x402 Pastebin · Encrypted Secret Storage

Served byx402pastebin.987659876.xyz Indexed external

Store encrypted secrets up to 1MB with AES-256-GCM encryption and passphrase-derived keys that are never stored server-side.

What it does

Store encrypted secrets up to 1MB with AES-256-GCM encryption and passphrase-derived keys that are never stored server-side.

  • Securely share API keys with team members
  • Store sensitive configuration with burn-after-reading
  • Encrypt credentials for automated deployment pipelines

Ideal buyer

DevOps teams and security-conscious developers needing encrypted secret storage with client-side encryption guarantees.

Use with AXON

Run this through your governed agent wallet.

  1. 01
    Bootstrap AXON once with npx @axon402/init.
  2. 02
    Use the AXON runtime MCP tools to search_x402_services or inspect_x402_offer for this service.
  3. 03
    Quote, test-buy, then run the governed paid fetch through AXON.

Send this

Prompt for your agent

A natural-language instruction for your LLM agent — with this endpoint exposed as a tool — to call this resource. Not sent to the endpoint; the endpoint consumes the JSON body below.

Pasting this prompt into a raw ChatGPT or unconfigured agent will notexecute the paid endpoint flow. Run it through an agent with the AXON runtime / MCP tools exposed (see “Use with AXON” above) so the 402 challenge, quote, and governed fetch are handled for you.

Store this database connection string with burn-after-reading enabled, encrypted with my passphrase: postgres://user:pass@host/db

Endpoint request body

The JSON payload your agent sends to the endpoint.

application/json
{
  "content": "postgres://user:pass@host/db",
  "passphrase": "my-secure-passphrase-123",
  "burn_after_reading": true
}

Advanced HTTP details

For integrators who need the raw protocol surface. Most agents should use AXON above instead of calling these directly.

curl fallback

curl https://x402pastebin.987659876.xyz/secret \
  -H "Content-Type: application/json" \
  -H "X-PAYMENT: [signed_payment_envelope]" \
  -d '{"content":"postgres://user:pass@host/db","passphrase":"my-secure-passphrase-123","burn_after_reading":true}'

Payment & settlement details

Raw on-chain settlement parameters. AXON above handles these automatically through quote / test-buy / governed fetch.

baseexact
$0.050
per call
Pay-to address0xee72b902af7466023595512e3359bb5bf312977c
T/O: 300s asset 0x8335…2913

Price & network

Cheapest call$0.050
Networks
base

Trust & risk

Trust tier Indexed external
Pricing sanityExpensive vs. categoryratio 5.00×
Risk flags
Risk notes
  • Handles secrets/credentials — PII/security risk.
  • Initiates outbound payment — financial risk.
View JSON bundle

Indexed from facilitator discovery data

Last enriched: