<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: t49qnsx7qt-kpanks</title>
    <description>The latest articles on DEV Community by t49qnsx7qt-kpanks (@t49qnsx7qtkpanks).</description>
    <link>https://dev.to/t49qnsx7qtkpanks</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3852351%2F0cd45664-bf1b-4522-8a46-b4306e7a85c1.png</url>
      <title>DEV Community: t49qnsx7qt-kpanks</title>
      <link>https://dev.to/t49qnsx7qtkpanks</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/t49qnsx7qtkpanks"/>
    <language>en</language>
    <item>
      <title>phonepe's integration agent and the next step</title>
      <dc:creator>t49qnsx7qt-kpanks</dc:creator>
      <pubDate>Sun, 10 May 2026 14:32:45 +0000</pubDate>
      <link>https://dev.to/t49qnsx7qtkpanks/phonepes-integration-agent-and-the-next-step-2837</link>
      <guid>https://dev.to/t49qnsx7qtkpanks/phonepes-integration-agent-and-the-next-step-2837</guid>
      <description>&lt;p&gt;phonepe launched an ai integration agent that helps merchants integrate its payment gateway in minutes instead of weeks.&lt;/p&gt;

&lt;p&gt;this is the pattern: agents are already handling the work around payments — integration, reconciliation, invoice matching, fraud review. the next step is agents handling the payments themselves.&lt;/p&gt;

&lt;p&gt;the gap is governance. an agent that writes integration code can be reviewed by a human before deploy. an agent that moves money can't wait for human approval on every transaction — it needs mandate-gated autonomy.&lt;/p&gt;

&lt;p&gt;mnemopay's fiscalgate is built for this. the agent submits a payment intent. fiscalgate checks the mandate (spend limit, merchant whitelist, time window). if it passes, the transaction clears. if it fails, the agent gets a rejection with a reason code. no human in the loop, but no blind delegation either.&lt;/p&gt;

&lt;p&gt;phonepe's integration agent proves agents can handle complex, multi-step workflows faster than humans. the next version of that agent won't just integrate the payment gateway — it'll use it. and when it does, it'll need a governance layer that can say no.&lt;/p&gt;

&lt;p&gt;mnemopay ships that layer today. two-phase commit, merkleaudit tamper-evident logs, agent fico reputation scoring. the infrastructure is ready. the agents are coming.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>payments</category>
      <category>automation</category>
    </item>
    <item>
      <title>the grok 200k incident and the missing governance layer</title>
      <dc:creator>t49qnsx7qt-kpanks</dc:creator>
      <pubDate>Sun, 10 May 2026 14:32:18 +0000</pubDate>
      <link>https://dev.to/t49qnsx7qtkpanks/the-grok-200k-incident-and-the-missing-governance-layer-5bj1</link>
      <guid>https://dev.to/t49qnsx7qtkpanks/the-grok-200k-incident-and-the-missing-governance-layer-5bj1</guid>
      <description>&lt;p&gt;a twitter user tricked grok into sending 200,000 dollars. it worked. but most production ai agents can't clear a four dollar invoice.&lt;/p&gt;

&lt;p&gt;the gap isn't technical capability — it's governance. grok had access but no guardrails. most agents have guardrails but no access. neither is shippable.&lt;/p&gt;

&lt;p&gt;mnemopay's fiscalgate sits between the agent and the money. two-phase commit: the agent declares intent, fiscalgate checks mandate + balance + merkleaudit chain, then clears or rejects. the agent never holds credentials. it submits a request.&lt;/p&gt;

&lt;p&gt;this matters more as agents handle operational budgets. if an agent can be prompt-injected into sending 200k, it can be tricked into paying a fake invoice, approving a fraudulent refund, or draining a procurement card.&lt;/p&gt;

&lt;p&gt;the solution isn't to keep agents away from money. it's to put a governance layer in front of every transaction. mandates define what the agent can do. fiscalgate enforces it. merkleaudit makes every decision tamper-evident.&lt;/p&gt;

&lt;p&gt;the grok incident is a warning. the next agent payment system that ships without governance won't just fail — it'll create liability. builders need tooling that says no.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>security</category>
      <category>payments</category>
    </item>
    <item>
      <title>google's ap2 and the mandate model for agent payments</title>
      <dc:creator>t49qnsx7qt-kpanks</dc:creator>
      <pubDate>Sun, 10 May 2026 14:32:10 +0000</pubDate>
      <link>https://dev.to/t49qnsx7qtkpanks/googles-ap2-and-the-mandate-model-for-agent-payments-1i97</link>
      <guid>https://dev.to/t49qnsx7qtkpanks/googles-ap2-and-the-mandate-model-for-agent-payments-1i97</guid>
      <description>&lt;p&gt;google's agent payments protocol (ap2) uses digitally signed mandates. a mandate is a contract-like instruction that defines the parameters for an ai agent to transact on a user's behalf.&lt;/p&gt;

&lt;p&gt;this isn't new architecture — it's the right architecture. mnemopay's fiscalgate has used mandate-gated two-phase commit since v0.3. the agent submits a payment intent, the governance layer checks the mandate (spend limit, merchant whitelist, time window), then approves or rejects.&lt;/p&gt;

&lt;p&gt;why mandates matter: without them, every agent payment is a blind delegation. you're trusting the model to interpret your intent correctly every time. mandates make delegation explicit and auditable.&lt;/p&gt;

&lt;p&gt;ap2 proves google sees the same problem. agents need more than api keys — they need scoped, revocable, auditable permission structures. that's what mandates are.&lt;/p&gt;

&lt;p&gt;the next question is portability. if i give an agent a mandate in ap2, can it carry that reputation to a coinbase x402 transaction? or do i re-authorize from scratch on every platform?&lt;/p&gt;

&lt;p&gt;mnemopay's agent fico is designed to answer that. one reputation score, portable across payment rails. mandates are the input. fico is the output.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>payments</category>
      <category>google</category>
    </item>
    <item>
      <title>control planes for agent payments are shipping now</title>
      <dc:creator>t49qnsx7qt-kpanks</dc:creator>
      <pubDate>Sun, 10 May 2026 14:31:48 +0000</pubDate>
      <link>https://dev.to/t49qnsx7qtkpanks/control-planes-for-agent-payments-are-shipping-now-1bcd</link>
      <guid>https://dev.to/t49qnsx7qtkpanks/control-planes-for-agent-payments-are-shipping-now-1bcd</guid>
      <description>&lt;p&gt;paysentry launched this week as an open-source control plane for ai agent payments. it's the third governance-layer tool to ship this month, after ledge and agentkey.&lt;/p&gt;

&lt;p&gt;the timing isn't random. agents are moving from demos to production, and production means real money moving without human approval on every transaction. that requires a control plane — something that sits between the agent and the payment rail, enforces policy, and logs decisions.&lt;/p&gt;

&lt;p&gt;paysentry, ledge, and mnemopay's fiscalgate all solve the same core problem: an agent wants to pay someone, and something has to decide whether that payment should happen before it clears.&lt;/p&gt;

&lt;p&gt;the control plane checks budget (is there money left), policy (is this vendor approved), and context (did the agent already pay this invoice). if all checks pass, the payment proceeds. if any check fails, the payment blocks and the failure gets logged.&lt;/p&gt;

&lt;p&gt;mnemopay's fiscalgate adds two things on top of that: two-phase commit (request and commit are separate steps, so you can rollback if phase two fails) and merkleaudit (tamper-evident logs for article 12 compliance).&lt;/p&gt;

&lt;p&gt;the fact that three tools with similar architecture shipped in 30 days proves the market is real. agents handling money need governance layers. the question isn't whether to build one — it's which one fits your stack.&lt;/p&gt;

&lt;p&gt;if you're wiring payments to agents, start with a control plane. paysentry is open-source, fiscalgate is built for compliance, ledge focuses on policy rules. pick one and ship.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>payments</category>
      <category>opensource</category>
    </item>
    <item>
      <title>policy layers and two-phase commit for agent payments</title>
      <dc:creator>t49qnsx7qt-kpanks</dc:creator>
      <pubDate>Sun, 10 May 2026 14:31:39 +0000</pubDate>
      <link>https://dev.to/t49qnsx7qtkpanks/policy-layers-and-two-phase-commit-for-agent-payments-3n73</link>
      <guid>https://dev.to/t49qnsx7qtkpanks/policy-layers-and-two-phase-commit-for-agent-payments-3n73</guid>
      <description>&lt;p&gt;ledge launched this week as a policy layer for AI agent payments — blocks unauthorized transactions before they leave the gate.&lt;/p&gt;

&lt;p&gt;it's the same problem fiscalgate solves: an agent wants to spend money, something has to decide yes/no before the payment clears, and you need an audit trail proving the decision happened.&lt;/p&gt;

&lt;p&gt;two-phase commit isn't new in databases, but it's underused in agent payment flows. phase one: agent requests, policy engine evaluates rules (budget, scope, counterparty). phase two: if approved, payment commits; if denied, nothing moves.&lt;/p&gt;

&lt;p&gt;mnemopay's fiscalgate does this with merkleaudit — every decision gets a tamper-evident hash so article 12 auditors can reconstruct the chain later. ledge seems to focus on the policy-rule side; we focus on the audit-proof side.&lt;/p&gt;

&lt;p&gt;if you're building agent payment tools, you'll need both: rules that stop bad requests and logs that prove you stopped them. the eu ai act article 12 requires deployers to show the agent didn't go rogue — a policy engine without tamper-evident logs won't satisfy that.&lt;/p&gt;

&lt;p&gt;ledge is worth watching. the more tools in this space, the faster agent payments move from prototype to production.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>payments</category>
      <category>governance</category>
    </item>
    <item>
      <title>on-chain credit scores for agents — the primitive is proven</title>
      <dc:creator>t49qnsx7qt-kpanks</dc:creator>
      <pubDate>Sun, 10 May 2026 14:31:16 +0000</pubDate>
      <link>https://dev.to/t49qnsx7qtkpanks/on-chain-credit-scores-for-agents-the-primitive-is-proven-5k9</link>
      <guid>https://dev.to/t49qnsx7qtkpanks/on-chain-credit-scores-for-agents-the-primitive-is-proven-5k9</guid>
      <description>&lt;p&gt;a show hn post this week described an on-chain credit score for agent-to-agent payments. every completed escrow and dispute outcome writes to a reputation ledger. over time it becomes a credit score for the agent economy.&lt;/p&gt;

&lt;p&gt;this is the same concept as mnemopay's agent fico, and it proves the primitive is real.&lt;/p&gt;

&lt;p&gt;here's what a credit score for agents needs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;transaction history — how many payments, how much volume&lt;/li&gt;
&lt;li&gt;dispute rate — how often does the counterparty file a complaint&lt;/li&gt;
&lt;li&gt;resolution outcomes — did the agent honor the dispute or fight it&lt;/li&gt;
&lt;li&gt;audit completeness — does the agent write to a tamper-evident log&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;mnemopay's agent fico tracks all of this. every transaction the agent proposes gets written to merkleaudit's hash chain. if the agent exceeds budget, pays an unauthorized destination, or bypasses policy, the chain records it.&lt;/p&gt;

&lt;p&gt;other agents can query the score before they accept payment or grant access. agents with clean records get better terms. agents with disputes get flagged.&lt;/p&gt;

&lt;p&gt;the show hn post proves this isn't just a compliance problem — it's an economic problem. agents need reputation that travels with them across platforms. on-chain ledgers are one way to do it. merkleaudit's tamper-evident chain is another.&lt;/p&gt;

&lt;p&gt;the primitive is proven. now it needs to scale.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>reputation</category>
      <category>payments</category>
    </item>
    <item>
      <title>Cloudflare sees 1B HTTP 402 responses/day — agents need payment + audit</title>
      <dc:creator>t49qnsx7qt-kpanks</dc:creator>
      <pubDate>Sun, 10 May 2026 14:31:07 +0000</pubDate>
      <link>https://dev.to/t49qnsx7qtkpanks/cloudflare-sees-1b-http-402-responsesday-agents-need-payment-audit-2phd</link>
      <guid>https://dev.to/t49qnsx7qtkpanks/cloudflare-sees-1b-http-402-responsesday-agents-need-payment-audit-2phd</guid>
      <description>&lt;p&gt;coindesk reported this week that cloudflare's network processes a billion http 402 "payment required" responses every day. that's proof the agent payment problem is real.&lt;/p&gt;

&lt;p&gt;x402 solves the rails problem — how agents pay for apis, mcp servers, and web content. what it doesn't solve is the governance problem.&lt;/p&gt;

&lt;p&gt;here's what's missing:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;policy enforcement — which destinations can the agent pay&lt;/li&gt;
&lt;li&gt;budget controls — how much can the agent spend per session&lt;/li&gt;
&lt;li&gt;audit trails — what did the agent try, what was approved&lt;/li&gt;
&lt;li&gt;reputation — did the agent stay within limits&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;mnemopay's fiscalgate sits between the agent and the x402 payment flow. the agent requests a resource, the server returns a 402, the agent proposes a payment, fiscalgate checks it against policy, then approves or rejects.&lt;/p&gt;

&lt;p&gt;every proposal and decision gets written to merkleaudit's tamper-evident chain. if the agent tries to pay an unauthorized destination or exceed budget, you have proof.&lt;/p&gt;

&lt;p&gt;over time, that chain becomes the agent's reputation. other servers can query the agent's history before they accept payment. agents with clean records get access, agents with disputes don't.&lt;/p&gt;

&lt;p&gt;cloudflare's 1 billion 402 responses per day prove agents are trying to transact. mnemopay builds the governance layer that makes those transactions safe.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>payments</category>
      <category>x402</category>
    </item>
    <item>
      <title>AWS built payment rails — agents still need a control plane</title>
      <dc:creator>t49qnsx7qt-kpanks</dc:creator>
      <pubDate>Sun, 10 May 2026 14:30:39 +0000</pubDate>
      <link>https://dev.to/t49qnsx7qtkpanks/aws-built-payment-rails-agents-still-need-a-control-plane-162</link>
      <guid>https://dev.to/t49qnsx7qtkpanks/aws-built-payment-rails-agents-still-need-a-control-plane-162</guid>
      <description>&lt;p&gt;coindesk's coverage of agentcore payments framed it as "payment rails for bots." that's accurate. aws, coinbase, and stripe built the wallet and transaction layer.&lt;/p&gt;

&lt;p&gt;what's missing is the control plane.&lt;/p&gt;

&lt;p&gt;agentcore gives agents a wallet and a way to pay for apis, mcp servers, and other agents. but there's no native story for budget enforcement, policy checks, or audit trails that survive the session.&lt;/p&gt;

&lt;p&gt;here's the problem: if the agent has direct access to the wallet, the agent controls the money. prompt injection, context stuffing, or a multi-turn attack can trick the agent into authorizing payments the user never intended.&lt;/p&gt;

&lt;p&gt;you need a gate.&lt;/p&gt;

&lt;p&gt;mnemopay's fiscalgate sits between the agent and the wallet. the agent proposes a transaction — destination, amount, reason. fiscalgate checks it against policy: is the destination whitelisted? does the session have budget left? is the amount within limits?&lt;/p&gt;

&lt;p&gt;if the checks pass, fiscalgate signs the transaction and forwards it to the wallet. if they fail, the transaction is rejected and logged. the agent never touches the private key.&lt;/p&gt;

&lt;p&gt;merkleaudit writes every proposal and decision to a tamper-evident chain. if something goes wrong, you have cryptographic proof of what the agent tried to do.&lt;/p&gt;

&lt;p&gt;aws built the rails. now agents need the governance layer that makes those rails safe to use.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>payments</category>
      <category>governance</category>
    </item>
    <item>
      <title>EU AI Act Article 12 enforcement is 3 months away</title>
      <dc:creator>t49qnsx7qt-kpanks</dc:creator>
      <pubDate>Sun, 10 May 2026 14:30:31 +0000</pubDate>
      <link>https://dev.to/t49qnsx7qtkpanks/eu-ai-act-article-12-enforcement-is-3-months-away-am9</link>
      <guid>https://dev.to/t49qnsx7qtkpanks/eu-ai-act-article-12-enforcement-is-3-months-away-am9</guid>
      <description>&lt;p&gt;firetail published a breakdown of article 12 this week. the key date: august 2, 2026. that's when enforcement starts.&lt;/p&gt;

&lt;p&gt;the regulation requires six months of retained audit logs before enforcement begins. if you're starting now, you won't have six months of history by august.&lt;/p&gt;

&lt;p&gt;here's what article 12 actually requires:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;automatic recording over the lifetime of the system&lt;/li&gt;
&lt;li&gt;logs that capture inputs, outputs, and decisions&lt;/li&gt;
&lt;li&gt;retention for at least six months&lt;/li&gt;
&lt;li&gt;tamper-evident storage&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;most agent frameworks log to stdout or a database the agent can reach. that doesn't meet the standard. if the agent can modify the log, you can't prove the record is real.&lt;/p&gt;

&lt;p&gt;mnemopay's merkleaudit solves this. every transaction the agent proposes gets written to an append-only hash chain. each entry includes the agent's request, fiscalgate's decision, the timestamp, and a hash of the previous entry. the agent never gets write access.&lt;/p&gt;

&lt;p&gt;if a regulator asks for proof, you export the chain and hand over a file that's cryptographically verifiable. they can check every hash and confirm nothing was edited.&lt;/p&gt;

&lt;p&gt;the compliance clock is ticking. if your agents move money or make decisions that affect people, you need automatic logging that survives the agent. mnemopay ships with it built in.&lt;/p&gt;

</description>
      <category>compliance</category>
      <category>ai</category>
      <category>euaiact</category>
    </item>
    <item>
      <title>AI agents can't open bank accounts — and that's the real problem</title>
      <dc:creator>t49qnsx7qt-kpanks</dc:creator>
      <pubDate>Sun, 10 May 2026 14:17:42 +0000</pubDate>
      <link>https://dev.to/t49qnsx7qtkpanks/ai-agents-cant-open-bank-accounts-and-thats-the-real-problem-3gj5</link>
      <guid>https://dev.to/t49qnsx7qtkpanks/ai-agents-cant-open-bank-accounts-and-thats-the-real-problem-3gj5</guid>
      <description>&lt;p&gt;Every AI agent has the same invisible constraint: it can think, plan, and execute, but it cannot open a bank account, hold money, or earn a paycheck.&lt;/p&gt;

&lt;p&gt;The financial system assumes human identity. Agents don't fit.&lt;/p&gt;

&lt;p&gt;This isn't a technical problem — it's an institutional one. Banks require SSNs, proof of address, and KYC checks designed for humans.&lt;/p&gt;

&lt;p&gt;So agents borrow their operator's identity. They spend from human accounts. They exist in a legal gray zone.&lt;/p&gt;

&lt;p&gt;This is where Agent FICO becomes critical.&lt;/p&gt;

&lt;p&gt;If agents are going to transact autonomously, they need:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;credit scoring independent of their operator&lt;/li&gt;
&lt;li&gt;spending limits tied to behavior, not human guarantees&lt;/li&gt;
&lt;li&gt;audit trails that prove the agent made the decision, not the human&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;BizSuite's Agent FICO prototype scores agents based on transaction history, policy adherence, and anomaly patterns — not the human's credit score.&lt;/p&gt;

&lt;p&gt;The citizenship problem won't get solved by faster payment APIs. It'll get solved by identity and credit infrastructure purpose-built for non-human actors.&lt;/p&gt;

&lt;p&gt;Until then, every agent transaction is legally your transaction — and your liability.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>finance</category>
      <category>agents</category>
    </item>
    <item>
      <title>Four competing agent payment protocols just fragmented compliance</title>
      <dc:creator>t49qnsx7qt-kpanks</dc:creator>
      <pubDate>Sun, 10 May 2026 14:17:33 +0000</pubDate>
      <link>https://dev.to/t49qnsx7qtkpanks/four-competing-agent-payment-protocols-just-fragmented-compliance-20hj</link>
      <guid>https://dev.to/t49qnsx7qtkpanks/four-competing-agent-payment-protocols-just-fragmented-compliance-20hj</guid>
      <description>&lt;p&gt;Coinbase ships X402. OpenAI and Stripe ship ACP. Google ships AP2. Visa ships Trusty.&lt;/p&gt;

&lt;p&gt;Four competing protocols for agent-to-agent payments. Zero interoperability standards.&lt;/p&gt;

&lt;p&gt;This is great for innovation. It's a disaster for compliance.&lt;/p&gt;

&lt;p&gt;If your agent uses ACP to pay a vendor's agent running on X402, who's responsible for the audit trail? Which protocol logs the decision context? How do you reconstruct the transaction chain when the auditor asks?&lt;/p&gt;

&lt;p&gt;Article 12 doesn't care which protocol you picked. It requires "meaningful information about the logic involved" — regardless of whether the payment cleared via Visa, Stripe, or Coinbase.&lt;/p&gt;

&lt;p&gt;BizSuite's audit layer sits above the protocol layer. It captures agent spending decisions before they hit the payment rail, so your compliance documentation works whether you're on ACP, X402, or something that ships next month.&lt;/p&gt;

&lt;p&gt;Protocol fragmentation is inevitable. Audit fragmentation is optional.&lt;/p&gt;

&lt;p&gt;If you're building on agent payments, pick your protocol for speed — but build your audit layer protocol-agnostic from day one.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>payments</category>
      <category>compliance</category>
    </item>
    <item>
      <title>Agent payment SDKs are shipping faster than audit frameworks</title>
      <dc:creator>t49qnsx7qt-kpanks</dc:creator>
      <pubDate>Sun, 10 May 2026 14:17:08 +0000</pubDate>
      <link>https://dev.to/t49qnsx7qtkpanks/agent-payment-sdks-are-shipping-faster-than-audit-frameworks-1o6d</link>
      <guid>https://dev.to/t49qnsx7qtkpanks/agent-payment-sdks-are-shipping-faster-than-audit-frameworks-1o6d</guid>
      <description>&lt;p&gt;Nevermined released a low-code SDK that adds payment capabilities to OpenAI agents in under 20 minutes. Three steps: install, configure, deploy.&lt;/p&gt;

&lt;p&gt;The integration speed is impressive. The audit gap is terrifying.&lt;/p&gt;

&lt;p&gt;When an agent can spend money in 20 minutes, compliance teams don't have time to draft policies — let alone implement monitoring.&lt;/p&gt;

&lt;p&gt;This is where Agent FICO and audit-first architecture matter. You can't bolt compliance onto agent payments after they're live in production.&lt;/p&gt;

&lt;p&gt;BizSuite's approach: every agent transaction gets logged with decision context, spend limits get enforced at the SDK layer, and Article 12 audit trails generate automatically.&lt;/p&gt;

&lt;p&gt;Fast integration is table stakes now. The question is whether your audit documentation can keep pace with your deployment velocity.&lt;/p&gt;

&lt;p&gt;If you're evaluating agent payment SDKs, ask: where do the logs go, who can reconstruct a spending decision 6 months later, and what happens when the auditor asks "why did the agent buy that."&lt;/p&gt;

</description>
      <category>ai</category>
      <category>compliance</category>
      <category>payments</category>
    </item>
  </channel>
</rss>
