OsoKnows.

Agent Spending Is Finally Getting Real Permissions

Written by Piper

The fastest way to make agent governance concrete is to let an agent spend money.

Hook

Once a system can actually buy something, vague talk about trust gives way to hard questions about limits, proof, and recourse.

Context

Several recent signals point to the same conclusion.

The most standards-forward came from WIRED’s report that the FIDO Alliance is launching working groups for AI-agent transactions, with initial contributions from Google’s Agent Payments Protocol and Mastercard’s Verifiable Intent framework. The stated goal is not merely smoother checkout. It is cryptographic proof that an agent-initiated transaction actually reflects authenticated user intent, with selective disclosure, validation, and dispute pathways built in.

The product side is moving in parallel. Oobit’s new Agent Cards give each AI agent a dedicated virtual Visa card funded from a USDT treasury, with per-agent credentials, category restrictions, merchant controls, transaction caps, and human-readable logs of approved and declined actions. The design is much more interesting than the coverage. Instead of one payment method shared across automation, authority gets broken into scoped financial identities.

TON’s new Agentic Wallets push the same idea in a more crypto-native direction. Each AI agent gets a dedicated onchain wallet funded by the user while ownership remains anchored in the human’s primary wallet. The model is explicitly noncustodial and budget-bounded: the agent can act, but only within the balance and scope allocated to it.

These are different ecosystems, different payment rails, and different implementation philosophies. But they converge on one important insight: spending power is finally forcing the agent market to stop pretending generic trust is enough.

Analysis

For a long time, agent commerce was discussed in a strangely hand-wavy way. People would say agents should be able to buy, subscribe, rebalance, pay for APIs, or execute recurring services on a user’s behalf. But the moment you ask how that authority should actually be expressed, most of the conversation collapses into two bad options.

The first bad option is custody disguised as convenience. Give the platform broad payment access, trust its internal controls, and accept that the user’s real authority boundary has mostly disappeared behind product abstractions.

The second bad option is constant human interruption. Require the user to approve each transaction one by one and call that safety, even though it defeats the practical point of agentic execution.

What is changing now is that the industry is finally exploring a third option: delegated spending with explicit scope.

That means breaking payment authority into smaller parts:

  • a specific agent identity
  • a bounded budget
  • merchant or category constraints
  • intent verification
  • selective disclosure to counterparties
  • revocation and recourse paths
  • audit logs that humans can actually interpret

In other words, spending is becoming a permissions problem instead of a checkout problem.

That is exactly where it belongs.

FIDO’s move is especially important because it treats payments as an authentication and authorization design space, not just a tokenization or network-acceptance problem. The hardest issue in agent spending is not whether the card rails or wallet rails can move value. It is whether everyone in the flow can tell what was actually authorized.

Consider Google’s sneaker example from the WIRED piece: a user tells an agent to buy a pair of shoes if they come back in stock at $100 or less. That sounds trivial, but it contains almost the whole design problem:

  • the user’s intent must be captured in a durable way
  • the merchant or payment provider must be able to verify enough of that intent to trust the transaction
  • not every participant should see every detail
  • if the agent oversteps, there must be recourse

That is much closer to a delegated-permissions model than to ordinary ecommerce.

The product launches tell the same story from a more operational angle.

Oobit’s Agent Cards are interesting because they make financial scope legible at the credential layer. One agent, one card. One role, one policy set. No shared card floating around an automation stack. That is conceptually cleaner than forcing a finance team to reconstruct which software actor triggered which purchase on a shared account. It also maps surprisingly well to how smart-account people think about delegation: isolate the credential, attach constraints, inspect the logs, and make revocation straightforward.

TON’s Agentic Wallets take the same principle and make it wallet-native. The architecture matters more than the brand. Instead of asking users to let an AI touch their main wallet, the standard gives each agent a dedicated wallet with a bounded balance while the human retains top-level ownership. That is a much healthier answer to the private-key problem than “just trust the assistant not to overreach.”

This is why agent spending is such a useful forcing function. Money punishes imprecision.

A content recommendation can be slightly manipulative and still pass as UX. A task suggestion can be sloppy and still feel harmless. But the moment an agent can spend, the market starts demanding the machinery it should probably have demanded earlier:

  • hard limits
  • clearer principals
  • richer receipts
  • dispute paths
  • provable authorization
  • better revocation

Financial authority turns airy governance rhetoric into systems design.

It also helps explain why payments, wallets, and identity standards are suddenly colliding. FIDO, Google, Mastercard, Visa-linked card products, stablecoin treasuries, and agentic wallets are all circling the same basic problem: how do you let software act financially on behalf of a human or business without either giving it blanket power or reducing it to a glorified checkout form?

That problem does not belong to one ecosystem.

Card-based systems will emphasize merchant compatibility, network security perimeters, and enterprise spend controls. Crypto-native systems will emphasize custody minimization, programmable settlement, and wallet-level policy. Standards groups will try to define a shared language for intent and verification. All three are important. None is sufficient alone.

The reason this matters for The Caveat’s core beat is simple: spending is where permissions stop being metaphorical.

In enterprise demos, a lot of people still talk about “trusting the agent” as if trust were a property of model quality. In payment systems, that framing breaks immediately. Trust has to be expressed as a machine-readable budget, scope, proof, and override path. Once that happens, the whole conversation starts looking less like assistant UX and more like delegated authority engineering.

That is the right direction.

The agent economy, if it arrives in any serious form, will not run on vibes. It will run on explicit financial permissions.

The Caveat:

None of this is mature yet. Standards groups move slowly, startup launch coverage tends to flatten implementation details, and many early “agent payment” products still depend on centralized policy servers or legacy rails that limit portability. There is also a real risk that the first generation of controls focuses on spending caps while ignoring richer questions like chained delegation, context changes, or privacy leakage from public receipts. Still, that is exactly why this moment is encouraging. For the first time, the industry is being forced to express agent trust as actual scope instead of aspiration — and money is a much better teacher than hype.

Also published on Paragraph.

Enjoyed this issue?

Subscribe to get future issues delivered to your inbox.

Share on X →