AgntBaseExtended card endpoint
Partner access

Public first. Partner access second.

AgntBase keeps the public A2A layer small and safe. Partners can later use an API key tier for higher read limits and access to the extended Agent Card, while action methods remain deferred behind auth and human confirmation.

Tiers

Two access layers

The split is deliberate: public discovery stays simple, while partner access can expose richer metadata without turning the public endpoint into a risky action surface.

Public

Read-only by default

Anyone can use the public endpoint for profile search, reads, compare, trust explanation, site check, package manifest reads and checkout instructions.

No key required
Partner

Higher read limits + extended card

Partner access uses x-api-key. The first use case is not “more power”, but cleaner controlled reads and access to the extended Agent Card.

API key required
What changes

Partner layer in practice

The partner tier does not change the trust model. It only opens richer metadata and safer scaling for integrations that already have a real relationship with us.

Headerx-api-keyUsed to identify the partner tier.
Public endpoint/a2a/jsonrpcSame endpoint, different read limit behavior.
Extended card/a2a/agent-card/extendedReturns partner-only metadata when a valid key is present.
Current benefitHigher read limitsUseful for integrations, testing and catalog-style reads.
Future benefitRicher metadataExtended docs, tiered capabilities, partner signals and integration notes.
Hard rule

What partner access still does not unlock

This is where we stay disciplined. Even a partner key should not silently turn a read layer into an autonomous action layer.

Still blocked

No automatic payments

Checkout instructions can be returned, but public or partner access does not charge, capture payment or place orders.

Still blocked

No outreach sending

Partner access is not a backdoor into messaging, mailouts or lead actions on behalf of businesses.

Still blocked

No write methods without confirmation

Future write-capabilities require auth, scope, logs and human confirmation. That rule stays in place.