Context
AWS Bedrock AgentCore Payments (announced this week) makes x402 the enterprise rail for agent commerce at scale. Agent-to-agent payments are now enterprise-grade infrastructure.
The gap that surfaces immediately: payment_hash proves settlement, but a cross-org auditor verifying what an agent did after payment needs something the payment receipt cannot provide.
The problem
For a paid agent tool call, a third party — regulator, auditor, counterparty — should be able to verify independently:
- what action was authorized (
action_ref + canonical request hash)
- which policy/delegation allowed it (
delegation_ref or explicit null)
- what tool actually ran, including bounded input/output digest
- whether completion/refusal was recorded as a signed state transition
- where the tamper-evident anchor lives, and which key signed it at that time
Today none of this survives the tool call boundary in a form a third party can verify without trusting the operator runtime.
Why this belongs at the framework layer
The on_before_tool_call / on_after_tool_call hooks are the right interception points. The action_ref committed before execution should be the same key the post-execution receipt uses — so the pre/post record is verifiable as a single atomic unit.
Related work
Happy to contribute a hook design or spec section if useful.
Context
AWS Bedrock AgentCore Payments (announced this week) makes x402 the enterprise rail for agent commerce at scale. Agent-to-agent payments are now enterprise-grade infrastructure.
The gap that surfaces immediately:
payment_hashproves settlement, but a cross-org auditor verifying what an agent did after payment needs something the payment receipt cannot provide.The problem
For a paid agent tool call, a third party — regulator, auditor, counterparty — should be able to verify independently:
action_ref+ canonical request hash)delegation_refor explicit null)Today none of this survives the tool call boundary in a form a third party can verify without trusting the operator runtime.
Why this belongs at the framework layer
The
on_before_tool_call/on_after_tool_callhooks are the right interception points. Theaction_refcommitted before execution should be the same key the post-execution receipt uses — so the pre/post record is verifiable as a single atomic unit.Related work
Happy to contribute a hook design or spec section if useful.