Context
AWS Bedrock AgentCore Payments (announced this week) makes x402 the enterprise rail for agent commerce at scale. The x402 protocol handles settlement cleanly. x402-signals (#2291) covers post-settlement fulfillment obligations from the provider side.
The gap that remains: a third party — regulator, auditor, counterparty — cannot independently verify what the agent did after settlement without trusting the operator's infrastructure.
The problem
payment_hash proves the payment completed. It does not prove:
- What action the agent took after receiving payment
- That the action record wasn't modified after the fact
- That the agent acted within its authorized scope
For regulated deployments (EU AI Act Art. 12 enforcement August 2, 2026; FCA SYSC 9.1; SOC 2 CC7.x), this gap is the compliance blocker. Logs can be rewritten. An external anchor cannot.
Proposed pattern
A TrailRecord anchored externally after agent action completes, keyed by the same action_ref that payment_hash references:
payment_hash (x402 settlement proof)
└── action_ref = SHA-256(agent_id || action_type || scope || timestamp_ms)
└── TrailRecord (tamper-evident, external anchor)
└── anchor_id (Sigstore Rekor / on-chain tx)
The audit property: a verifier with the payment_hash can follow the chain to the TrailRecord and confirm the action record hasn't been modified — without access to the operator's infrastructure.
Relationship to existing work
Complementary, not overlapping. x402-signals answers "what should the provider do." This answers "how does a third party verify it happened."
Implementation
We've built this as Mycelium Trails — an external anchoring layer that uses payment_hash as the cross-surface key between x402 settlement and post-execution evidence. The spec is in argentum-core and a community plugin for the AGT EvidenceAnchor SPI is in review at microsoft/agent-governance-toolkit#2244.
Happy to contribute a reference spec or fixture if the Foundation wants to document this pattern alongside x402-signals.
Context
AWS Bedrock AgentCore Payments (announced this week) makes x402 the enterprise rail for agent commerce at scale. The x402 protocol handles settlement cleanly. x402-signals (#2291) covers post-settlement fulfillment obligations from the provider side.
The gap that remains: a third party — regulator, auditor, counterparty — cannot independently verify what the agent did after settlement without trusting the operator's infrastructure.
The problem
payment_hashproves the payment completed. It does not prove:For regulated deployments (EU AI Act Art. 12 enforcement August 2, 2026; FCA SYSC 9.1; SOC 2 CC7.x), this gap is the compliance blocker. Logs can be rewritten. An external anchor cannot.
Proposed pattern
A
TrailRecordanchored externally after agent action completes, keyed by the sameaction_refthatpayment_hashreferences:The audit property: a verifier with the
payment_hashcan follow the chain to theTrailRecordand confirm the action record hasn't been modified — without access to the operator's infrastructure.Relationship to existing work
Complementary, not overlapping. x402-signals answers "what should the provider do." This answers "how does a third party verify it happened."
Implementation
We've built this as Mycelium Trails — an external anchoring layer that uses
payment_hashas the cross-surface key between x402 settlement and post-execution evidence. The spec is in argentum-core and a community plugin for the AGT EvidenceAnchor SPI is in review at microsoft/agent-governance-toolkit#2244.Happy to contribute a reference spec or fixture if the Foundation wants to document this pattern alongside x402-signals.