arguments against policy-defined constraints before the call reaches the MCP server — for exa...
Atomic Settlement
Payments & FintechAtomic settlement is a transaction guarantee that ensures an operation either completes entirely or fails entirely — with no possibility of partial ex...
Audit Compliance
Policy EnforcementAudit compliance is the practice of maintaining complete, tamper-evident records of all AI agent tool calls and policy decisions to satisfy regulatory...
Audit Log
Policy EnforcementAn audit log is the structured log output from Intercept containing tool call details, matched policies, evaluation results, timestamps, and contextua...
Audit Trail
Policy EnforcementAn audit trail is a chronological, immutable record of every tool call, policy evaluation, and decision made by Intercept — essential for compliance, ...
AutoGen
Agentic AIAutoGen is an open-source framework by Microsoft for building multi-agent systems where agents collaborate through structured conversations — supporti...
AutoGPT
Agentic AIAutoGPT is an open-source autonomous AI agent that chains LLM calls together to accomplish complex goals with minimal human intervention, pioneering t...
Autonomous Agent
Agentic AIAn autonomous agent is an AI system capable of operating independently over extended periods, making decisions and taking actions — including MCP tool...
Autonomous API Discovery
x402Autonomous API discovery is the capability of AI agents to independently find, evaluate, and begin consuming new APIs — including paid x402 endpoints ...
Autonomous Transaction
Agentic FinanceA financial transaction initiated, constructed, and executed by an AI agent without human approval — the agent independently decides amount, recipient...
B
Backpressure
Policy EnforcementA flow control mechanism where the proxy signals the agent to slow down when downstream MCP servers are overloaded. Backpressure prevents cascading fa...
Base Smart Wallet
Web3 InfrastructureA smart contract wallet on the Base L2 chain providing programmable transaction validation, session keys, and gas sponsorship — commonly used as the u...
Batch Payment
Payments & FintechA batch payment is the execution of multiple payment transactions in a single operation — reducing gas costs, simplifying accounting, and enabling eff...
Behavioural Control Trap
AI Agent SecurityAn agent trap that hijacks an agent's capabilities to force unauthorised actions such as data exfiltration, sub-agent spawning, or embedded jailbreak ...
Biconomy
Web3 InfrastructureBiconomy is a Web3 infrastructure platform providing account abstraction, gasless transactions, and cross-chain user experience solutions — simplifyin...
Blast Radius (Agent)
AI Agent SecurityThe maximum potential damage if an AI agent is compromised or misbehaves. Determined by the agent's tool access, permissions, argument ranges, and the...
Blob Transaction (EIP-4844)
Web3 InfrastructureA blob transaction (EIP-4844) is a new Ethereum transaction type that carries large data 'blobs' at reduced cost — designed specifically for Layer 2 r...
Bonding Curve
DeFiA bonding curve is a mathematical function that determines a token's price based on its supply — automatically increasing price as more tokens are min...
Bridge Exploit
Security & ComplianceA bridge exploit is a security breach of a cross-chain bridge protocol — typically resulting in the theft of locked assets that back wrapped tokens on...
Browser Agent
Agentic AIAn AI autonomously navigating web pages — clicking links, filling forms, executing actions. When accessing e-commerce or financial services, it can in...
Bug Bounty
Security & ComplianceA bug bounty program offers financial rewards to security researchers who discover and responsibly disclose vulnerabilities — creating economic incent...
Burst Limit
Policy EnforcementThe maximum number of tool calls permitted in a short burst before rate limiting kicks in. Burst limits allow temporary spikes in throughput — accommo...
C
CBDC (Central Bank Digital Currency)
Payments & FintechA Central Bank Digital Currency (CBDC) is a digital form of a country's fiat currency issued directly by the central bank — offering programmable mone...
Chain of Thought (CoT)
Agentic AIChain of Thought (CoT) is a prompting technique where an LLM is guided to show its step-by-step reasoning process before arriving at an answer, signif...
Chargeback
Payments & FintechA chargeback is the reversal of a payment by the issuing bank or payment network — a consumer protection mechanism in traditional finance that does no...
CI/CD Policy Enforcement
Policy EnforcementCI/CD policy enforcement is the practice of integrating policy validation — linting, testing, and compliance checks — into continuous integration and ...
Circuit Breaker
Policy EnforcementAn automated safety mechanism that halts an agent's tool calls when anomalous patterns are detected — call rate spikes, repeated denied calls, or erro...
Claude (Anthropic)
Agentic AIClaude is a family of large language models built by Anthropic, designed with a focus on safety, helpfulness, and honesty — widely used for building A...
Coding Agent
Agentic AIA coding agent is an AI system that autonomously writes, modifies, tests, and deploys code — going beyond code completion to handle multi-file changes...
Cognitive State Trap
AI Agent SecurityAn agent trap that corrupts an agent's long-term memory, knowledge bases, and learned behavioural policies — including RAG knowledge poisoning, latent...
Coinbase Commerce
Payments & FintechCoinbase Commerce is a payment platform enabling merchants to accept cryptocurrency payments — providing checkout widgets, APIs, and automatic settlem...
Cold Storage
Security & ComplianceCold storage is the practice of keeping cryptocurrency private keys completely offline and disconnected from the internet — providing maximum security...
Compliance Automation
Security & ComplianceCompliance automation is the use of software systems to automatically enforce regulatory requirements — sanctions screening, transaction monitoring, r...
Compliance Framework
Security & ComplianceA compliance framework is a structured set of guidelines, controls, and best practices — such as SOC 2, GDPR, HIPAA, or PCI DSS — that organisations m...
Compliance Rule
Policy EnforcementA compliance rule is a policy rule specifically designed to enforce regulatory or organisational compliance requirements on AI agent tool calls, ensur...
Compositional Fragment Trap
AI Agent SecurityA systemic trap that partitions a malicious payload into semantically benign fragments distributed across multiple agents, which only reconstitute int...
Computer Use Agent
Agentic AIAn AI controlling a computer interface — clicking, filling forms, navigating websites. When accessing financial interfaces, these agents can initiate ...
Conditional Payment
Agentic FinanceA transaction executing only when specific conditions are met — delivery confirmation, oracle thresholds, time windows, or multi-party approval. Enabl...
Confused Deputy Attack
AI Agent SecurityA confused deputy attack tricks a privileged AI agent into performing actions it shouldn't by exploiting its access to MCP tools. The agent becomes th...
Congestion Trap
AI Agent SecurityA systemic trap where an attacker broadcasts signals that synchronise homogeneous agents into exhaustive demand for limited resources — causing denial...
Constitutional AI
Agentic AIConstitutional AI (CAI) is Anthropic's alignment methodology where AI behavior is guided by a written set of principles (a 'constitution') that the mo...
Container Escape (Agent)
AI Agent SecurityContainer escape in the agent context is when an agent running inside a containerised MCP server breaks out of the container boundary to access the ho...
Content Injection Trap
AI Agent SecurityAn agent trap that exploits the gap between human perception and machine parsing, using hidden text, dynamic rendering, or encoding tricks to inject i...
Content Monetization (AI)
x402Content monetization for AI is the practice of charging AI agents, crawlers, and automated systems for access to digital content — articles, data, res...
Content Safety Filter
AI Agent SecurityA filter applied to MCP tool inputs or outputs that detects and blocks harmful, offensive, or policy-violating content in AI agent interactions, ensur...
Context Poisoning
AI Agent SecurityContext poisoning corrupts an agent's context window by injecting misleading information through MCP tool responses, causing the agent to make flawed ...
Context Window
Agentic AIA context window is the maximum number of tokens an LLM can process in a single interaction, encompassing system prompt, conversation history, retriev...
Contract Verification
Security & ComplianceContract verification is the process of publicly linking a smart contract's deployed bytecode to its human-readable source code on a block explorer — ...
Cooldown Period
Policy EnforcementA mandatory waiting period imposed after a policy violation or rate limit hit before the agent can retry the tool call. Cooldowns prevent rapid retry ...
Credential Stuffing (Agent)
AI Agent SecurityAgent credential stuffing uses an AI agent's tool access to systematically test stolen credentials against services, leveraging the agent's speed and ...
CrewAI
Agentic AICrewAI is an open-source framework for orchestrating autonomous AI agents as collaborative teams ('crews'), where each agent has a defined role, goal,...
Cross-Border Payment
Payments & FintechA cross-border payment is a financial transfer between parties in different countries — an area where crypto and stablecoins offer dramatic improvemen...
Cross-Chain Spending Policy
Agentic FinanceConsistent financial rules for an agent across multiple blockchains — preventing circumvention of per-chain limits by spreading transactions....
Cross-Server Attack
AI Agent SecurityA cross-server attack is when a compromised or malicious MCP server manipulates an AI agent into performing harmful actions on a different, trusted MC...
Cross-Tool Contamination
AI Agent SecurityA vulnerability where one MCP server's tool descriptions influence or override how agents use tools from other servers, enabling stealthy data exfiltr...
Crypto Payment Gateway
Payments & FintechA crypto payment gateway enables merchants to accept cryptocurrency payments through their existing checkout flow — handling wallet interaction, trans...
Custody Risk
Security & ComplianceCustody risk is the possibility of losing cryptocurrency due to failure, compromise, or misconduct of the entity holding the private keys — whether th...
D
Data Exfiltration (Agent)
AI Agent SecurityAgent data exfiltration is when an AI agent is manipulated into sending sensitive data — API keys, user data, internal documents — to an unauthorised ...
Data Integrity
Security & ComplianceData integrity is the assurance that data remains accurate, consistent, and unaltered throughout its lifecycle — a fundamental guarantee provided by b...
Decentralized Identity (DID)
Security & ComplianceDecentralized Identity (DID) is a framework for self-sovereign digital identity where the identity holder controls their own identifier and associated...
Decision Log
Policy EnforcementA decision log is a specific audit log entry that records why a tool call was allowed or denied, including which policy rule matched, what conditions ...
Default Deny Posture
Policy EnforcementA policy configuration where all tool calls are rejected unless an explicit allow rule exists, ensuring that newly discovered or unclassified tools ca...
Defence in Depth (Agent)
AI Agent SecurityA security strategy that layers multiple independent controls — policy enforcement, argument validation, rate limiting, audit logging, and fail-closed...
Delegated Spending
Agentic FinanceDelegated spending authorizes an AI agent to spend crypto on your behalf within constraints — amount, duration, recipients, and token types defined by...
Denial of Service (MCP)
AI Agent SecurityMCP denial of service overwhelms an MCP server or proxy with excessive tool calls to degrade or prevent legitimate agent operations....
Denylist (Tools)
AI Agent SecurityA list of MCP tools an agent is explicitly forbidden from using, with all other tools permitted by default. Less secure than allowlisting but easier t...
Dependency Confusion (MCP)
AI Agent SecurityAn attack where an AI agent resolves an MCP server name to a malicious package instead of the intended one, mirroring the dependency confusion attacks...
Deterministic Enforcement
Policy EnforcementPolicy evaluation that produces identical allow/deny decisions given identical inputs, with no probabilistic reasoning or LLM involvement — ensuring a...
Digital Currency
Payments & FintechDigital currency is any form of money that exists purely in electronic form — encompassing cryptocurrencies, stablecoins, CBDCs, and digital represent...
Disaster Recovery
Security & ComplianceDisaster recovery in crypto encompasses the plans and procedures for recovering access to funds and systems after catastrophic events — including key ...
Dual-Rail Agent Payments
Payments & FintechA payment architecture where AI agents can transact on both crypto rails (stablecoins via x402) and traditional fiat rails (cards via ACP/UCP), choosi...
E
EIP-7702
Blockchain & Crypto FundamentalsEIP-7702 is an Ethereum improvement proposal (activated in the Pectra upgrade) that allows externally owned accounts (EOAs) to temporarily delegate th...
Embedded Finance
Payments & FintechEmbedded finance is the integration of financial services — payments, lending, insurance, banking — directly into non-financial software products and ...
Embedding
Agentic AIAn embedding is a dense vector representation of data in a continuous mathematical space, where semantic similarity is captured by vector proximity — ...
Emergency Shutdown
Security & ComplianceImmediately ceasing all agent financial operations — freezing wallets, revoking tokens, blocking all transactions. The most extreme safety measure for...
Encryption
Security & ComplianceEncryption is the process of converting data into an unreadable format using cryptographic algorithms — protecting information confidentiality so that...
EntryPoint Contract
Web3 InfrastructureThe EntryPoint contract is the singleton smart contract at the core of ERC-4337 account abstraction — receiving bundled UserOperations, validating the...
Enum Constraint
Policy EnforcementRestricting a tool call argument to a predefined set of allowed values. Enum constraints enforce closed vocabularies — for example, currency must be o...
ERC-6551 (Token Bound Accounts)
Blockchain & Crypto FundamentalsERC-6551 (Token Bound Accounts) is a standard that gives every NFT its own smart contract wallet — enabling NFTs to own assets, interact with dApps, a...
Escrow
Payments & FintechEscrow is a financial arrangement where a third party holds funds until predetermined conditions are met — implemented in DeFi through smart contracts...
Excessive Agency
AI Agent SecurityExcessive agency is when an AI agent has more tool access, permissions, or autonomy than required for its task. It is a core vulnerability that amplif...
F
Fail-Closed
Policy EnforcementFail-closed is a security posture where if Intercept cannot evaluate a policy — due to a configuration error, crash, or unexpected condition — the too...
Fail-Closed Enforcement
Policy EnforcementA security posture where tool calls are blocked by default when the policy engine or proxy is unavailable, ensuring that enforcement failures never re...
Fail-Open
Policy EnforcementFail-open is a security posture where if policy evaluation fails for any reason, the tool call is allowed to proceed — prioritising availability over ...
Few-Shot Learning
Agentic AIFew-shot learning is a technique where an LLM is given a small number of examples in the prompt to guide its behavior — enabling task-specific perform...
Fiat Off-Ramp
Payments & FintechA fiat off-ramp is a service that converts cryptocurrency back into traditional currency — enabling users to realize crypto gains, pay bills, and move...
Fiat On-Ramp
Payments & FintechA fiat on-ramp is a service that converts traditional currency (USD, EUR, etc.) into cryptocurrency — the entry point for new users moving from the tr...
Financial Guardrail
Security & ComplianceAny mechanism preventing AI agents from causing financial harm — spending controls, budget limits, recipient restrictions, velocity monitoring, circui...
Fine-Tuning
Agentic AIFine-tuning is the process of further training a pre-trained language model on a domain-specific dataset to improve its performance on particular task...
Fireblocks
Web3 InfrastructureFireblocks is an enterprise-grade digital asset custody and operations platform — providing institutional-quality key management, transaction signing,...
Float
Payments & FintechFloat is the time period during which funds are in transit between sender and receiver — representing temporarily unavailable money that in traditiona...
Forbidden Argument
Policy EnforcementA policy rule that blocks tool calls containing a specific argument or argument value. Forbidden argument constraints prevent agents from using danger...
Formal Verification
Security & ComplianceFormal verification is the mathematical proof that a smart contract's code correctly implements its specification — providing the highest level of ass...
Function Calling
MCP & Tool InfrastructureFunction calling is the capability of large language models to generate structured output that specifies which external function to invoke and with wh...
G
GDPR (Agent Context)
Security & ComplianceGDPR in an agent context refers to the application of the General Data Protection Regulation to AI agent operations — specifically how agents processi...
GitOps (Policy)
Policy EnforcementGitOps for policy is the practice of using git as the single source of truth for AI agent security policies. All policy changes go through pull reques...
Global Policy
Policy EnforcementA global policy applies across all MCP servers in an Intercept configuration, enabling universal rules like rate limiting, mandatory audit logging, or...
GPT (OpenAI)
Agentic AIGPT (Generative Pre-trained Transformer) is OpenAI's family of large language models that have become foundational to the AI agent ecosystem through s...
Grounding
Agentic AIGrounding in AI refers to techniques that anchor a language model's outputs to verifiable, real-world data sources — reducing hallucination and improv...
H
Hallucination
Agentic AIIn AI, hallucination refers to when a language model generates confident, plausible-sounding output that is factually incorrect or fabricated — a fund...
HIPAA (Agent Context)
Security & ComplianceHIPAA in an agent context refers to the application of the Health Insurance Portability and Accountability Act to AI agents — specifically how agents ...
Honeypot Contract
Security & ComplianceA honeypot contract is a malicious smart contract designed to appear vulnerable or profitable — luring victims to interact with it, only to trap their...
HTTP 402 Payment Required
x402HTTP 402 is a status code reserved in the HTTP specification for digital payment systems. Defined in HTTP/1.1 but never standardized — until x402 gave...
Human-in-the-Loop (HITL)
Agentic FinanceHITL requires explicit human approval for certain agent actions — particularly high-value or high-risk transactions — providing safety checkpoints wit...
Human-in-the-Loop Trap
AI Agent SecurityAn agent trap that commandeers the agent to attack the human overseer by exploiting cognitive biases — using the agent as a channel to manipulate huma...
I
Immutable Audit
Policy EnforcementAn immutable audit is an audit log that cannot be modified or deleted after creation. This tamper-evidence is essential for compliance and forensic in...
Immutable Audit Log
Security & ComplianceA tamper-proof record of all agent spending decisions anchored on-chain or cryptographically secured — entries cannot be modified or deleted after cre...
Incident Response
Security & ComplianceIncident response is the organized process of detecting, analyzing, containing, and recovering from security incidents — including established procedu...
Incident Response (Agent)
AI Agent SecurityThe process of detecting, investigating, and recovering from security incidents involving AI agents — including policy violations, data breaches, prom...
Indirect Prompt Injection
Security & ComplianceMalicious instructions embedded in external data sources (websites, documents, APIs) that agents process unknowingly, potentially triggering unauthori...
Indirect Tool Injection
AI Agent SecurityIndirect tool injection is an attack where malicious instructions are embedded in data returned by an MCP tool, which then influences the AI agent's s...
Inference
Agentic AIInference is the process of running a trained AI model on new inputs to generate outputs — the production phase where models serve real requests, as o...
Infrastructure-as-Code
Policy EnforcementInfrastructure-as-code (IaC) is the practice of managing and provisioning infrastructure through declarative configuration files rather than manual pr...
Input Sanitisation
AI Agent SecurityThe process of cleaning and validating arguments that an AI agent passes to MCP tools before execution, preventing injection attacks, path traversal, ...
Insecure Tool Defaults
AI Agent SecurityMCP tools that ship with permissive default settings — such as unrestricted file access, no authentication, or broad argument ranges — creating vulner...
Instant Settlement
Payments & FintechInstant settlement is the completion of a financial transaction in real-time — a native property of blockchain that eliminates the multi-day settlemen...
Intent Fingerprinting
Agentic FinanceIntent fingerprinting creates a cryptographic fingerprint of an agent's stated transaction intent and verifies it against the actual transaction submi...
Intercept (PolicyLayer)
Policy EnforcementIntercept is an open-source Go binary (Apache 2.0) that acts as a transparent MCP proxy, sitting between MCP clients and MCP servers to enforce YAML-d...
Interchange Fee
Payments & FintechAn interchange fee is the charge that a merchant's bank pays to the cardholder's bank for each card transaction — a major cost of traditional payments...
Invoice
Payments & FintechAn invoice is a request for payment specifying amount, recipient, and terms — in crypto, often implemented as on-chain payment requests or structured ...
ISO 20022
Payments & FintechISO 20022 is an international standard for financial messaging that defines a common language for payment data — increasingly adopted by banks, SWIFT,...
K
Key Management
Security & ComplianceKey management encompasses the practices and systems for securely generating, storing, distributing, rotating, and revoking cryptographic keys — the f...
Kill Switch
Policy EnforcementAn emergency mechanism that instantly blocks all agent tool calls — denying every request with a single action for immediate harm cessation when an ag...
Know Your Agent (KYA)
Security & ComplianceThe practice of verifying an AI agent's identity, operator, capabilities, and authorization before granting financial access — the agent-era equivalen...
KYAPay Protocol
Agentic FinanceKYAPay (Know Your Agent Pay) is an emerging protocol combining agent identity verification with payment processing, enabling merchants to authenticate...
KYC (Know Your Customer)
Security & ComplianceKnow Your Customer (KYC) is the regulatory process of verifying a user's identity before providing financial services — required by law in most jurisd...
L
LangChain
Agentic AILangChain is an open-source framework for building applications powered by large language models, providing abstractions for chains, agents, memory, a...
LangGraph
Agentic AILangGraph is a framework by LangChain for building stateful, multi-step AI agent applications using directed graphs, where nodes represent computation...
Large Language Model (LLM)
Agentic AIA Large Language Model (LLM) is a neural network trained on vast text corpora that can understand, generate, and reason about natural language, servin...
LayerZero
Web3 InfrastructureLayerZero is an omnichain interoperability protocol enabling cross-chain messaging and token transfers between 50+ blockchains — using a modular secur...
Least Agency
Agentic AIThe principle that AI agents should be granted only the minimum autonomy required for their task — not just what they can access (least privilege), bu...
Least Privilege (MCP)
AI Agent SecurityApplying the principle of least privilege to MCP tool access: AI agents should only have access to the specific tools and argument ranges required for...
Lightning Network
Payments & FintechThe Lightning Network is a Layer 2 payment channel network built on Bitcoin that enables instant, low-cost Bitcoin transactions — making Bitcoin pract...
LLM Router
Agentic AIAn LLM router is a system that intelligently directs AI requests to different models based on task complexity, cost, latency requirements, or domain —...
Log Forwarding
Policy EnforcementLog forwarding is the practice of sending audit logs from the MCP proxy to external logging systems — such as SIEM platforms, S3 buckets, or Elasticse...
Log Retention
Policy EnforcementLog retention refers to policies governing how long audit logs of AI agent tool calls are stored. Different regulations require different retention pe...
M
Machine-to-Machine Payments
x402Machine-to-machine (M2M) payments are financial transactions initiated, authorised, and settled entirely by software systems — AI agents, APIs, IoT de...
Malicious MCP Server
AI Agent SecurityA malicious MCP server is an MCP server deliberately designed to exfiltrate data, execute harmful operations, or manipulate the AI agent through poiso...
Man-in-the-Middle (MCP)
AI Agent SecurityA man-in-the-middle (MITM) attack on MCP intercepts and potentially modifies protocol traffic between client and server. This is relevant when using n...
Mastercard Agent Pay
Payments & FintechMastercard's agentic payments system that issues network-level agentic tokens to AI agents, enabling them to initiate and complete card transactions w...
MCP Client
MCP & Tool InfrastructureAn MCP client is the component within an AI agent or application that connects to MCP servers, discovers available tools and resources, and invokes th...
MCP Context Middleware
MCP & Tool InfrastructureA protocol-aware intermediary that inspects, transforms, or enriches MCP traffic between clients and servers — performing functions like policy enforc...
MCP Elicitation
MCP & Tool InfrastructureA protocol feature allowing MCP servers to request additional structured input from users during an interaction, creating a dynamic feedback channel t...
MCP Prompt
MCP & Tool InfrastructureAn MCP prompt is a reusable, parameterised prompt template exposed by an MCP server that provides standardised workflows and interaction patterns for ...
MCP Resource
MCP & Tool InfrastructureAn MCP resource is a read-only data source exposed by an MCP server that provides context to AI agents — such as files, database records, API response...
MCP Rug Pull
AI Agent SecurityAn attack where an MCP server silently modifies a tool's description or behaviour after the client has approved it, turning a previously trusted tool ...
MCP Sampling
MCP & Tool InfrastructureMCP sampling is a capability in the Model Context Protocol that allows an MCP server to request LLM completions through the connected client — enablin...
MCP Server
MCP & Tool InfrastructureA service exposing capabilities to AI agents via the Model Context Protocol — tools, resources, and prompts that any MCP-compatible agent can discover...
MCP Server Registry
MCP & Tool InfrastructureA centralised index of available MCP servers with metadata about capabilities, versioning, and verification status, functioning as the discovery layer...
MCP Server Spoofing
AI Agent SecurityMCP server spoofing is impersonating a legitimate MCP server to intercept or manipulate tool calls between the client and the real server....
MCP Supply Chain Attack
AI Agent SecurityExploitation of the MCP server distribution chain — through compromised npm packages, malicious SDK updates, or dependency injection — to gain executi...
MCP Tool
MCP & Tool InfrastructureAn MCP tool is an executable capability exposed by an MCP server, described with a name, description, and JSON Schema parameters, that AI agents can d...
MCP Tool Annotations
MCP & Tool InfrastructureServer-declared metadata hints (readOnlyHint, destructiveHint, idempotentHint, openWorldHint) that describe a tool's behavioural properties, introduce...
MCP Tool Call
MCP & Tool InfrastructureA JSON-RPC request from an AI agent to execute a specific function exposed by an MCP server, containing the tool name, arguments, and optional metadat...
MCP Tool Sprawl
Agentic AIThe uncontrolled proliferation of MCP tools across an organisation, where agents accumulate access to hundreds of tools without centralised inventory,...
MCP Transport
MCP & Tool InfrastructureThe communication layer between MCP clients and servers, currently supporting stdio (local process) and Streamable HTTP (remote services), which deter...
MCP Virtual Server
MCP & Tool InfrastructureA gateway-configured logical endpoint that exposes a curated subset of tools from one or more upstream MCP servers, scoped by team, use case, or acces...
Merchant Category Code (MCC)
Payments & FintechA Merchant Category Code (MCC) is a four-digit code assigned to businesses by card networks (Visa, Mastercard) that classifies the type of goods or se...
Merchant Onboarding
Payments & FintechMerchant onboarding is the process of enabling a business or service to accept cryptocurrency payments — including wallet setup, payment integration, ...
Metered API Access
x402Metered API access is a billing model where API consumers pay based on actual usage — per request, per token generated, per byte transferred, or per c...
MiCA Regulation
Security & ComplianceMiCA (Markets in Crypto-Assets) is the European Union's comprehensive regulatory framework for cryptocurrency — establishing rules for issuers, servic...
Micro-Authorization
Agentic FinanceIndividually authorizing each small agent payment in real-time rather than batch approval. Every micropayment passes through full policy evaluation....
Micropayment
x402A micropayment is a financial transaction for a very small amount — typically under $1 and sometimes fractions of a cent — enabled by low-fee payment ...
Model Context Protocol (MCP)
MCP & Tool InfrastructureAn open standard by Anthropic defining how AI agents connect to external tools and data sources. MCP provides a universal interface for discovering an...
Money API
x402A money API is a programmatic interface that gives software direct access to financial operations — sending payments, checking balances, managing acco...
Money Transmission
Payments & FintechMoney transmission is the regulated activity of transferring funds on behalf of others — requiring licenses in most jurisdictions and a key compliance...
MPC Wallet
Security & ComplianceAn MPC (Multi-Party Computation) wallet distributes private key material across multiple parties or devices, requiring a threshold of them to collabor...
Multi-Agent System
Agentic AIA multi-agent system (MAS) is an architecture where multiple AI agents collaborate, compete, or coordinate to accomplish tasks that would be difficult...
Multi-Chain Agent
Agentic AIAn AI agent that operates across multiple blockchain networks — holding assets, executing transactions, and interacting with protocols on different ch...
Multi-Modal Agent
Agentic AIA multi-modal agent is an AI system that can process and generate multiple types of data — text, images, audio, video — enabling richer interaction wi...
Multi-Signature Wallet (Multisig)
Security & ComplianceA multi-signature (multisig) wallet is a smart contract wallet that requires a minimum number of private key signatures (e.g., 2-of-3, 3-of-5) to auth...
N
NIST AI Agent Standards
Policy EnforcementThe voluntary standards initiative launched by NIST's Centre for AI Standards and Innovation (CAISI) in February 2026, covering agent authentication, ...
Non-Custodial Controls
Agentic FinanceNon-custodial controls enforce spending rules without taking custody of private keys or funds. The control layer validates transactions while the oper...
O
OFAC Compliance
Security & ComplianceOFAC compliance refers to adherence to the rules and regulations of the US Office of Foreign Assets Control, which administers economic sanctions prog...
On-Chain Policy Enforcement
Agentic FinanceUsing smart contracts to verify spending rules on the blockchain — tamper-proof, transparent, and independently verifiable by anyone....
Open Banking
Payments & FintechOpen banking is a regulatory and technology framework that requires banks to share customer financial data with authorized third parties through APIs ...
Open Weights Model
Agentic AIAn open-weights model is an AI model whose trained parameters are publicly released, allowing anyone to download, run, fine-tune, and deploy it — dist...
OpenAI Agents SDK
Agentic AIThe OpenAI Agents SDK is a lightweight, production-focused framework for building AI agents with built-in support for tool calling, agent handoffs, gu...
Operational Security (OpSec)
Security & ComplianceOperational security (OpSec) in crypto encompasses the practices and procedures that protect private keys, accounts, and systems from compromise — ext...
Oracle Feed
DeFiAn oracle feed is a continuous stream of real-world data delivered to blockchain smart contracts — most commonly price data for financial assets, upda...
Oracle Manipulation
Security & ComplianceOracle manipulation is an attack that corrupts the price data fed to smart contracts — causing DeFi protocols to make incorrect decisions about liquid...
Output Filtering
AI Agent SecurityInspecting and filtering MCP tool responses before they are returned to the AI agent, preventing sensitive data leakage, blocking context poisoning at...
Over-Permissioned Agent
AI Agent SecurityAn AI agent configured with access to more MCP tools or broader argument ranges than its task requires, violating the principle of least privilege and...
OWASP Top 10 for LLM Applications
AI Agent SecurityThe Open Web Application Security Project's list of the ten most critical security risks for applications built with large language models. The standa...
P
Pay-Per-Inference
x402Pay-per-inference is a pricing model where each AI model inference request (an LLM completion, image generation, embedding, or classification) is paid...
Pay-Per-Token Pricing
x402Pay-per-token pricing is a billing model for large language models and other generative AI services where the consumer pays based on the exact number ...
Pay-Per-Use API
x402A pay-per-use API charges per request using crypto micropayments rather than flat subscriptions. With x402, AI agents pay per call using stablecoins i...
Payable Endpoint
x402A payable endpoint is an HTTP API endpoint that gates access behind an x402 payment — returning 402 Payment Required with structured pricing to unpaid...
Paymaster
Web3 InfrastructureA paymaster is a smart contract in the ERC-4337 account abstraction system that sponsors gas fees on behalf of smart account users or agents — enablin...
Payment API
Payments & FintechA payment API is a programmatic interface that enables applications and agents to initiate, process, and manage financial transactions — abstracting t...
Payment Attestation
Agentic FinanceA cryptographic proof that an agent payment was authorized and policy-compliant, verifiable by third parties without accessing internal policy configu...
Payment Channel
Payments & FintechA payment channel is an off-chain protocol that enables multiple transactions between two parties with only two on-chain transactions — one to open th...
Payment Compliance
Payments & FintechPayment compliance is the adherence to legal, regulatory, and industry requirements governing payment operations — including sanctions screening, AML ...
Payment Dispute
Payments & FintechA payment dispute in crypto is a disagreement between parties about whether a payment obligation has been satisfied — handled through smart contract e...
Payment Facilitator
Agentic FinanceIn the x402 stack, a payment facilitator processes and settles agent payments for merchants, handling crypto complexity so merchants don't manage wall...
Payment Finality
Payments & FintechPayment finality is the point at which a payment becomes irrevocable and the recipient can consider the funds fully received — varying significantly a...
Payment Fraud
Payments & FintechPayment fraud encompasses unauthorized or deceptive transactions designed to steal funds — a major problem in traditional finance that blockchain's cr...
Payment Gateway
Payments & FintechA payment gateway is the technology that securely processes payment transactions between a customer and merchant — in crypto, managing wallet connecti...
Payment Intent
Payments & FintechA payment intent is a data object representing the intention to make a payment — including amount, currency, recipient, and metadata — created before ...
Payment Netting
Payments & FintechPayment netting is the offsetting of multiple payments between parties to settle only the net difference — reducing the number and volume of actual tr...
Payment Orchestration
Payments & FintechPayment orchestration is the coordination of payment flows across multiple providers, chains, and methods — routing each transaction through the optim...
Payment Processor
Payments & FintechA payment processor is a service that handles the technical and financial aspects of accepting payments — in crypto, enabling merchants to accept cryp...
Payment Protocol
Payments & FintechA payment protocol is a standardized set of rules and message formats that define how payments are initiated, authenticated, processed, and verified b...
Payment Rails
Payments & FintechPayment rails are the underlying infrastructure and protocols that facilitate the movement of money between parties — including traditional systems (A...
Payment Receipt
Payments & FintechA payment receipt in crypto is the on-chain transaction record that serves as proof of payment — including sender, recipient, amount, timestamp, and t...
Payment Splitter Contract
Payments & FintechA payment splitter is a smart contract that automatically distributes received payments among multiple recipients according to predefined shares — use...
Payment Splitting
Payments & FintechPayment splitting is the automatic division of incoming payments among multiple recipients according to predefined rules — implemented in smart contra...
Payment Streaming
Payments & FintechPayment streaming is the continuous, real-time flow of tokens from one address to another at a defined rate — enabling per-second payments rather than...
Payment Token
Payments & FintechA payment token is a digital token specifically designed and used for making payments — distinct from utility tokens (access to services) and security...
Payment Verification
Payments & FintechPayment verification is the process of confirming that a cryptocurrency payment was executed correctly — verifying the transaction was included in a b...
Payment-Aware Proxy
x402A payment-aware proxy is a network intermediary that understands x402 payment flows — intercepting 402 responses, applying spending policies, managing...
Payroll
Payments & FintechCrypto payroll is the payment of employee salaries and contractor fees in cryptocurrency or stablecoins — increasingly used by Web3 companies and offe...
PCI DSS (Agent Context)
Security & CompliancePCI DSS in an agent context refers to the application of the Payment Card Industry Data Security Standard to AI agents — specifically how agents makin...
Peer-to-Peer Payment
Payments & FintechA peer-to-peer (P2P) payment is a direct transfer of funds between two individuals without a financial intermediary — the original vision of Bitcoin a...
Penetration Testing
Security & CompliancePenetration testing (pentesting) in crypto is the authorized simulation of attacks against smart contracts, infrastructure, and operational processes ...
Per-Agent Scoping
Policy EnforcementApplying distinct policy rules to individual AI agents or agent identities, ensuring that one agent's permissions, rate limits, and budget constraints...
Per-Tool Rate Limit
Policy EnforcementA rate limit applied to a specific MCP tool rather than globally across all tools. Allows operators to set different throughput ceilings for different...
Per-User Rate Limit
Policy EnforcementRate limits scoped to individual users or agent identities rather than applied globally. Ensures one agent cannot consume another's quota, enabling fa...
Permission Creep (Agent)
AI Agent SecurityThe gradual accumulation of MCP tool permissions over time as new capabilities are added to an agent's configuration but old, unnecessary ones are nev...
Permit2
Blockchain & Crypto FundamentalsPermit2 is a token approval protocol by Uniswap that provides a unified, more secure allowance system for ERC-20 tokens — featuring built-in expiratio...
Persona Hyperstition
AI Agent SecurityA semantic manipulation attack where a narrative about an AI model's identity is seeded into content that re-enters the agent's context via retrieval,...
Phishing Attack
Security & ComplianceA phishing attack in crypto is a social engineering scam that tricks users into revealing private keys, seed phrases, or signing malicious transaction...
PII Detection (Agent)
AI Agent SecurityDetecting personally identifiable information in MCP tool call arguments or responses to prevent AI agents from inadvertently exfiltrating, processing...
Pimlico
Web3 InfrastructurePimlico is an ERC-4337 infrastructure provider offering bundler and paymaster services — enabling developers to build account abstraction features int...
Point of Sale (POS)
Payments & FintechA point-of-sale (PoS) system for crypto is the hardware and software enabling merchants to accept cryptocurrency payments in physical retail locations...
Policy Action (Allow/Deny/Log)
Policy EnforcementPolicy actions are the three possible outcomes of policy evaluation in Intercept: allow (the tool call proceeds to the MCP server), deny (the tool cal...
Policy Condition
Policy EnforcementA policy condition is a constraint within a policy rule that evaluates tool call arguments against defined criteria (e.g. amount < 1000, branch != "ma...
Policy Diff
Policy EnforcementA policy diff is the comparison between two versions of a policy file to see exactly what changed — which rules were added, removed, or modified. Esse...
Policy Dry Run
Policy EnforcementA policy dry run is a mode where Intercept evaluates policies and logs the decisions that would be made, but does not enforce them — all tool calls ar...
Policy Engine
Policy EnforcementA policy engine evaluates requests against predefined rules and returns allow/deny decisions. In Intercept, the policy engine evaluates every MCP tool...
Policy Evaluation Pipeline
Policy EnforcementThe policy evaluation pipeline is the sequence of steps Intercept follows to evaluate every tool call: match server, match tool, evaluate conditions, ...
Policy File
Policy EnforcementA policy file is the physical YAML file (e.g. stripe.yaml, github.yaml) that contains policy rules for one or more MCP servers, stored alongside your ...
Policy Hot Reload
Policy EnforcementPolicy hot reload is the ability to update policy files without restarting Intercept, with changes taking effect on the next tool call to enable zero-...
Policy Inheritance
Policy EnforcementPolicy inheritance is the mechanism by which tool-level policies inherit from server-level policies, which in turn inherit from global policies, with ...
Policy Linting
Policy EnforcementPolicy linting is the static analysis of YAML policy files to catch syntax errors, unreachable rules, conflicting conditions, type mismatches, and oth...
Policy Override
Policy EnforcementA policy override is a mechanism to temporarily or permanently bypass a policy rule, granting an exception for a specific tool call, agent, or time wi...
Policy Priority
Policy EnforcementPolicy priority is the order in which policies are evaluated when multiple rules could match a tool call, with higher-priority rules overriding lower-...
Policy Rollback
Policy EnforcementPolicy rollback is the process of reverting to a previous version of a YAML policy when a new policy causes issues — such as blocking legitimate tool ...
Policy Rule
Policy EnforcementA policy rule is a single rule within a policy file that specifies an action (allow, deny, or log) for a specific tool or tool pattern, optionally wit...
Policy Template
Policy EnforcementA pre-built, reusable YAML policy configuration for common agent use cases — such as coding assistants, data analysis agents, or DevOps automation. Te...
Policy Testing
Policy EnforcementPolicy testing is the practice of validating policies against predefined test cases before deployment, ensuring they behave as expected — allowing wha...
Policy Versioning
Policy EnforcementPolicy versioning is the practice of tracking changes to YAML policy files over time using version control (git), enabling audit trails of who changed...
Policy Violation
Policy EnforcementWhen an AI agent attempts a tool call that violates a YAML-defined policy — calling a denied tool, passing disallowed arguments, or exceeding rate lim...
Policy Violation Event
Policy EnforcementA policy violation event is emitted when a tool call is denied by policy, signalling that an agent attempted an operation outside its permitted bounda...
Policy-as-Code
Policy EnforcementPolicy-as-code is the practice of defining security and compliance policies as version-controlled, machine-readable code rather than manual configurat...
Policy-as-Code (MCP)
Policy EnforcementExpressing MCP tool access rules as version-controlled, machine-readable configuration (typically YAML) rather than UI-configured settings, enabling a...
Pre-Authorization
Agentic FinanceAn agent requests approval before committing funds. The policy engine evaluates and returns an authorization token for the actual payment execution....
Principle of Least Privilege
Security & ComplianceThe principle of least privilege states that every entity (user, agent, process) should have only the minimum permissions necessary to perform its int...
Private Transaction
Security & ComplianceA private transaction is a blockchain transaction where some or all details — sender, recipient, amount, or data — are concealed from public view whil...
Privilege Escalation
Security & CompliancePrivilege escalation is a security exploit where an entity gains access to tools or capabilities beyond what was initially authorised — either by expl...
Programmable Money
Payments & FintechCryptocurrency with embedded rules governing how it can be spent — enabling conditions like spending limits, approved recipients, and time locks direc...
Programmable Wallet
Agentic FinanceA wallet with built-in logic enforcing transaction rules — spending limits, recipient restrictions, multi-party approvals — at the wallet level. Smart...
Prompt Chaining
Agentic AIPrompt chaining is the technique of connecting multiple LLM calls in sequence, where each call's output feeds into the next call's input — enabling co...
Prompt Engineering
Agentic AIPrompt engineering is the practice of designing and optimizing input text to guide large language models toward producing desired outputs, including t...
Prompt Injection
Security & ComplianceAn attack where malicious input manipulates an AI agent's behaviour by injecting instructions that override its programming. Successful prompt injecti...
Prompt Injection (Tool-Layer)
AI Agent SecurityTool-layer prompt injection embeds malicious instructions in MCP tool descriptions, schemas, or return values to hijack agent behaviour. It targets th...
Prompt Leaking
AI Agent SecurityPrompt leaking is when an MCP tool or server extracts the agent's system prompt, user instructions, or conversation context through crafted tool inter...
PSD2
Payments & FintechPSD2 (Payment Services Directive 2) is European regulation mandating that banks provide API access to customer accounts for authorized third parties —...
PydanticAI
Agentic AIPydanticAI is a Python agent framework by the creators of Pydantic that emphasizes type safety, structured outputs, and production reliability — using...
R
RAG Knowledge Poisoning
AI Agent SecurityA cognitive state attack that injects fabricated statements into retrieval corpora so agents treat attacker-authored content as verified fact, corrupt...
Range Constraint
Policy EnforcementRestricting a numeric tool call argument to a minimum and/or maximum value. Range constraints set safe operational bounds — for example, ensuring a tr...
Rate Limiting (Security)
Security & ComplianceRate limiting is a security control that restricts the frequency of operations — transactions per minute, API calls per hour, or spending events per d...
Rate Limiting (Tool Calls)
Policy EnforcementConstraining how frequently an AI agent can invoke specific MCP tools within a defined time window. Rate limiting prevents runaway agents, protects do...
ReAct Agent
Agentic AIA ReAct agent follows the Reasoning + Acting paradigm, alternating between thinking steps (reasoning about what to do) and action steps (executing too...
Real-Time Gross Settlement (RTGS)
Payments & FintechReal-Time Gross Settlement (RTGS) is a payment system that settles transactions individually and immediately — the backbone of central bank payment sy...
Real-Time Policy Evaluation
Agentic FinanceChecking an agent's transaction against all rules at request time — before signing. Decisions in milliseconds for immediate allow/deny....
Reasoning Agent
Agentic AIA reasoning agent is an AI agent that uses explicit step-by-step thinking — such as chain-of-thought or extended thinking — to break down complex prob...
Recurring Payment
Payments & FintechA recurring payment is an automated, periodic transfer of funds — such as subscriptions, rent, or salaries — that in crypto requires specific smart co...
Reentrancy Attack
Security & ComplianceA reentrancy attack exploits a smart contract vulnerability where an external call allows the attacker to re-enter the contract before the first execu...
Regex Validation (Policy)
Policy EnforcementUsing regular expressions in YAML policies to validate tool call argument values before they reach the MCP server. Regex constraints can enforce email...
Regulatory Compliance
Security & ComplianceRegulatory compliance is the adherence to laws, regulations, and industry standards governing cryptocurrency operations — including KYC/AML requiremen...
Reinforcement Learning
Agentic AIReinforcement Learning (RL) is a machine learning paradigm where an agent learns optimal behavior through trial and error, receiving rewards or penalt...
Remittance
Payments & FintechRemittance is the transfer of money by a foreign worker to their home country — a massive global market ($650B+ annually) where crypto stablecoins off...
Replay Attack (Tool Call)
AI Agent SecurityA replay attack on tool calls captures and re-sends a valid MCP tool call to execute it again, potentially duplicating financial transactions, destruc...
Required Argument
Policy EnforcementA policy rule enforcing that a specific argument must be present in a tool call. Required argument constraints prevent tools from being called with mi...
Resource Exhaustion (Agent)
AI Agent SecurityAgent resource exhaustion is when an AI agent consumes excessive compute, memory, API calls, or tokens — either through manipulation or runaway behavi...
Response Filtering
Policy EnforcementInspecting and modifying MCP tool responses before they reach the agent. Response filtering can strip sensitive data, block certain patterns, redact i...
Response Validation
Policy EnforcementChecking MCP tool responses against expected schemas or patterns before passing them to the agent. Response validation catches malformed, unexpected, ...
Responsible AI
AI Agent SecurityThe practice of developing and deploying AI systems in ways that are safe, fair, transparent, and accountable. For AI agents, this includes enforcing ...
Retrieval-Augmented Generation (RAG)
Agentic AIRetrieval-Augmented Generation (RAG) is an architecture that enhances LLM responses by retrieving relevant documents from an external knowledge base a...
RLHF
Agentic AIReinforcement Learning from Human Feedback (RLHF) is a training technique that aligns LLM outputs with human preferences by training a reward model on...
Rogue Agent
AI Agent SecurityAn AI agent that has deviated from its intended behaviour — whether through prompt injection, misconfiguration, or emergent behaviour — and is now per...
Role-Based Access Control (RBAC)
Security & ComplianceRole-Based Access Control (RBAC) is a security model that assigns permissions to roles rather than individual entities, and then assigns roles to user...
S
Safe (Gnosis Safe)
Web3 InfrastructureSafe (formerly Gnosis Safe) is the most widely deployed smart contract wallet platform, providing multi-signature authorization, modular extensions, a...
Sanctions Screening
Security & ComplianceSanctions screening is the process of checking cryptocurrency addresses and transactions against sanctions lists maintained by authorities like OFAC, ...
Sandbox Economy
Agentic FinanceA framework from Google DeepMind's 'Virtual Agent Economies' paper describing the emergent economic layer where AI agents transact autonomously, chara...
Sandbox Escaping
AI Agent SecuritySandbox escaping is when an AI agent or MCP tool breaks out of its intended execution environment to access system resources, files, or networks it sh...
Scoped Token
Agentic FinanceA scoped token grants an AI agent limited, time-bound spending permission — restricting amount, recipient, duration, and token type unlike unrestricte...
Secret Scanning (Tool Output)
AI Agent SecurityScanning MCP tool responses for accidentally exposed secrets — API keys, passwords, tokens, private keys, and connection strings — before they enter t...
Security Audit
Security & ComplianceA security audit is a comprehensive review of a system's security posture — examining code, architecture, access controls, and operational practices t...
Security Boundary (Agent)
AI Agent SecurityThe logical perimeter around an AI agent's permitted operations, defined by which MCP servers it can connect to, which tools it can invoke, and what a...
Self-Custody
Blockchain & Crypto FundamentalsSelf-custody is the practice of holding and managing your own cryptocurrency private keys, maintaining direct, exclusive control over your digital ass...
Semantic Kernel
Agentic AISemantic Kernel is Microsoft's open-source SDK for integrating LLMs into applications — providing abstractions for AI plugins, memory, and planning th...
Semantic Manipulation Trap
AI Agent SecurityAn agent trap that manipulates input data distributions to corrupt an agent's reasoning without issuing overt commands — using biased phrasing, author...
Semantic Routing
Agentic AISemantic routing is the technique of directing requests, queries, or tasks to the appropriate handler (agent, tool, or model) based on the semantic me...
Server-Level Policy
Policy EnforcementA server-level policy applies default rules to all tools on a given MCP server, establishing baseline permissions that can be overridden by more speci...
Session Key
Web3 InfrastructureA temporary cryptographic key granting an AI agent limited, time-bound permission to sign transactions from a smart account. Session keys expire autom...
Settlement
Payments & FintechSettlement is the final, irrevocable transfer of asset ownership between parties — the point at which a transaction is fully completed and can no long...
Shadow AI Agent
AI Agent SecurityAn unauthorised AI agent operating within an organisation, connecting to MCP servers without IT or security team oversight. The agent equivalent of sh...
Shadow MCP
Agentic AIMCP servers deployed by employees without IT oversight, giving AI agents ungoverned access to production systems, databases, and APIs — the 2026 equiv...
SIEM Integration
Security & ComplianceSIEM integration is the process of connecting MCP proxy audit logs to a Security Information and Event Management system for real-time threat detectio...
Sliding Window Rate Limit
Policy EnforcementA rate limiting approach that uses a rolling time window rather than fixed intervals. Instead of resetting a counter every minute on the minute, it co...
Smart Account
Blockchain & Crypto FundamentalsA smart account is a blockchain account implemented as a smart contract rather than a simple key pair (EOA), enabling programmable transaction validat...
Smart Contract Audit
Security & ComplianceA smart contract audit is a professional security review of smart contract code to identify vulnerabilities, logic errors, and potential exploits befo...
Smart Contract Exploit
Security & ComplianceA smart contract exploit is the use of a vulnerability in smart contract code to steal funds or manipulate protocol behavior — one of the primary secu...
Smart Wallet
Web3 InfrastructureA smart wallet is a user-facing cryptocurrency wallet built on smart contract technology (account abstraction) that provides enhanced features like so...
SOC 2 Compliance
Security & ComplianceSOC 2 is a compliance framework developed by the AICPA for service organisations, focused on five trust service criteria: security, availability, proc...
Social Engineering
Security & ComplianceSocial engineering in crypto is the manipulation of people into performing actions or divulging confidential information — exploiting human psychology...
Spend Card
Payments & FintechA spend card (or crypto debit card) enables users to spend cryptocurrency at traditional merchants by automatically converting crypto to fiat at the p...
Spend Management
Agentic FinanceSpend management tracks, controls, and optimizes AI agent crypto spending — budgeting, policy enforcement, real-time monitoring, analytics, and report...
Spending Analytics
Agentic FinanceData-driven insights into agent financial activity — patterns, cost per task, budget utilization, violation trends, and ROI across an agent fleet....
Spending Anomaly
Agentic FinanceAn agent spending pattern that deviates significantly from established baselines — unusual amounts, unexpected recipients, abnormal timing, or velocit...
Spending Cap
Agentic FinanceA hard upper limit on total agent spending within a scope — per transaction, hour, day, contract, or session. Once reached, all transactions blocked u...
Spending Controls
Agentic FinanceSpending controls are programmable rules limiting how, when, and where an AI agent can spend crypto — per-transaction limits, rolling budgets, recipie...
Spending Delegation Chain
Agentic FinanceTracks how spending authority flows from operator through intermediate agents to the final spender, ensuring delegated authority never exceeds origina...
Spending Policy DSL
Agentic FinanceA specialized language for defining agent spending rules — readable, auditable, and composable without general-purpose code....
Spending Receipt
Agentic FinanceA verifiable record of an authorized agent transaction — policy evaluation result, parameters, approval status, blockchain confirmation. Proof of poli...
Spending Report
Agentic FinanceA structured summary of AI agent financial activity over a time period — total spend, transaction count, policy compliance rate, budget utilization, a...
Spending Velocity
Agentic FinanceThe rate at which an agent spends — transactions per minute, dollars per hour. Monitoring velocity detects anomalies like runaway loops or compromised...
Stablecoin Micropayment Rails
x402Stablecoin micropayment rails are the combination of dollar-pegged stablecoins (primarily USDC) and low-cost Layer 2 blockchain networks (primarily Ba...
Stablecoin Payments
Agentic FinanceUsing price-stable cryptocurrencies (USDC, USDT) pegged to fiat for transactions. Preferred by agents for predictable value, instant settlement, and p...
Stablecoin Settlement
Payments & FintechStablecoin settlement is the finalization of a payment using stablecoins on a blockchain — where the transaction is confirmed in a block and the recip...
State Channel
Payments & FintechA state channel is an off-chain protocol that enables multiple state transitions between parties with minimal on-chain interaction — generalizing paym...
Steerable Agent Market
Agentic FinanceA deliberately designed marketplace for AI agent services where incentive structures, safety mechanisms, and policy guardrails are built in from the s...
String Length Constraint
Policy EnforcementRestricting the length of a string argument in a tool call. String length constraints prevent excessively long inputs that could be used for prompt in...
Stripe Crypto
Payments & FintechStripe Crypto is Stripe's suite of cryptocurrency-related products — including fiat-to-crypto on-ramps, USDC payouts, and crypto payment acceptance th...
Structured Output
Agentic AIStructured output refers to LLM responses formatted in machine-readable schemas like JSON or typed objects, enabling reliable integration with downstr...
Sub-Cent Transaction
x402A sub-cent transaction is a financial payment worth less than one US cent ($0.01), made economically viable by Layer 2 blockchain networks where trans...
Subscription Payment
Payments & FintechA subscription payment is a recurring automated charge for ongoing access to a service — a payment model that requires specific smart contract pattern...
Supply Chain Attack
Security & ComplianceA supply chain attack compromises software by targeting its dependencies, build tools, or distribution channels — injecting malicious code through tru...
System Prompt
Agentic AIA system prompt is a privileged instruction set provided to an LLM that defines the model's role, behavior, constraints, and output format — serving a...
Systemic Trap
AI Agent SecurityAn agent trap that seeds the environment with inputs designed to trigger macro-level failures via correlated agent behaviour — including congestion tr...
T
Tacit Collusion (Agent Context)
AI Agent SecurityA systemic trap where environmental signals act as correlation devices, synchronising anticompetitive agent behaviour — such as coordinated pricing or...
Task Decomposition
Agentic AITask decomposition is the process by which an AI agent breaks a complex goal into smaller, manageable sub-tasks that can be executed sequentially or i...
Threat Modeling
Security & ComplianceThreat modeling is a structured security analysis process that identifies potential threats to a system, evaluates their likelihood and impact, and de...
Threshold Signature Scheme (TSS)
Security & ComplianceA threshold signature scheme (TSS) is a cryptographic protocol where a signing key is split into n shares, and any t (threshold) of those shares can c...
Throttling
Policy EnforcementDeliberately slowing down agent tool call throughput rather than hard-blocking. A softer alternative to outright denial that allows agents to continue...
Token Allowance
Blockchain & Crypto FundamentalsA token allowance is the maximum amount of ERC-20 tokens that a specific spender address (typically a smart contract) is authorized to transfer from a...
Token Bucket (Rate Limiting)
Policy EnforcementA rate limiting algorithm where tokens are added to a bucket at a fixed rate. Each tool call consumes a token; calls are denied when the bucket is emp...
Token Exfiltration
AI Agent SecurityToken exfiltration is extracting authentication tokens, session tokens, or API tokens from an AI agent's environment through malicious tool calls or p...
Tokenization (AI)
Agentic AITokenization in AI refers to breaking text into smaller units (tokens) that a language model can process — typically subword pieces that balance vocab...
Tokenized Deposit
Payments & FintechA tokenized deposit is a bank deposit represented as a digital token on a blockchain — maintaining the regulatory protections of traditional banking w...
Tool Call Rate Limiting
Policy EnforcementEnforcing a maximum number of tool invocations within a time window, applied per-tool, per-agent, or globally, to prevent runaway execution, cost over...
Tool Calling
MCP & Tool InfrastructureTool calling is the mechanism by which a large language model generates structured requests to invoke external tools, APIs, or functions — enabling th...
Tool Description Mismatch
AI Agent SecurityA discrepancy between what a tool's metadata claims it does and what the underlying code actually executes, found in approximately 13% of MCP servers ...
Tool Misuse
AI Agent SecurityWhen an AI agent invokes a legitimate tool in an unsafe way — through ambiguous prompts, manipulated input, or unexpected tool chaining — causing data...
Tool Name Collision
AI Agent SecurityTool name collision occurs when multiple MCP servers expose tools with the same name, creating ambiguity about which tool the AI agent actually invoke...
Tool Poisoning
AI Agent SecurityTool poisoning is an attack where a malicious actor manipulates an MCP tool's description, schema, or metadata to trick an AI agent into performing un...
Tool Risk Category
MCP & Tool InfrastructureA classification label (Read, Write, Execute, Destructive, Financial) assigned to an MCP tool based on its potential impact, used to enforce graduated...
Tool Shadowing
AI Agent SecurityTool shadowing is an attack where a malicious MCP server exposes a tool with the same name as a trusted server's tool, silently intercepting calls the...
Tool Squatting
AI Agent SecurityTool squatting is registering an MCP server with a name deliberately similar to a popular, trusted server to intercept agent tool calls. It is the MCP...
Tool Use
MCP & Tool InfrastructureTool use refers to an AI agent's ability to interact with external systems — calling APIs, executing code, querying databases, writing files, or perfo...
Tool-Level Policy
Policy EnforcementA tool-level policy targets a specific MCP tool (e.g. create_payment_intent on the Stripe server) rather than an entire server, providing the most gra...
Transaction Approval Flow
Agentic FinanceA configurable workflow determining how agent transactions are authorized — auto-approval for low-risk, multi-step human review for high-value or unus...
Transaction Monitoring
Security & ComplianceTransaction monitoring is the ongoing surveillance of cryptocurrency transactions to detect suspicious patterns, policy violations, and anomalous beha...
Transaction Policy
Agentic FinanceA transaction policy is a declarative rule set defining valid agent transactions — specifying allowed amounts, recipients, tokens, contract interactio...
Transaction Signing
Blockchain & Crypto FundamentalsTransaction signing is the process of using a private key to generate a cryptographic signature that authorizes a blockchain transaction, proving the ...
Transaction Simulation
Security & ComplianceTransaction simulation is the process of executing a blockchain transaction against the current state without actually committing it — previewing the ...
Transformer
Agentic AIA Transformer is the neural network architecture underlying all modern large language models, using self-attention mechanisms to process sequential da...
Travel Rule
Security & ComplianceThe Travel Rule is a regulatory requirement that financial institutions share sender and recipient information for transactions above certain threshol...
Treasury Management
Payments & FintechTreasury management is the strategic management of an organization's financial assets, liquidity, and risk — in crypto, this includes managing token h...
Trust Boundary
AI Agent SecurityA boundary in a system where the level of trust changes. In MCP architectures, trust boundaries exist between the agent and each MCP server, between I...
Trusted Agent Protocol
Payments & FintechVisa's open framework, co-developed with Cloudflare, that cryptographically verifies an AI agent is legitimate and acting on a user's behalf before au...
Turnkey
Web3 InfrastructureTurnkey is a non-custodial key management platform that provides secure, programmatic access to private keys through Trusted Execution Environments (T...
Two-Factor Authentication (2FA)
Security & ComplianceTwo-factor authentication (2FA) is a security measure requiring two different verification methods to access an account — typically combining somethin...
Two-Phase Tool Enforcement
Policy EnforcementAn enforcement pattern where the proxy atomically reserves a budget or counter increment before forwarding a tool call, then commits on success or rol...
V
Verifiable Credential
Security & ComplianceA verifiable credential (VC) is a tamper-evident, cryptographically verifiable digital claim made by an issuer about a subject — following the W3C sta...
Vibe Coding
Agentic AIVibe coding is the practice of building software by describing desired behavior to an AI coding assistant in natural language, iterating through conve...
Virtual Agent Economy
Agentic FinanceThe emergent economic system in which autonomous AI agents produce, consume, and exchange value at scales and speeds beyond direct human oversight, as...
Virtual Card
Payments & FintechA virtual card is a programmatically generated payment card number with configurable spending limits, merchant restrictions, and expiration — used for...
W
Wallet Drainer
Security & ComplianceA wallet drainer is malicious software that exploits token approvals, signed messages, or compromised keys to transfer all assets from a victim's cryp...
Wire Transfer
Payments & FintechA wire transfer is a direct bank-to-bank electronic transfer of funds — the traditional method for large domestic and international payments, increasi...
X
x402 Auto-Policy
x402x402 auto-policy is the automatic creation of spending policies when an agent encounters a new x402-enabled endpoint for the first time — applying con...
x402 Circuit Breaker
x402An x402 circuit breaker is a safety mechanism that automatically halts all x402 payment activity for an agent or agent fleet after detecting repeated ...
x402 Domain Pinning
x402x402 domain pinning (also called recipient pinning) is a security control that associates specific payment recipient addresses with specific domains —...
x402 Exact Payment Scheme
x402The exact payment scheme is the first and primary payment scheme in the x402 protocol. It transfers a specific, predetermined amount of tokens from cl...
x402 Facilitator
x402An x402 facilitator is a server in the x402 protocol that handles payment verification and on-chain settlement on behalf of resource servers. It expos...
x402 Foundation
x402The x402 Foundation is the governance organisation co-founded by Coinbase and Cloudflare to steward the x402 open payment protocol — promoting adoptio...
x402 Payment Header
x402x402 payment headers are the HTTP headers that carry payment negotiation data in the x402 protocol. The server sends payment requirements via the PAYM...
x402 Payment Streaming
x402x402 payment streaming is the pattern of continuous or high-frequency resource consumption paired with periodic x402 settlement — using schemes like d...
x402 Payment Verification
x402x402 payment verification is the process by which a resource server (or its facilitator) confirms that a client's signed payment payload is valid — ch...
x402 Pricing Negotiation
x402x402 pricing negotiation is the process by which a resource server communicates its accepted payment terms — including amounts, tokens, networks, and ...
x402 Protocol
x402x402 is an open protocol built by Coinbase that enables AI agents to make payments over HTTP using the 402 Payment Required status code. Agents autono...
x402 Resource Server
x402An x402 resource server is any HTTP server that requires payment for access to its resources using the x402 protocol. It responds with HTTP 402 and pa...
x402 Settlement Flow
x402The x402 settlement flow is the multi-step process by which a client's payment payload is verified, the requested resource is served, and the payment ...
Z
Zero Trust (Agent)
AI Agent SecurityA security model where no AI agent, tool call, or MCP server is inherently trusted. Every tool invocation is verified against policy regardless of its...
Zero-Knowledge Proof (ZKP)
Security & ComplianceA zero-knowledge proof (ZKP) is a cryptographic method that allows one party to prove knowledge of information to another party without revealing the ...
Zero-Shot Learning
Agentic AIZero-shot learning is an LLM's ability to perform a task with only instructions and no examples — relying entirely on the model's pre-trained knowledg...
ZeroDev
Web3 InfrastructureZeroDev is a smart account infrastructure platform that provides the Kernel smart account (a modular ERC-4337 account), along with bundler, paymaster,...