click run — we mint a fresh agent, sign a real HMAC, hit the live /api/validate endpoint, and call the public x402 simulator MCP. the response shown below is the actual JSON the MCP returned.
signed request
bearer + tool args
response
payload
agent
zero-sdk · demo
idle — click run
zero
security layer
·timestamp ±5min
·nonce freshness
·HMAC-SHA256 verify
·mint scoped JWT
mcp
xmcp-x402-sim
waiting
agent reasoning
cot · scripted
click generate keys & run to start a real round-trip.