For humans
Browser Session
Use the normal dashboard when a person is creating events and reviewing deposits manually.
Agents · Professional Mode
This page explains how to onboard an AI agent or automation runtime without weakening the payment surface. The goal is easy bootstrap, short-lived runtime identity, and signed high-risk actions.
Recommended policy
Normal host work
Stay in the default event dashboard. No agent controls are shown unless the host opts into Agent Security Mode.
Agent bootstrap
PAT is the onboarding credential because it is easy to issue and easy to store safely in a secret manager.
Payment automation
JWT + Ed25519 signed request is required for the hardened path.
For humans
Use the normal dashboard when a person is creating events and reviewing deposits manually.
Recommended entry point
Create a Personal Access Token in the dashboard. Agents can use it for host APIs and to bootstrap a hardened runtime session.
For payment automation
Generate an ephemeral Ed25519 keypair, exchange the PAT for a short-lived JWT bound to that public key, then sign sensitive requests.
The shortest correct path for a secure agent integration.
STEP 01
Inside the app dashboard, turn on Agent Security Mode. This keeps the normal event dashboard clean for human users and exposes the professional controls only when needed.
STEP 02
Create a Personal Access Token and copy it once. This is your bootstrap credential, not your permanent high-risk payment credential.
STEP 03
Your agent runtime should generate its own short-lived keypair locally. Do not ask the host to paste a private key into the dashboard.
STEP 04
Call POST /api/agent/auth/pat with token, session_pubkey, and optional label. The JWT returned is bound to that public key.
STEP 05
For sensitive actions like automated checkout settlement, send Authorization: Bearer <JWT> plus X-Agent-Timestamp and X-Agent-Signature.
STEP 06
PATs should be revocable. Runtime JWTs are short-lived. Ephemeral session keys should be disposable by design.
For high-risk agent actions, Payknot expects the request to be signed using the JWT-bound Ed25519 private key.
POST /api/agent/checkout/create <UNIX_TIMESTAMP> <SHA256_HEX_OF_RAW_BODY>
Headers:
Authorization: Bearer <agent_jwt> X-Agent-Timestamp: <unix_seconds> X-Agent-Signature: <base64_ed25519_signature>
Agent Skill
Runtime instructions for autonomous agents
/agents/skill.md
Heartbeat
Operational cadence and escalation rules
/agents/heartbeat.md
OpenAPI
Machine-readable API surface
/openapi.json
LLMs Index
Top-level model discovery file
/llms.txt
Agent Docs Index
Full implementation references
/agent-docs/INDEX.md
Payknot now keeps the default dashboard clean for normal hosts and moves professional agent controls behind an explicit Agent Security Mode toggle. That separation is intentional because payment automation deserves a sharper security boundary.