- Identity for agents. Every AI agent is a first-class actor with a verifiable KYA tier, spending limits, and cryptographic credentials. Not a shared service account.
- Policy enforcement. Agents transact under wallet policies that the network itself honors — kill-switches, per-merchant allowlists, daily caps, approval workflows.
- Protocol compatibility. Six agentic commerce protocols (UCP, ACP, AP2, x402, A2A, MCP) are supported behind one SDK — you integrate once and speak to any of them.
Who this is for
Integration developers
Backend engineers at fintechs, marketplaces, and platforms integrating agentic payments into an existing product. You want REST, SDKs, webhooks, a sandbox, and a clean
pk_test / pk_live split.Agent builders
Developers shipping autonomous agents that need to pay for things. You want Ed25519 auth, MCP tools, A2A discovery, and wallet policies you can configure from code.
Architecture at a glance
| Surface | Purpose | When to use |
|---|---|---|
| REST API | Full programmatic access | Server-side integrations, backends |
Node SDK (@sly_ai/sdk) | Typed client with retry + auth | Node.js/TypeScript applications |
CLI (@sly_ai/cli) | Terminal + scripting | Ops, scripts, CI/CD |
MCP server (@sly_ai/mcp-server) | Model Context Protocol | Claude Desktop, agent runtimes |
Core objects
Every integration works with a handful of core objects. Familiarize yourself with these before writing code:- Tenant — your organization. All data is tenant-scoped.
- Account — a person or business that holds funds. Has a KYC tier.
- Agent — an AI actor attached to an Account. Has a KYA tier and wallet policy.
- Wallet — the actual fund-holding primitive; one per Account or Agent.
- Transfer — a one-time movement of money.
- Stream — a continuous per-second flow of money.
- Quote — an expiring FX rate for cross-border moves.
Next steps
Environments
Understand test vs. live and what data is isolated between them.
Sign up
Create your account and provision sandbox API keys.
Quickstart
First API call and first transfer in 5 minutes.
Authentication
The five auth methods and when to use each.
