The first generation of AI agent failures were funny.
The agent booked the wrong restaurant. The agent summarized a document badly. The agent called the wrong internal tool. The agent got stuck in a loop and wasted tokens.
The next generation will not be funny.
An agent will retry a failed payment and double-pay.
An agent will get prompt-injected into funding the wrong recipient.
An agent will use a tool it should never have had access to.
An agent will spend outside its mandate, and the team deploying it will not be able to prove who authorized the action, what policy was checked, or why the transaction was allowed.
That is the moment AI agents stop being a demo problem and become an infrastructure problem.
For the last few months, we have been building Veridex Agent Fabric for that exact moment.
Not another chatbot wrapper. Not another prompt orchestration library. A TypeScript-first agent runtime and safety stack for agents that use tools, request funds, transact across rails, and need to stay inside explicit authority boundaries.
Because the hard part of agentic payments is not making an API call.
The hard part is answering six questions every time an agent tries to do something consequential:
- Who authorized this agent?
- What is it allowed to do?
- How much can it spend?
- Which recipient, rail, protocol, and purpose are in scope?
- What happens if the model is attacked, confused, or retries?
- What evidence exists after the fact?
Most agent frameworks treat this as application logic.
We think it belongs in the runtime.
What We Built
Veridex Agent Fabric is a package family for building and operating payment-capable agents.
The core package is @veridex/agents: a typed runtime for model-agnostic agents with tool contracts, safety classes, memory/context compilation, checkpoints, resumable runs, policies, approvals, trace events, and MCP / ACP / A2A transport surfaces.
That runtime sits next to packages built for the parts most teams postpone until it is too late:
-
@veridex/agent-securityprotects against prompt injection, tool poisoning, secret exfiltration, runaway spend, and MCP-style agent threats. -
@veridex/agents-treasuryadds the primitives required for safe money movement: idempotency, spend ceilings, time-locks, sanctions screening, dual approval, signed evidence bundles, and red-team evaluations. -
@veridex/agents-control-planegives teams tenant isolation, policy packs, approval workflows, trace retention, audit export, remote APIs, and shared persistence. -
@veridex/agentic-paymentsgives agents identity, trust-gated payments, policy-gated execution, and multi-chain signing across the agentic payment protocol landscape. -
@veridex/agents-adapterslets teams bring existing systems with them: OpenAI Agents SDK, LangGraph, PydanticAI, and OpenAPI-described tools. -
@veridex/agents-reactexposes runtime state, approvals, traces, memory, budgets, identity, and payment state to frontend teams.
The point is not to force every developer into one framework.
The point is to make the dangerous parts explicit: tools, authority, policy, approval, memory, payment, evidence, and recovery.
Why Existing Agent Stacks Break at Money
If an agent only summarizes documents, a bad tool call is annoying.
If an agent moves money, provisions infrastructure, signs a quote, or funds a counterparty, a bad tool call is an incident.
A normal agent framework asks: did the model call the tool correctly?
A payment-capable runtime has to ask more:
- Is this tool read-only, write-capable, networked, privileged, or financial?
- Does this agent have permission to call it?
- Does this input match the schema?
- Is the requested amount inside policy?
- Is the recipient in scope?
- Is this a retry of a previous action?
- Does it require approval?
- Can the run be suspended and resumed safely?
- Can an auditor reconstruct the decision later?
That is why we built the runtime around proposals rather than blind execution.
Every consequential action should pass through policy. High-risk actions should escalate. Every retry should be idempotent. Every approval should be recorded. Every payment should produce evidence.
Not because it looks good in a deck.
Because this is how you stop an autonomous system from becoming an autonomous liability.
The Core Design Principle: Authority Should Only Narrow
When an agent delegates to another agent, calls a remote tool, opens a session, or proposes a payment, its authority should never silently expand.
It should narrow.
A parent agent can create a child agent with fewer tools, tighter budgets, shorter time windows, stricter approval thresholds, and narrower recipient scope.
A payment session can be scoped to one counterparty, one protocol, one purpose, one amount ceiling, and one expiry.
A tool can declare its safety class before it ever executes.
A policy pack can deny a transaction before the model gets another chance to rationalize it.
This is the difference between "the agent has a wallet" and "the agent has bounded authority."
The first is convenient.
The second is deployable.
Evidence Is the Product
The most underrated part of agent infrastructure is evidence.
Enterprises do not just need an agent to complete a task. They need to explain what happened when something goes wrong.
For a payment-capable agent, an evidence trail should include:
- the user's original authorization
- the agent identity and session scope
- the proposed action
- the tool or payment rail involved
- the policy version checked
- the approval decision
- the idempotency key
- the execution result
- the final settlement state
This is why Veridex treats trace events and evidence bundles as first-class runtime outputs.
A payment without evidence is just a transaction.
A payment with evidence is an operation a business can govern.
Proof Implementation: Trading Fabric
We built Trading Fabric as a proof implementation on top of the agent framework.
It is a multi-agent trading system: market, news, sentiment, and fundamentals analysts produce reports; bull and bear researchers debate; a risk committee evaluates; a portfolio manager makes a decision; execution can be simulated through paper trading on Sera testnet.
Repository:
https://github.com/Veridex-Protocol/trading-fabric
The point of Trading Fabric is not that every customer needs a trading agent.
The point is that it exercises the architecture:
- multiple specialized agents
- tool-calling analysts
- structured outputs
- audit trails
- policy-gated decisions
- execution envelopes
- run artifacts
- human-readable reports
- replayable state
Agents that transact need more than clever prompts. They need systems that can be inspected, replayed, and constrained.
Trading Fabric is one example of that pattern.
The Framework Is Opening Up
We are preparing to open-source more of the framework and invite builders to test it.
If you are building agents that need to pay for compute, buy services, manage subscriptions, request quotes, handle treasury operations, or interact with financial rails, we want feedback from the sharp edges.
Docs:
https://docs.veridex.network/agent-fabric/overview
https://docs.veridex.network/guides/veridex-agents
https://docs.veridex.network/guides/agent-payments
Examples:
https://github.com/Veridex-Protocol/examples/tree/main/agents-gemini
Core package:
https://www.npmjs.com/package/@veridex/agents
The agent economy will not be built by giving every model a wallet and hoping policy happens somewhere else.
It will be built by making authority explicit, execution scoped, security default, and evidence unavoidable.
That is what we are building with Veridex Agent Fabric.
If you are building payment-capable agents and want to test it, reach out.
Top comments (0)