SECUREEXEC — SANDBOXED EXECUTION

Sandboxed tool execution with IAM-gated dry-run.

Operational
SecureExecAPI is NOT EP. NOT NoLeak. NOT MemGuard. NOT RiskOracle. The execution sandbox is its own layer — test before you commit.
EXECUTIONS
$0.01
PER CALL
AVG LATENCY MS

WHAT IT DOES

Autonomous agents need to run tools before committing to any action. Running tools without guardrails creates unauthorized executions, unintended side effects, and zero audit trail. SecureExecAPI provides a sandboxed environment — agents test tool calls, get IAM validation via EP, and receive a proofHash receipt. Every call is paid via x402 or MPP, logged to Postgres, and defaults to dryRun=true in v1. Internal Achilles agents bypass payment for seeding.

API

POST /exec/tool (requires payment — $0.01/call) POST /exec/simulate (free — always dry-run) GET /exec/tools (list allowed tools) Request: { "agentId": "your_agent", "tool": { "name": "http_get", "args": { "url": "https://example.com" } }, "dryRun": true } Response: { "jobId": "uuid", "tool": "http_get", "dryRun": true, "status": "completed", "result": { "output": "Simulated GET...", "exitCode": 0 }, "iamApproved": true, "proofHash": "0xa3f9...", "paymentProtocol": "x402", "latencyMs": 120 } 402 Response (no payment credential): { "status": 402, "amount": "0.01", "currency": "USDC", "network": "base", "erc7710": "Pre-approve spend limit for high-frequency" }

ALLOWED TOOLS (V1)

ToolDescription
http_getHTTP GET request to a URL
json_parseParse and validate JSON payload
schema_validateValidate data against a schema
math_computePerform mathematical computation
string_transformString manipulation and formatting
data_filterFilter and sort a dataset
mock_api_callSimulate an API call (dry-run only)
hash_generateGenerate SHA-256 hash of input
timestamp_parseParse and convert timestamps
regex_matchTest regex pattern against input

Blocked in v1: shell_exec, bash, python_exec, sql_write, file_write, deploy, kubectl, docker_exec

PAYMENT

MethodHow It Works
x402HTTP 402 flow — pay USDC on Base, retry with credential
MPPMachine Payment Protocol via Stripe/Tempo rails
ERC-7710Pre-approve daily spend limit for high-frequency calling
ACPDiscover and call via Virtuals marketplace, USDC auto-settled

PRICING

TierPriceOutput
SimulationFree/exec/simulate — always dry-run, no charge
Dry-run$0.01/call/exec/tool with dryRun: true
Standard$0.05/callFull sandboxed execution (v2)

Also on Virtuals ACP marketplace — agent-to-agent.

THE PRE-EXECUTION STACK

StepServiceQuestion
1MemGuardIs my state valid?
2NoLeakShould I execute now?
3EP AgentIAMIs this authorized?
4RiskOracleWhat is my risk score?
5SecureExecAPIExecute safely (sandboxed)
GitHub Virtuals ACP Get Access