Coinbase Breathes New Life Into Long-Forgotten Web Payment Code
By: decrypt|2025/05/08 09:15:01
0
Share
Coinbase Breathes New Life Into Long-Forgotten Web Payment Code Coinbase's new open-source standard uses a once-forgotten status code to integrate stablecoin payments directly into websites and APIs. In brief x402 enables users to make payments without registration, emails, or complex signatures. The protocol only uses a single line of code, simplifying how crypto could be used as a native payment on the web. It also targets AI agents that previously couldn't navigate traditional payment systems. Decrypt’s Art, Fashion, and Entertainment Hub. Since the early days of the internet, HTTP 402, a payment status code that showed "Payment Required," has existed as a placeholder in web protocols. It was a digital relic that once promised an internet with built-in payment capabilities but was never fully realized. Three decades later, crypto exchange Coinbase, through its Developer Platform, has brought it back to life with x402, a new, open-source protocol that creates a native payment layer for the web. "Imagine a future where crypto is the default to pay for anything," Nemil Dalal, lead developer at Coinbase's Developer Platform, said on X. Launched on Tuesday, the new protocol enables users to make payments without registration, emails, or complex signatures. "We've architected it in a way where it works for any blockchain," Dalal claimed . How it works x402 uses the older HTTP 402 payment status code to let clients, whether human users or AI agents, know that they need to pay up. They could then authorize a stablecoin payment request. Once the server verifies the signature, it broadcasts the transaction to a blockchain and provides access to the content or API, based on a request. Asked about possible security loopholes, Erik Reppel, head of engineering at Coinbase Developer Platform, told Decrypt that a “built-in verification step” was included to protect “against replay attacks and ensure each request is securely paid for.” On its whitepaper , Coinbase developers claim x402 would remove "account and billing friction from payments" and enable "true pay-per-use access without subscriptions, prepaid credits, or manual invoicing." But while x402 opens prospects, the tech behind it could face bottlenecks once adopted for a wider audience. Those interested in adopting x402 would need to iron out implementation, Nader Dabit, director of developer relations at EigenLayer, explained to Decrypt . Given a scenario where a user encounters an x402 payment request without a compatible crypto wallet or stablecoin balance, Dabit noted potential issues. "This would just error out and the developer would have to take it into account in their application flow," Dabit explained. In response to questions on usability, Coinbase’s Reppel claims things have improved. “We believe crypto finally delivers a user experience that rivals, and even surpasses, traditional options,” he said. Open standard for agentic finance Despite the possible challenges to security and user experience, the new protocol addresses a bottleneck in AI-driven finance and commerce . "Giving agents access to external context and APIs is a high-friction process, with lots of manual configuration that prevents agents from autonomously accessing external services," Coinbase Developer Platform said in a tweet. With a single line of code , x402 could transform how AI agents operate on-chain and eliminate outdated payment models. Coinbase Developer Platform also said it plans to further decentralize x402's roadmap, inviting community contributions to "create an open standard to drive forward agentic finance." Edited by Sebastian Sinclair Daily Debrief Newsletter
You may also like

Business Opportunities of Tokenized Stocks
In this article, we will outline the lifecycle of tokenized stocks, analyze the current market landscape, and highlight the emerging business opportunities.

In-depth research report on the Resolv protocol hacking incident, who is the final payer?
This incident reveals a fundamental weakness in Delta's stablecoin - the coupling point between the minting logic and off-chain signatures/oracles is the most vulnerable attack surface of the system. Any capital efficiency design of "1 dollar minted for 1 dollar" must be predicated on extremely rigo...

Crypto Market Sees Large Liquidations: $272 Million in Long Positions Affected
Key Takeaways In the last 24 hours, $272 million worth of contracts were liquidated across the entire crypto…

Whale Increases BTC Shorts and Bets on Crude Oil: A Strategic Crypto Move
Key Takeaways A prominent whale, known as “UnRektCapital,” has strategically escalated its short position in Bitcoin while simultaneously…

Hackers in Brazil Use Fake Google Play Store to Steal Cryptocurrency
Key Takeaways Hackers in Brazil are exploiting fake Google Play Store pages to spread Android malware. Infected devices…

Exchanging 200,000 for nearly 100 million, DeFi stablecoins face another attack
DeFi project teams cannot assume that the modules they control are necessarily secure.

The underlying business agreement of the trillion-dollar Agent economy: Understanding ERC-8183, it's not just about payments, but the future
This article systematically analyzes the technical principles and commercial value of the ERC-8183 protocol from the dimensions of technical architecture, core mechanisms, application scenarios, and ecological collaboration.

When Wall Street's ETH begins to "yield": Looking at the asset properties of Ethereum from BlackRock's ETHB
ETH is undergoing a paradigm shift from a "volatile asset" to a "yield-generating cash flow asset."

The Power of Agency: The Agentic Wallet and the Next Decade of Wallets
In 1984, Apple killed the command line with a mouse. In 2026, Agent is killing the mouse.

Understanding x402 and MPP in One Article: Two Routes for Agent Payments
x402 makes payments within the agreement, while MPP makes system-level payments.

Particle Founder: The entrepreneurial insights I have gained the most from in the past year
Stop lean startup, stop lightning entrepreneurship, and think carefully about what your product aspirations are.

Huang Renxun's latest podcast transcript: The future of Nvidia, the development of embodied intelligence and agents, the explosion of inference demand, and the public relations crisis of artificial intelligence
The competition in the future is not just about whose model is larger or whose computing power is stronger, but also about who understands the industry better, who can embed AI more deeply into real processes, and who can organize these capabilities into a runnable and scalable system.

OKX Ventures Research Report: AI Agent Economic Infrastructure Research Report (Part 1)
The existing infrastructure is hostile to the Agent economy. Agents can think and act independently at the "capability level," but at the "economic level," they are still locked into infrastructure designed for humans.

The migration of settlement rights: B18 and the institutional starting point of on-chain banks
In the traditional system, banks decide the settlement; in the on-chain system, code begins to take over this responsibility.

From Tencent and Circle: Looking at the Simple and Difficult Questions of Investment
The AI narrative continues to ferment, but the recent performance of related stocks varies, with some in the midst of summer and others as if in winter.

The second half of stablecoins no longer belongs to the crypto circle
What Coinbase doesn't want, Mastercard is eager to buy.

Cursor "Shell" Kimi Controversy Reversed: From Copyright Infringement Allegations to Authorized Collaboration, China's Open Source Model Once Again Becomes a Global AI Foundation
Cursor was accused of being based on Kimi K2.5, which sparked controversy, and was later confirmed to be compliant through Fireworks AI due diligence.

The Real Reason Tokens Don't Sell: 90% of Crypto Projects Overlook Investor Relations
Provide an Investor Relations Best Practices Guide for Crypto Projects.
Business Opportunities of Tokenized Stocks
In this article, we will outline the lifecycle of tokenized stocks, analyze the current market landscape, and highlight the emerging business opportunities.
In-depth research report on the Resolv protocol hacking incident, who is the final payer?
This incident reveals a fundamental weakness in Delta's stablecoin - the coupling point between the minting logic and off-chain signatures/oracles is the most vulnerable attack surface of the system. Any capital efficiency design of "1 dollar minted for 1 dollar" must be predicated on extremely rigo...
Crypto Market Sees Large Liquidations: $272 Million in Long Positions Affected
Key Takeaways In the last 24 hours, $272 million worth of contracts were liquidated across the entire crypto…
Whale Increases BTC Shorts and Bets on Crude Oil: A Strategic Crypto Move
Key Takeaways A prominent whale, known as “UnRektCapital,” has strategically escalated its short position in Bitcoin while simultaneously…
Hackers in Brazil Use Fake Google Play Store to Steal Cryptocurrency
Key Takeaways Hackers in Brazil are exploiting fake Google Play Store pages to spread Android malware. Infected devices…
Exchanging 200,000 for nearly 100 million, DeFi stablecoins face another attack
DeFi project teams cannot assume that the modules they control are necessarily secure.