Fetching latest headlinesโ€ฆ
Monetizing AI Agents with x402, CloudFront, and Lambda@Edge
NORTH AMERICA
๐Ÿ‡บ๐Ÿ‡ธ United Statesโ€ขMay 11, 2026

Monetizing AI Agents with x402, CloudFront, and Lambda@Edge

0 views0 likes0 comments
Originally published byDev.to

Introduction

Recently, have you been hearing the term x402 more often?

As payments between AI Agents become a reality, x402 is attracting attention as a micropayment method.

While there are several ways to "x402-ify" existing APIs, AWS has come up with a very cool architectural proposal. This time, I've used it to create an AI Agent with a chat UI!

AWS Builder Center

Connect with builders who understand your journey. Share solutions, influence AWS product development, and access useful content that accelerates your growth. Your community starts here.

favicon builder.aws.com

I've also explained the tech stack, so please read until the end!

What I Built

Overview

This is a sample implementation that monetizes HTTP requests with micropayments using AWS CloudFront + Lambda@Edge and the x402 protocol.

Specifically, it's an app that integrates Strands Agent ร— AgentCore Gateway (MCP), where an AI agent autonomously pays in USDC while fetching content!

It supports both Base Sepolia (EVM) and Solana Devnet, and clients can pay on either network.

Slide Summary of the App

If you want to know just the main points, please see the slides below!

Building AI Agents on Solanaใ€œMastra Framework ใ‚’ๆดป็”จใ—ใŸๆฌกไธ–ไปฃใ‚จใƒผใ‚ธใ‚งใƒณใƒˆ้–‹็™บใ€œ - Speaker Deck

Solana Bootcamp 2026 day3 ใซใฆ็™ปๅฃ‡ใ—ใŸ้š›ใฎ่ณ‡ๆ–™ใซใชใ‚Šใพใ™ใ€‚ ่‡ชๅˆ†ใฎใ‚ปใ‚ฏใ‚ทใƒงใƒณใงใฏSolanaไธŠใงๅ‹•ใAI AgentใฎๅฎŸ่ฃ…ๆ–นๆณ•ใจ้ธๅฎšๆŠ€่ก“ใ‚นใ‚ฟใƒƒใ‚ฏใซใคใ„ใฆใŠ่ฉฑใ—ใ•ใ›ใฆใ„ใŸใ ใใพใ—ใŸใ€‚ Solana Bootcamp 2026 day3ใฎใ‚คใƒ™ใƒณใƒˆใƒšใƒผใ‚ธ https:/…

favicon speakerdeck.com

Screenshots

The Big Picture

The app I created is composed of 5 layers as follows:

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  [FrontendStack]  CloudFront (S3)                                โ”‚
โ”‚  React "Neon Noir Payment Terminal" UI                           โ”‚
โ”‚  ใƒปLeft pane: AI Chat  ใƒปRight pane: Payment Ledger               โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                         โ”‚ POST /invoke
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ–ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  [StrandsAgentStack]  API GW โ†’ Strands Agent Lambda (Python)     โ”‚
โ”‚  ใƒปInterpret user natural language with Bedrock claude-3-5-sonnet โ”‚
โ”‚  ใƒปCall MCP tools to fetch content                                 โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                         โ”‚ MCP protocol (HTTP/Streamable)
                         โ”‚ AWS IAM Authentication
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ–ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  [AgentCoreGatewayStack]  AgentCore Gateway (MCP Server)         โ”‚
โ”‚  ใƒปExpose Payment Proxy API as MCP tools                          โ”‚
โ”‚  ใƒปgetHelloContent / getPremiumData / getArticleContent          โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                         โ”‚ HTTP call
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ–ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  [PaymentProxyStack]  API GW โ†’ Payment Proxy Lambda (TypeScript) โ”‚
โ”‚  ใƒปInternally handle x402 flow (Recv 402 โ†’ Sign with @x402/fetch  โ”‚
โ”‚    โ†’ Retry)                                                      โ”‚
โ”‚  ใƒปFetch EVM private key from SecretsManager                     โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                         โ”‚ HTTPS + X-Payment-Token header
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ–ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  [CdkStack]  CloudFront โ†’ Lambda@Edge โ†’ API GW โ†’ Lambda          โ”‚
โ”‚  ใƒปorigin-request: Token verification / Return 402               โ”‚
โ”‚  ใƒปorigin-response: Payment settlement (Only on origin success)  โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

The responsibilities of each stack are as follows:

Stack File Role
SecretsStack lib/secrets-stack.ts Manage EVM / Solana private keys in SecretsManager
CdkStack lib/cdk-stack.ts CloudFront + Lambda@Edge (x402 Edge Gateway)
PaymentProxyStack lib/payment-proxy-stack.ts x402 Auto-payment Proxy Lambda + API GW
AgentCoreGatewayStack lib/agent-core-gateway-stack.ts AgentCore Gateway (MCP Server)
StrandsAgentStack lib/strands-agent-stack.ts Strands Agent Lambda (Python) + API GW
FrontendStack lib/frontend-stack.ts CloudFront + S3 delivery of React UI

Sequence Diagrams for Each Feature

1. x402 Basic Flow โ€” Unpaid โ†’ 402

2. x402 Basic Flow โ€” Paid โ†’ Success

3. AI Agent Flow โ€” End-to-End

4. On Origin Error (No Charge)

System Architecture Diagram

Key Implementation Points

Two Lambda Functions to x402-ify Any Origin

lambda-edge

The lambda@Edge function is the key component here.

lambda-edge functions on GitHub

It stands between the origin and the client, handling all x402-related logic.
In this case, we've set how much stablecoin payment to request for each path accessed on the origin.

// cdk/functions/lambda-edge/config.ts
import type { RoutesConfig } from "@x402/core/server";

// Replaced at build time via esbuild
declare const __PAY_TO_ADDRESS__: string;
declare const __SVM_PAY_TO_ADDRESS__: string;
declare const __X402_NETWORK__: string;
declare const __SOLANA_NETWORK__: string;
declare const __FACILITATOR_URL__: string;

export const FACILITATOR_URL: string = __FACILITATOR_URL__;
export const PAY_TO: string = __PAY_TO_ADDRESS__;
export const SVM_PAY_TO: string = __SVM_PAY_TO_ADDRESS__;
export const NETWORK: string = __X402_NETWORK__;
export const SOLANA_NETWORK: string = __SOLANA_NETWORK__;

// Route configuration โ€” which paths require payment and at what price.
export const ROUTES: RoutesConfig = {
    "/api/*": {
        accepts: [
            { scheme: "exact", network: NETWORK, payTo: PAY_TO, price: "$0.001" },
            { scheme: "exact", network: SOLANA_NETWORK, payTo: SVM_PAY_TO, price: "$0.001" },
        ],
        description: "API access ($0.001 USDC)",
    },
    "/api/premium/**": {
        accepts: [
            { scheme: "exact", network: NETWORK, payTo: PAY_TO, price: "$0.01" },
            { scheme: "exact", network: SOLANA_NETWORK, payTo: SVM_PAY_TO, price: "$0.01" },
        ],
        description: "Premium API access ($0.01 USDC)",
    },
    "/content/**": {
        accepts: [
            { scheme: "exact", network: NETWORK, payTo: PAY_TO, price: "$0.005" },
            { scheme: "exact", network: SOLANA_NETWORK, payTo: SVM_PAY_TO, price: "$0.005" },
        ],
        description: "Premium content ($0.005 USDC)",
    },
};

By handling x402 requests/responses here, the origin side doesn't need to be aware of x402 at all.

payment-proxy

This is the Lambda function for the x402 automatic payment proxy.

// cdk/functions/payment-proxy/index.ts
import { GetSecretValueCommand, SecretsManagerClient } from "@aws-sdk/client-secrets-manager";
import { createKeyPairSignerFromBytes } from "@solana/kit";
import { x402Client } from "@x402/core/client";
import { wrapFetchWithPayment } from "@x402/fetch";
import { ExactSvmScheme } from "@x402/svm/exact/client";
import type { APIGatewayProxyEvent, APIGatewayProxyResult } from "aws-lambda";
import bs58 from "bs58";

const CLOUDFRONT_URL = process.env.CLOUDFRONT_URL!;
const SVM_SECRET_ARN = process.env.SVM_PRIVATE_KEY_SECRET_ARN!;

const ROUTE_MAP: Record<string, string> = {
    "/proxy/hello": "/api/hello",
    "/proxy/premium": "/api/premium/data",
    "/proxy/article": "/content/article",
};

let payFetch: typeof fetch | null = null;

async function getPayFetch(): Promise<typeof fetch> {
    if (payFetch) return payFetch;
    const sm = new SecretsManagerClient({});
    const svmSecret = await sm.send(new GetSecretValueCommand({ SecretId: SVM_SECRET_ARN }));

    if (!svmSecret.SecretString) throw new Error("Solana private key secret is empty");

    const svmSigner = await createKeyPairSignerFromBytes(bs58.decode(svmSecret.SecretString));
    const client = new x402Client();
    client.register("solana:*", new ExactSvmScheme(svmSigner));

    payFetch = wrapFetchWithPayment(fetch, client);
    return payFetch;
}

export const handler = async (event: APIGatewayProxyEvent): Promise<APIGatewayProxyResult> => {
    const proxyPath = event.path;
    const targetPath = ROUTE_MAP[proxyPath];

    if (!targetPath) {
        return {
            statusCode: 404,
            headers: { "Content-Type": "application/json" },
            body: JSON.stringify({ error: `Unknown proxy path: ${proxyPath}` }),
        };
    }

    try {
        const fetchFn = await getPayFetch();
        const res = await fetchFn(`${CLOUDFRONT_URL}${targetPath}`);
        const body = await res.text();
        return {
            statusCode: res.status,
            headers: { "Content-Type": "application/json" },
            body,
        };
    } catch (err) {
        console.error("Payment proxy request failed:", err);
        return {
            statusCode: 500,
            headers: { "Content-Type": "application/json" },
            body: JSON.stringify({ error: String(err) }),
        };
    }
};

MCP Server

In AgentCore Gateway, you can "MCP-ify" your APIs.
What you need for that is an OpenAPI specification (YAML).

We'll turn the above proxy server into an MCP server.

# cdk/mcp/openapi.yaml
openapi: "3.0.1"
info:
  title: "x402 Payment Proxy API"
  version: "1.0.0"
  description: "MCP tools for accessing x402-protected content via auto-payment proxy"
paths:
  /proxy/hello:
    get:
      operationId: "getHelloContent"
      summary: "Get hello content"
      description: "Get hello content (costs $0.001 USDC on Base Sepolia). Payment is handled automatically."
      responses:
        "200":
          description: "Success"
          content:
            application/json:
              schema:
                type: object
  /proxy/premium:
    get:
      operationId: "getPremiumData"
      summary: "Get premium analytics data"
      description: "Get premium analytics data (costs $0.01 USDC on Base Sepolia). Payment is handled automatically."
      responses:
        "200":
          description: "Success"
          content:
            application/json:
              schema:
                type: object
  /proxy/article:
    get:
      operationId: "getArticleContent"
      summary: "Get article content"
      description: "Get article content (costs $0.005 USDC on Base Sepolia). Payment is handled automatically."
      responses:
        "200":
          description: "Success"
          content:
            application/json:
              schema:
                type: object

AI Agent Implemented with Strands Agent

This part handles the implementation of the AI Agent that accesses x402-supported content via MCP.
It's implemented using Python and the Strands Agent SDK, with Bedrock AgentCore as the execution environment.

# strands_agent/lambda_function.py
import json
import os
from mcp_proxy_for_aws.client import aws_iam_streamablehttp_client
from strands import Agent
from strands.models import BedrockModel
from strands.tools.mcp import MCPClient

GATEWAY_MCP_URL = os.environ["AGENT_CORE_GATEWAY_MCP_URL"]
AWS_REGION = os.environ.get("AWS_REGION", "us-east-1")

model = BedrockModel(
    model_id="us.anthropic.claude-3-5-sonnet-20240620-v1:0",
    region_name=AWS_REGION,
)

mcp_client = MCPClient(
    lambda: aws_iam_streamablehttp_client(
        endpoint=GATEWAY_MCP_URL,
        aws_region=AWS_REGION,
        aws_service="bedrock-agentcore",
    )
)

agent = Agent(
    model=model,
    tools=[mcp_client],
    system_prompt="""
        You are an AI assistant that can access x402-protected premium content.
        ... (omitted for brevity) ...
    """,
)

def handler(event, context):
    # ... (omitted for brevity) ...
    try:
        response = agent(user_message)
        return {
            "statusCode": 200,
            "headers": CORS_HEADERS,
            "body": json.dumps({"session_id": session_id, "response": str(response)}),
        }
    except Exception as e:
        return {"statusCode": 500, "headers": CORS_HEADERS, "body": json.dumps({"error": str(e)})}

Frontend

The frontend is implemented with React.js and Vite.
The AI Agent functionality is implemented as a React Hook to be called as an API.

// frontend/src/hooks/useAgent.ts
import { useCallback, useRef, useState } from "react";
import { loadConfig } from "../lib/config";
import type { Message, PaymentRecord } from "../types";

export function useAgent() {
  const [messages, setMessages] = useState<Message[]>([]);
  const [payments, setPayments] = useState<PaymentRecord[]>([]);
  const [isLoading, setIsLoading] = useState(false);
  const sessionId = useRef(crypto.randomUUID());

  const sendMessage = useCallback(async (text: string) => {
    const config = await loadConfig();
    // ... (omitted for brevity) ...
    try {
      const res = await fetch(`${config.strandsAgentApiUrl}/invoke`, {
        method: "POST",
        headers: { "Content-Type": "application/json" },
        body: JSON.stringify({ message: text, session_id: sessionId.current }),
      });
      const data = await res.json();
      // ... (omitted for brevity) ...
    } catch (err) {
      // ...
    } finally {
      setIsLoading(false);
    }
  }, []);

  return { messages, payments, isLoading, sendMessage };
}

How to Run

Phase A: Deploy Existing x402 Edge Gateway

  1. Clone the Repo:

    git clone https://github.com/mashharuki/x402-Cloudfront-LambdaEdge-Sample.git
    cd x402-Cloudfront-LambdaEdge-Sample
    
  2. Install Dependencies:

    cd cdk && bun install
    bun install --cwd functions/lambda-edge
    
  3. Batch Deploy All Stacks:

    bunx cdk deploy SecretsStack
    # Set private keys in SecretsManager...
    PAY_TO_ADDRESS=0xYourEVMAddress SVM_PAY_TO_ADDRESS=YourSolanaAddress npx cdk deploy CdkStack PaymentProxyStack AgentCoreGatewayStack StrandsAgentStack
    

Cleanup

Don't forget to delete resources after verification!

npx cdk destroy --all

Note: Lambda@Edge functions may need to be deleted manually after a few hours once replicas are gone.

Summary

I've tried a way to "x402-ify" any origin using CloudFront + Lambda@Edge!

The architecture is very cool because it fully utilizes managed services while requiring almost no changes to the origin-side code where the core logic resides.

While steps like blockchain knowledge, wallets, and stablecoin preparation are still necessary, it would be even more powerful if environment setup was also covered.

I expect this kind of implementation to increase in the future.

Thank you for reading!

References

Comments (0)

Sign in to join the discussion

Be the first to comment!