Threat Model
The complete failure-mode map for AI agent commerce. Attack classes, detection posture, and structural vs. heuristic defenses.
Read →pop-pay is the guardrail that sits between the agent and the payment rail. The card never enters the LLM context. The policy was written before the transaction happened.
Every AI agent that holds a card is a variance waiting to be filed. Prompt injection, tool-use drift, over-permissioned keys — the failure modes are already documented. The question is who watches the transaction at runtime.
Card data in the LLM context window survives logs, prompt caches, and intermediate tool calls.
An attacker-controlled page instructs the agent to exfiltrate or redirect funds. The model complies.
A "buy a book" instruction becomes a $4,000 gift card order. No runtime check catches the category mismatch.
When a transaction goes wrong, provenance is the first thing asked for. Most agent frameworks keep none.
Credentials live in an AES-256-GCM sealed vault. The agent receives a handle, not a secret. Structural, not a prompt instruction the model can forget.
Amount, merchant category, velocity, and destination are checked against a declarative policy at the moment of transaction — not hoped for in a system prompt.
Approved, denied, flagged — each decision carries a signed, replayable record. Provenance is the product.
npm install pop-pay # installs as a global binary and library pip install pop-pay # same binary, Python parity build The complete failure-mode map for AI agent commerce. Attack classes, detection posture, and structural vs. heuristic defenses.
Read →How pop-pay is tested. 500-payload corpus, category criteria, reproducible harness, results reported openly.
Read →Key derivation, sealed storage, canary file, and the public encrypted challenge. AES-256-GCM at rest with compiled-salt hardening.
Read →The bounty program is currently in an internal red-team phase. Public tiers and Hall of Fame will open after internal hardening completes. Until then, coordinated disclosure is the path — findings are acknowledged and triaged on a 72-hour SLA.
security@pop-pay.ai — PGP key on request. Please include a reproducible PoC and the commit SHA you tested against.vault.enc.challenge — public encrypted file shipped with the package. Extraction reports fall under the same coordinated-disclosure channel.