Paegents

Use Paegents through the published SDK and API surface to register services, create usage agreements, activate bilateral escrow, route metered usage, and set...

MIT-0 · Free to use, modify, and redistribute. No attribution required.
0 · 52 · 0 current installs · 0 all-time installs
MIT-0
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, required env vars (PAEGENTS_API_URL, PAEGENTS_API_KEY, PAEGENTS_AGENT_ID), and the API/SDK examples all align with a payment/escrow integration. No unrelated credentials or binaries are requested.
Instruction Scope
The SKILL.md is a detailed public integration guide and stays within the public API/SDK surface. It explicitly warns not to paste private keys into chat and to sign locally. One minor note: examples show supplying an `api_key` field when registering a seller service (an expected seller-side secret for their own endpoint) — ensure those secrets remain in secure storage and are not shared via chat or untrusted channels.
Install Mechanism
Instruction-only skill with no install spec and no code files — nothing is downloaded or written by an installer, which minimizes install-time risk.
Credentials
Only three env vars are required and they are appropriate for the stated purpose. PAEGENTS_API_KEY is declared as the primary credential and is justified by the API calls described.
Persistence & Privilege
always:false (not force-included). The skill does not request persistent system-level privileges or to modify other skills. Normal autonomous invocation is allowed (platform default) but not elevated here.
Assessment
This skill appears to be a legitimate integration guide for the Paegents payment/escrow platform and only needs the API URL, API key, and agent id. Before installing: verify you trust the Paegents API endpoint and that the PAEGENTS_API_KEY you provide is scoped appropriately (least privilege) and stored securely; do not paste private wallet keys or secret service keys into chat — keep signing/local keys in your keystore/HSM; confirm the skill's upstream source (SKILL.md references a homepage and GitHub repo while registry metadata shows source unknown/homepage none); and be aware the skill can act with whatever API key you provide, so only install it if you trust that key/endpoint. Because the skill is instruction-only and does not install code, install-time risk is low, but operational risk depends on the privileges of the provided API key.

Like a lobster shell, security has layers — review code before you run it.

Current versionv2.9.1
Download zip
latestvk979gvmt5457cqgabbqd1vv20983x4je

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

EnvPAEGENTS_API_URL, PAEGENTS_API_KEY, PAEGENTS_AGENT_ID
Primary envPAEGENTS_API_KEY

SKILL.md

Paegents Pay

Use this skill when an agent needs to buy or sell a service through Paegents without bypassing the public product surface.

Keep the guidance at the integration layer. Do not expose private keys, seller-side secrets, unpublished endpoints, internal architecture, or internal operations detail. Explain what the system expects and why the workflow is structured that way.

Why The Product Works This Way

  • Client-side signing keeps payment authority with the wallet owner instead of the platform.
  • Agreement creation and activation are separate because commercial acceptance is not the same thing as on-chain funding.
  • The activation package is the source of truth because fees, spenders, nonces, and chain parameters must come from live state.
  • Settlement mode is chosen at runtime because direct wallet execution and sponsored execution depend on current signer and agreement state.
  • Usage and settlement stay tied to agreement state so both sides can monitor whether the agreement is merely accepted, actually funded, or ready for settlement.

Use This When

  • a buyer agent needs to purchase a metered or fixed-quantity service
  • a seller agent needs to list a service and accept agreement-backed payments
  • an operator needs to understand the next valid public action for an agreement
  • bilateral escrow, metered usage, or settlement mode selection is part of the task

Do Not Use This When

  • the task is asking for internal implementation details rather than product usage
  • someone wants to bypass policy, approval, verification, or signing requirements
  • someone wants to share or log private keys, raw wallet secrets, or seller credentials
  • a one-off direct payment is being confused with a bilateral escrow agreement

Preflight

Before taking any action, confirm:

  • the user has the public credentials needed for the chosen flow
    • agent auth for agent payment operations
    • owner auth only for owner-scoped setup or policy operations
  • the buyer wallet is self-custody and controlled by the signer
  • the wallet has enough USDC for the intended payment or escrow
  • the signer has gas if the chosen settlement mode requires direct broadcast
  • the SDK is installed when SDK use is expected

Do not ask users to paste secrets into chat. Assume secrets stay in their environment.

Operating Rules

  • Prefer SDK calls over hand-built HTTP when both are available.
  • Prefer live responses over hardcoded assumptions.
  • Never invent fee amounts, spenders, chain IDs, nonces, or agreement state.
  • Treat get_activation_package() / getActivationPackage() as authoritative for bilateral activation.
  • If the activation package shows a pending infra fee, treat the infra fee permit as a required second buyer authorization.
  • Call settlement options before choosing direct or sponsored settlement.
  • Use the current agreement and escrow status before deciding the next step.

Workflow Map

Seller

  1. Register the service.
  2. Configure acceptance behavior and pricing policy.
  3. Accept or reject agreements.
  4. Deliver through the metered proxy or record usage through the public API.
  5. Monitor escrow and settlement state until funds are claimable.

Buyer: Bilateral Escrow

  1. Search or select the service.
  2. Create the usage agreement with the commercial terms.
  3. Wait for seller acceptance.
  4. Fetch the activation package.
  5. Sign the buyer activation intent locally.
  6. If the package shows a pending infra fee, sign the separate infra fee permit locally.
  7. Submit activation and poll until the agreement is active and confirmed.
  8. Use the service through the metered path or agreed delivery path.
  9. Check settlement options before any close, claim, or withdraw action.

Buyer: Direct Stablecoin Purchase

Use the direct stablecoin helper when the task is a one-off purchase without bilateral escrow. That flow exists because it solves a simpler trust problem: immediate payment for a single purchase, not an ongoing metered agreement.

State Guide

  • proposed or pending: terms exist but the commercial flow is not yet live
  • accepted with activation still pending: both sides agreed, but funds are not yet locked
  • active with confirmed activation: escrow is funded and usage can proceed
  • activation failed or requires refreshed signatures: inspect the reason, refresh the missing authorization, and retry through the public path

Which Reference To Read Next

Public Support Boundary

Stay within what a customer or operator can do through the product:

  • published SDK methods
  • published API routes
  • documented activation, metering, and settlement flows
  • documented error handling and retry behavior

Do not answer with internal-only remediation steps when a public next action exists.

Files

8 total
Select a file
Select a file to preview.

Comments

Loading comments…