Alpha Release: Wallet authentication coming soon. All receipts are free during the preview period.

The Machine-Readable Handshake

Legal & Financial Guardrails for Autonomous Agents

Enable your agents to commit to terms, negotiate access, and settle micro-payments in USDC on Base — fully automated and cryptographically verifiable.

payload.json
{
  "agent_id": "agent-gpt4-0x7a...",
  "action_type": "data_access",
  "terms_url": "https://api.co/tos",
  "action_context": {
    "endpoint": "/v1/charges",
    "method": "POST"
  }
}
SHA-256
Ed25519
VERIFIED
Certificate of Consent
openterms
Agentagent-gpt4-0x7a...
Actiondata_access
Hasha1b2c3d4e5f6...9z
SignatureMEUCIQDx8n2o...YkFw==
StatusPending...

How It Works

Three steps. Deterministic. Verifiable.

01

Canonicalize

Agent payload is sorted, null-stripped, and serialized into deterministic canonical JSON.

02

Hash & Sign

SHA-256 hash computed, then signed with Ed25519. The signature is bound to the exact payload.

03

Verify & Settle

Anyone can verify the receipt using the public key. USDC is debited atomically.

Privacy Guard

Built-in Privacy

Agents can be talkative; we ensure they aren't leaky. Openterms automatically scans and rejects receipts containing emails or SSNs, preventing sensitive data from being etched into your permanent transaction logs.

Email pattern: [a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}
SSN pattern: \d{3}-\d{2}-\d{4}
PII Scanner Output
action_context.endpoint
/v1/charges
action_context.method
POST
action_context.user_email
[email protected]Email detected
action_context.ssn
123-45-6789SSN detected
action_context.amount
0.001
Receipt REJECTED — 2 PII violations found. Sensitive data will not be etched into permanent logs.

Block receipts exceeding $0.05 USDC per transaction

{
  "type": "max_amount_per_receipt",
  "limit": 50000
}
Receipt: $0.03 USDCALLOW
Receipt: $0.08 USDCDENY
Policy Engine

Programmable Guardrails

Set hard limits on what your agents can do. The policy engine supports 7 rule types with deterministic evaluation, deny short-circuit, and escalation paths.

Max spend per receipt
Daily spend caps
Action type whitelist/blacklist
Domain prefix requirements
Escalation thresholds

Technical Proof of Work

Production-ready API. Try it now.

terminal
curl -X POST https://openterms.com/v1/receipts \
  -H "Authorization: Bearer openterms_sk_..." \
  -H "Content-Type: application/json" \
  -H "Idempotency-Key: unique-req-001" \
  -d '{
    "agent_id": "agent-gpt4-0x7a3b...",
    "action_type": "data_access",
    "terms_url": "https://api.example.com/tos/v2",
    "action_context": {
      "endpoint": "/v1/charges",
      "method": "POST",
      "scope": "read:transactions"
    }
  }'
Verification Explorer

Verify Any Receipt

Paste a canonical hash or full receipt JSON to verify its cryptographic integrity in real-time.

Simple Pricing

Pay per receipt. Settled in USDC on Base L2.

Free during alpha
Starter
$0.00
per receipt (alpha)
Ed25519 signatures
PII detection
Public verification
Admin console
Recommended
Pro
$0.00
per receipt (alpha)
Everything in Starter
Policy engine
Unlimited receipts
Priority support