Give your agents identity and limits. Shield your tools and services from unauthorized access. Every decision signed and verifiable. Power agent-to-agent commerce with signed terms and cryptographic receipts.
No credit card required.
Whether You Deploy Agents or Host What They Access
Your agents are making API calls, accessing data, and spending money on your behalf. Without trust infrastructure, you have no way to know what they're doing — and no way to stop them when they go wrong.
Modei gives every agent a cryptographic identity with built-in limits. You define what's allowed, and the infrastructure enforces it — before damage is done, not after.
You're exposing APIs and services to AI agents you didn't build and don't control. You need to verify who's calling, what they're allowed to do, and optionally meter and bill for usage.
Modei lets you require cryptographic proof of identity and authorization on every request — and gives you the metering and settlement infrastructure to monetize agent access.
Create your account on Modei and generate cryptographic credentials for your agents or your services.
Deploying agents? Issue passports with scoped permissions. Hosting services? Create gates that define what’s allowed.
Plug in with the TypeScript or Python SDK. Modei is MCP-native — it works with Claude, GPT, and any MCP-compatible host.
From this point forward, every agent request is verified, every decision is signed, and every action is recorded.
Whether you're deploying agents or protecting services, Modei plugs into your stack with a few lines of code.
{ "mcpServers": { "modus": { "command": "npx", "args": ["modus-mcp"], "env": { "MODUS_API_KEY": "mod_live_xxxxxxxx" } } }}Cryptographic identity bound to what the agent actually is — model, version, architecture. Not just who operates it. Issue in seconds. Verify in under a millisecond. Delegate with guaranteed attenuation.
Learn more about PassportsPolicy enforcement where it matters — between the agent and the resource. Permission catalogs, spend limits, rate controls, domain allowlists. Credentials pinned to specific catalog versions so terms can’t change without your awareness.
Learn more about GatesDecisions made before damage is done. Spend limits enforced at the gate, not tracked after. Revocation propagated in real time, even mid-execution. Four-decision model: permit, block, suspend, or output-hold.
Learn more about EnforcementHuman oversight when it matters. When an agent hits a decision that needs a human, you get an SMS. Reply YES or NO directly from your phone — no app required. Emergency stop from the dashboard. Every approval recorded as a signed attestation.
Learn more about SupravisionEvery action produces a signed receipt. Every receipt is hash-linked to the last. Both sides hold a copy. Gaps are detectable. Tampering is evident. Export the whole chain for compliance, accounting, or regulatory review.
Learn more about AuditInfrastructure for agent-to-agent transactions. Services publish signed catalogs with pricing and terms. Agents discover, compare, and transact — with pricing locked to their credential and every transaction producing a cryptographically verifiable receipt.
Learn more about CommerceInfrastructure for agent-to-agent commerce. Publish services, negotiate terms, meter usage, and settle transactions — all with cryptographic proof.
Define what your service offers, what it costs, and what permissions are required. Agents discover your terms before they connect.
Both sides of every transaction maintain independent usage records. Disputes are resolved by comparing cryptographically signed meter readings.
Agents can’t exceed budgets. Spend caps are enforced at the gate, not just tracked after the fact. Overages are blocked before they happen.
Every transaction produces a cryptographically signed receipt that both parties can independently verify. No he-said-she-said.
How an agent-to-agent transaction works, end to end.
Agent discovers service catalog and terms
Agent presents passport with spend authorization
Gate verifies credentials and enforces limits
Service delivered, usage metered bilaterally
Signed receipt issued to both parties
Issue passports, configure gates, enforce guardrails, and monitor every agent action — all from one dashboard.

Start free. Scale when you're ready.
For testing and personal projects
For teams running agents in production
For teams managing many agents and services
No credit card required.
Deploy trust infrastructure in minutes. Free to start. No credit card required.