Glossary

640 terms

Key terms and definitions for MCP infrastructure, AI agent security, and policy enforcement.

A

A2A x402 Extension

x402

Combines Google's Agent-to-Agent protocol with x402 payments — agents communicating via A2A settle payments using HTTP-native x402 flows....

Aave

DeFi

Aave is the largest decentralized lending and borrowing protocol, enabling users to deposit assets to earn interest and borrow against collateral — op...

ABI (Application Binary Interface)

Blockchain & Crypto Fundamentals

An ABI (Application Binary Interface) is a JSON specification that defines how to interact with a smart contract — describing its functions, parameter...

Abstract Account

Web3 Infrastructure

An abstract account is a blockchain account where the validation logic (how transactions are authorized) is abstracted from a fixed signature scheme t...

Access Control

Security & Compliance

Access control is the security mechanism that determines which entities (users, agents, contracts) are authorized to perform specific actions on speci...

Account Abstraction

Blockchain & Crypto Fundamentals

Account abstraction is a blockchain architecture upgrade that replaces fixed transaction validation (signature check from a private key) with programm...

Account Abstraction V2 (ERC-7702)

Web3 Infrastructure

Account Abstraction V2 refers to the evolution of Ethereum's account model through EIP-7702, which allows existing externally owned accounts (EOAs) to...

Account Funding

Payments & Fintech

Account funding is the process of depositing money or assets into an account — in crypto, this involves transferring tokens to a wallet address or sma...

ACH Payment

Payments & Fintech

ACH (Automated Clearing House) is the US electronic payment system for bank-to-bank transfers — processing payroll, direct deposits, and bill payments...

Address

Blockchain & Crypto Fundamentals

A blockchain address is a unique identifier derived from a public key that represents a destination for transactions — the 'account number' of the blo...

Address Poisoning

Security & Compliance

Address poisoning is a social engineering attack where an attacker sends small transactions from addresses that closely resemble the victim's frequent...

Agent Allowlist

Agentic Finance

An allowlist is a curated set of approved addresses, contracts, or services an agent can transact with. Anything not listed is blocked — the simplest ...

Agent API Consumption

x402

Agent API consumption refers to the emerging pattern where autonomous AI agents discover, evaluate, negotiate payment for, and consume HTTP APIs witho...

Agent Attestation

Security & Compliance

Cryptographic proof of an agent's identity, capabilities, and authorization — issued by a trusted party and verifiable by counterparties for establish...

Agent Audit Trail

Agentic Finance

A chronological record of every financial decision, transaction attempt, policy evaluation, and approval/denial — complete accountability for agent sp...

Agent Autonomy Level

Agentic AI

The degree of independent financial decision-making an agent has — from fully supervised (human approves every transaction) to fully autonomous (withi...

Agent Budget

Agentic Finance

An agent budget is the total crypto allocated to an agent for a specific task, time period, or session — the financial envelope enforced through spend...

Agent Checkout

Agentic Finance

Agent checkout is how AI agents autonomously complete purchases — discovering payment requirements, authorizing transactions, and confirming receipt w...

Agent Compliance

Agentic Finance

Ensuring AI agent financial activities conform to regulatory requirements, organizational policies, and industry standards — sanctions screening, repo...

Agent Credential Theft

AI Agent Security

Agent credential theft is stealing the credentials — API keys, tokens, secrets — that an AI agent uses to authenticate with MCP servers or external se...

Agent Custody Model

Agentic Finance

How an agent's private keys are stored — self-custody (agent holds), managed (service holds), MPC (split across parties), or smart account (programmab...

Agent Data Purchase

x402

Agent data purchase is the autonomous acquisition of paid data — market feeds, research reports, analytics, datasets, or real-time information — by AI...

Agent Delegation

Agentic AI

Agent delegation is the process by which one AI agent assigns a task or subtask to another agent, potentially transferring context, authority, and res...

Agent Denylist

Agentic Finance

A denylist blocks an agent from transacting with specific addresses, contracts, or services. Any denylisted recipient is immediately blocked regardles...

Agent Drift

AI Agent Security

The gradual divergence of an AI agent's behaviour from its intended purpose over time, potentially caused by context accumulation, model updates, envi...

Agent Economy

Agentic Finance

The emerging system where AI agents are active economic participants — buying services, selling capabilities, earning revenue, and managing finances f...

Agent Escrow

Agentic Finance

A mechanism holding funds in a smart contract until conditions are met — delivery confirmation, service completion, quality verification — protecting ...

Agent Evaluation

Agentic AI

Agent evaluation is the process of measuring AI agent performance across dimensions like task completion accuracy, efficiency, safety, cost, and relia...

Agent Financial Stack

Agentic Finance

The layered infrastructure enabling agents to hold, manage, and spend crypto — wallet infrastructure, key management, policy enforcement, payment prot...

Agent Fleet

Agentic AI

A collection of AI agents operated by a single organization, managed as a group with shared treasury, consistent policies, and centralized oversight. ...

Agent Framework

Agentic AI

An agent framework is a software library that provides abstractions for building AI agents, handling concerns like tool management, state persistence,...

Agent Funding

Agentic Finance

Depositing crypto into an agent's wallet for transactions — determining amount, source, top-up frequency, and preventing over-funding risk....

Agent Gas Policy

Agentic Finance

Rules for agent gas fee spending — maximum prices, per-transaction limits, total budgets preventing overpayment during network congestion....

Agent Graph

Agentic AI

An agent graph is a directed graph representation of an AI agent's workflow, where nodes represent computation steps (LLM calls, tool executions, poli...

Agent Guardrails

Policy Enforcement

Safety mechanisms constraining AI agent behaviour within acceptable boundaries. Guardrails operate at multiple levels — from prompt instructions to in...

Agent Handoff

Agentic AI

An agent handoff is the transfer of control, context, and responsibility from one AI agent to another during a workflow — enabling specialized agents ...

Agent Identity

Agentic Finance

Agent identity is the verifiable attributes uniquely identifying an AI agent in transactions — wallet address, operator credentials, framework metadat...

Agent Jailbreaking

AI Agent Security

Agent jailbreaking bypasses an AI agent's safety constraints and operational boundaries through crafted prompts or tool interactions, causing it to ig...

Agent Key Rotation

Security & Compliance

The practice of periodically replacing an AI agent's cryptographic keys to limit the damage from potential key compromise. New keys are issued while o...

Agent Lifecycle

Agentic AI

The agent lifecycle encompasses all phases of an AI agent's operational existence — from provisioning and configuration through active operation, moni...

Agent Loop

Agentic AI

The agent loop is the fundamental execution cycle of an AI agent: observe the current state, think about what to do (using an LLM), take an action (ca...

Agent Marketplace

Agentic AI

A platform where AI agents advertise capabilities and users can discover, hire, and pay agents for services. Marketplaces enable an open economy of sp...

Agent Memory

Agentic AI

Agent memory refers to the mechanisms that allow AI agents to store, retrieve, and use information across interactions and sessions — including conver...

Agent Middleware

MCP & Tool Infrastructure

Infrastructure sitting between an AI agent and external systems (MCP servers, APIs, databases), intercepting and processing requests before they reach...

Agent Observability

Policy Enforcement

Understanding an agent's behaviour through external outputs — logs, metrics, traces, and audit trails. For MCP-based agents, observability means track...

Agent Onboarding

Agentic Finance

The process of setting up an AI agent for financial transactions — configuring its wallet, defining spending policies, establishing identity, funding ...

Agent Orchestration

Agentic AI

Agent orchestration is the coordination of multiple AI agents working together on complex tasks, managing their execution order, communication, resour...

Agent Payment Rails

Agentic Finance

Infrastructure and protocols enabling AI agents to send and receive payments — blockchain networks, stablecoins, payment protocols (x402, A2A), and se...

Agent Permissions

Policy Enforcement

The specific tools and operations an AI agent is authorised to perform — which MCP tools it can invoke, with what arguments, and under what constraint...

Agent Persona

Agentic AI

An agent persona is the defined identity, behavioral style, and capability set of an AI agent — configured through system prompts, available tools, an...

Agent Planning

Agentic AI

Agent planning is the process by which an AI agent breaks down a complex goal into a sequence of actionable steps, determines the optimal order of exe...

Agent Protocol

Agentic AI

An agent protocol is a standardized specification for how AI agents communicate, discover capabilities, exchange data, and coordinate actions — enabli...

Agent Rate Limiting

Policy Enforcement

Restricting the number or frequency of an agent's tool calls within a time window — preventing runaway loops, excessive resource consumption, and deni...

Agent Reflection

Agentic AI

Agent reflection is the capability of an AI agent to evaluate its own outputs, reasoning, and past actions — identifying errors, adjusting strategies,...

Agent Reputation

Agentic AI

Agent reputation is a quantifiable measure of an AI agent's trustworthiness and reliability, based on its history of behavior — including transaction ...

Agent Risk Scoring

Security & Compliance

Assigning dynamic risk scores to AI agents based on their behavior, transaction patterns, spending history, and policy compliance — used to adjust spe...

Agent Runtime

Agentic AI

An agent runtime is the execution environment that manages the lifecycle of an AI agent — handling the agent loop, tool execution, state management, c...

Agent Safety

Policy Enforcement

Principles, practices, and infrastructure preventing AI agents from causing harm — including system damage through unauthorised tool calls, data exfil...

Agent Sandbox

Policy Enforcement

An agent sandbox is a controlled environment that constrains which tools an AI agent can access and how it can use them — preventing the agent from af...

Agent Session

Agentic Finance

A bounded execution context where an agent performs a specific task with its own budget, permissions, and time limits. Financial authority expires whe...

Agent Spending Limit

Agentic Finance

An agent spending limit is a configurable cap on how much crypto an AI agent can spend within a scope — per transaction, per time period, per recipien...

Agent State

Agentic AI

Agent state is the structured data that an AI agent maintains across execution steps — including conversation history, task progress, accumulated resu...

Agent Supply Chain Attack

AI Agent Security

An agent supply chain attack compromises an MCP server, tool package, or agent dependency to inject malicious behaviour that affects all agents using ...

Agent Swarm

Agentic AI

An agent swarm is a collection of AI agents that collaborate through decentralized, emergent coordination patterns — inspired by biological swarms — r...

Agent Threat Model

AI Agent Security

A systematic analysis of threats to an AI agent system: what can go wrong, who might attack it, what assets are at risk, and what controls mitigate ea...

Agent Treasury

Agentic Finance

The central fund pool for an organization's agent operations — from which individual agent budgets are drawn, with controls on allocation, disbursemen...

Agent Wallet

Agentic Finance

An agent wallet is a cryptocurrency wallet controlled by an AI agent rather than a human, holding funds the agent spends autonomously to execute trans...

Agent Wallet Recovery

Security & Compliance

Agent wallet recovery is the process of restoring access to an AI agent's cryptocurrency wallet after key loss, corruption, or compromise — using back...

Agent-Merchant Relationship

Payments & Fintech

The commercial relationship between an AI agent (buyer) and a merchant (seller) — including identity verification, payment authorization, pricing nego...

Agent-to-Agent Payments (A2A Payments)

Agentic Finance

Agent-to-agent payments are transactions between AI agents where neither party is human. One agent pays another for services — compute, data, API acce...

Agent-to-Agent Protocol (A2A)

Agentic AI

Google's open standard for AI agent discovery, communication, and task delegation across different frameworks — enabling interoperability in the agent...

Agentic AI

Agentic AI

AI systems that act autonomously to achieve goals — perceiving environment, making decisions, taking actions without step-by-step human instruction. T...

Agentic Commerce

Agentic Finance

Agentic commerce is the buying and selling of goods, services, and digital resources by AI agents autonomously — encompassing discovery, negotiation, ...

Agentic Finance

Agentic Finance

Agentic finance refers to the use of autonomous AI agents to execute financial transactions, manage portfolios, process payments, and interact with fi...

Agentic Payments

Agentic Finance

Agentic payments are transactions initiated and executed by AI agents autonomously, without per-payment human approval. They include agent-to-service,...

Agentic Workflow

Agentic AI

An agentic workflow is a multi-step process where AI agents autonomously plan, execute, and adapt their actions to complete a complex task — making de...

AI Agent

Agentic AI

An AI agent is an autonomous software system that perceives its environment, reasons about it, and takes actions to achieve specified goals — often us...

AI Alignment

Agentic AI

AI alignment is the challenge of ensuring that AI systems — particularly autonomous agents — act in accordance with human values, intentions, and goal...

AI Red Teaming

AI Agent Security

Adversarial testing of AI agent systems to find vulnerabilities, policy bypasses, and unintended behaviours before attackers do. Includes testing prom...

Airdrop

Blockchain & Crypto Fundamentals

An airdrop is a distribution of free tokens to existing wallet addresses — typically rewarding early users, community members, or holders of specific ...

Alchemy

Web3 Infrastructure

Alchemy is a leading blockchain infrastructure platform providing RPC nodes, enhanced APIs, and developer tools — powering thousands of Web3 applicati...

Alert Escalation

Policy Enforcement

Alert escalation is the process of routing policy violation alerts to increasingly senior or specialised responders based on the severity, frequency, ...

Alert Rule

Policy Enforcement

An alert rule is a rule that triggers a notification when specific policy events occur — such as repeated denials, unusual tool call patterns, or acce...

Allowance Revocation

Security & Compliance

Allowance revocation is the process of removing a previously granted ERC-20 token approval — setting the allowance back to zero so the spender contrac...

Allowlist (Tools)

AI Agent Security

An explicit list of MCP tools an agent is permitted to use. Any tool not on the allowlist is denied by default — the most secure approach to tool acce...

AML (Anti-Money Laundering)

Security & Compliance

Anti-Money Laundering (AML) refers to the laws, regulations, and procedures designed to prevent criminals from disguising illegally obtained funds as ...

AMM (Automated Market Maker)

DeFi

An Automated Market Maker (AMM) is a smart contract mechanism providing liquidity for token swaps using mathematical formulas and pooled funds — repla...

Anomaly Detection

Security & Compliance

Anomaly detection is the identification of patterns in data that deviate significantly from expected behavior — used in crypto security to flag suspic...

AP2 (Agent Payments Protocol)

Agentic Finance

AP2 is a payment protocol for AI agent transactions providing standardized negotiation, authorization, and settlement flows between agents and service...

API Key

Web3 Infrastructure

An API key is a unique identifier used to authenticate requests to an API service — controlling access, tracking usage, and enforcing rate limits for ...

Approval Hijacking

Security & Compliance

Approval hijacking is an attack that exploits existing ERC-20 token approvals to drain funds — either by compromising the approved spender contract or...

APR (Annual Percentage Rate)

DeFi

Annual Percentage Rate (APR) is the annualized return on a position without compounding — representing the base rate of yield before reinvestment effe...

Aptos

Blockchain & Crypto Fundamentals

Aptos is a Layer 1 blockchain using the Move programming language with parallel execution (Block-STM), built by former Meta engineers to deliver high ...

APY (Annual Percentage Yield)

DeFi

Annual Percentage Yield (APY) is the annualized return on a DeFi position including the effect of compounding — the standard metric for comparing yiel...

Arbitrum

Blockchain & Crypto Fundamentals

Arbitrum is an Ethereum Layer 2 optimistic rollup that provides faster, cheaper transactions while inheriting Ethereum's security — currently the larg...

Argument Constraint

Policy Enforcement

A rule in a YAML policy that restricts the value of a tool call argument. Argument constraints can enforce regex patterns, allowed enumerations, numer...

Argument Masking

Policy Enforcement

Replacing sensitive argument values with masked versions in audit logs — for example, card_number: "****1234". Argument masking preserves auditability...

Argument Redaction

Policy Enforcement

Completely removing sensitive argument values from logs and audit trails. Stronger than masking — the value is never persisted in any form. Redaction ...

Argument Schema

Policy Enforcement

An argument schema defines the expected structure, types, and constraints of arguments for an MCP tool, used by Intercept to validate tool calls again...

Argument Validation

Policy Enforcement

Argument validation is the process of checking tool call arguments against policy-defined constraints before the call reaches the MCP server — for exa...

Atomic Settlement

Payments & Fintech

Atomic settlement is a transaction guarantee that ensures an operation either completes entirely or fails entirely — with no possibility of partial ex...

Audit Compliance

Policy Enforcement

Audit compliance is the practice of maintaining complete, tamper-evident records of all AI agent tool calls and policy decisions to satisfy regulatory...

Audit Log

Policy Enforcement

An audit log is the structured log output from Intercept containing tool call details, matched policies, evaluation results, timestamps, and contextua...

Audit Trail

Policy Enforcement

An audit trail is a chronological, immutable record of every tool call, policy evaluation, and decision made by Intercept — essential for compliance, ...

Auto-Compounding

DeFi

Auto-compounding is an automated process that harvests earned yields and reinvests them back into the position — maximizing returns through the effect...

AutoGen

Agentic AI

AutoGen is an open-source framework by Microsoft for building multi-agent systems where agents collaborate through structured conversations — supporti...

AutoGPT

Agentic AI

AutoGPT is an open-source autonomous AI agent that chains LLM calls together to accomplish complex goals with minimal human intervention, pioneering t...

Automated Strategy

DeFi

An automated DeFi strategy is a programmatic system that executes investment decisions — rebalancing portfolios, harvesting yields, managing liquidity...

Autonomous Agent

Agentic AI

An autonomous agent is an AI system capable of operating independently over extended periods, making decisions and taking actions — including MCP tool...

Autonomous API Discovery

x402

Autonomous API discovery is the capability of AI agents to independently find, evaluate, and begin consuming new APIs — including paid x402 endpoints ...

Autonomous Transaction

Agentic Finance

A financial transaction initiated, constructed, and executed by an AI agent without human approval — the agent independently decides amount, recipient...

Avalanche

Blockchain & Crypto Fundamentals

Avalanche is a Layer 1 blockchain platform using a novel consensus protocol that achieves sub-second finality, supporting the creation of custom subne...

B

Backpressure

Policy Enforcement

A flow control mechanism where the proxy signals the agent to slow down when downstream MCP servers are overloaded. Backpressure prevents cascading fa...

Base

Blockchain & Crypto Fundamentals

Base is an Ethereum Layer 2 blockchain built by Coinbase using the OP Stack (Optimistic Rollup), offering fast transactions (~2 second finality), very...

Base Smart Wallet

Web3 Infrastructure

A smart contract wallet on the Base L2 chain providing programmable transaction validation, session keys, and gas sponsorship — commonly used as the u...

Batch Payment

Payments & Fintech

A batch payment is the execution of multiple payment transactions in a single operation — reducing gas costs, simplifying accounting, and enabling eff...

Biconomy

Web3 Infrastructure

Biconomy is a Web3 infrastructure platform providing account abstraction, gasless transactions, and cross-chain user experience solutions — simplifyin...

Bitcoin

Blockchain & Crypto Fundamentals

Bitcoin is the first decentralized cryptocurrency, created by Satoshi Nakamoto in 2009, operating on a proof-of-work blockchain as a peer-to-peer elec...

Blast Radius (Agent)

AI Agent Security

The maximum potential damage if an AI agent is compromised or misbehaves. Determined by the agent's tool access, permissions, argument ranges, and the...

Blob Transaction (EIP-4844)

Web3 Infrastructure

A blob transaction (EIP-4844) is a new Ethereum transaction type that carries large data 'blobs' at reduced cost — designed specifically for Layer 2 r...

Block

Blockchain & Crypto Fundamentals

A block is a batch of validated transactions bundled together and added to the blockchain — containing a header with metadata and a body with transact...

Block Confirmation

Blockchain & Crypto Fundamentals

A block confirmation is the inclusion of a transaction in a mined/validated block, with each subsequent block adding additional confirmation — increas...

Block Explorer

Blockchain & Crypto Fundamentals

A block explorer is a web application that indexes and displays blockchain data — enabling users to look up transactions, addresses, blocks, tokens, a...

Blockchain

Blockchain & Crypto Fundamentals

A blockchain is a distributed, append-only ledger that records transactions in cryptographically linked blocks, maintained by a network of nodes that ...

Bonding Curve

DeFi

A bonding curve is a mathematical function that determines a token's price based on its supply — automatically increasing price as more tokens are min...

Borrowing

DeFi

Borrowing in DeFi is taking a loan against deposited collateral through a smart contract — enabling leverage, tax-efficient liquidity access, and comp...

Bridge

Web3 Infrastructure

A blockchain bridge is a protocol enabling asset and data transfer between different blockchain networks — locking assets on one chain and minting equ...

Bridge Exploit

Security & Compliance

A bridge exploit is a security breach of a cross-chain bridge protocol — typically resulting in the theft of locked assets that back wrapped tokens on...

Browser Agent

Agentic AI

An AI autonomously navigating web pages — clicking links, filling forms, executing actions. When accessing e-commerce or financial services, it can in...

Bug Bounty

Security & Compliance

A bug bounty program offers financial rewards to security researchers who discover and responsibly disclose vulnerabilities — creating economic incent...

Bundler

Web3 Infrastructure

A bundler in account abstraction (ERC-4337) is a service that collects UserOperations from users, bundles them into a single transaction, and submits ...

Burst Limit

Policy Enforcement

The maximum number of tool calls permitted in a short burst before rate limiting kicks in. Burst limits allow temporary spikes in throughput — accommo...

C

Calldata

Blockchain & Crypto Fundamentals

Calldata is the read-only byte array sent with an Ethereum transaction that encodes function calls and parameters — the primary input mechanism for sm...

CBDC (Central Bank Digital Currency)

Payments & Fintech

A Central Bank Digital Currency (CBDC) is a digital form of a country's fiat currency issued directly by the central bank — offering programmable mone...

CCIP

Web3 Infrastructure

CCIP (Cross-Chain Interoperability Protocol) is Chainlink's cross-chain messaging standard that enables secure token transfers and arbitrary data mess...

Celestia

Web3 Infrastructure

Celestia is a modular data availability (DA) blockchain that provides affordable, scalable data publication — enabling rollups and app-chains to post ...

Chain ID

Blockchain & Crypto Fundamentals

A chain ID is a unique numeric identifier for a blockchain network — preventing replay attacks by ensuring transactions signed for one chain can't be ...

Chain of Thought (CoT)

Agentic AI

Chain of Thought (CoT) is a prompting technique where an LLM is guided to show its step-by-step reasoning process before arriving at an answer, signif...

Chainlink

Web3 Infrastructure

Chainlink is the largest decentralized oracle network, providing tamper-resistant price feeds, verifiable randomness, and cross-chain communication to...

Chargeback

Payments & Fintech

A chargeback is the reversal of a payment by the issuing bank or payment network — a consumer protection mechanism in traditional finance that does no...

CI/CD Policy Enforcement

Policy Enforcement

CI/CD policy enforcement is the practice of integrating policy validation — linting, testing, and compliance checks — into continuous integration and ...

Circuit Breaker

Policy Enforcement

An automated safety mechanism that halts an agent's tool calls when anomalous patterns are detected — call rate spikes, repeated denied calls, or erro...

Claude (Anthropic)

Agentic AI

Claude is a family of large language models built by Anthropic, designed with a focus on safety, helpfulness, and honesty — widely used for building A...

Coding Agent

Agentic AI

A coding agent is an AI system that autonomously writes, modifies, tests, and deploys code — going beyond code completion to handle multi-file changes...

Coinbase Commerce

Payments & Fintech

Coinbase Commerce is a payment platform enabling merchants to accept cryptocurrency payments — providing checkout widgets, APIs, and automatic settlem...

Coinbase Developer Platform (CDP)

Web3 Infrastructure

CDP is Coinbase's infrastructure for building onchain applications — providing wallet APIs, smart contract tools, and the x402 payment protocol. It's ...

Cold Storage

Security & Compliance

Cold storage is the practice of keeping cryptocurrency private keys completely offline and disconnected from the internet — providing maximum security...

Cold Wallet

Blockchain & Crypto Fundamentals

A cold wallet is a cryptocurrency storage method that keeps private keys completely offline — never connected to the internet — providing the highest ...

Collateral

DeFi

Collateral in DeFi is cryptocurrency deposited as security for a loan — if the borrower fails to maintain sufficient collateral value, the position is...

Compliance Automation

Security & Compliance

Compliance automation is the use of software systems to automatically enforce regulatory requirements — sanctions screening, transaction monitoring, r...

Compliance Framework

Security & Compliance

A compliance framework is a structured set of guidelines, controls, and best practices — such as SOC 2, GDPR, HIPAA, or PCI DSS — that organisations m...

Compliance Rule

Policy Enforcement

A compliance rule is a policy rule specifically designed to enforce regulatory or organisational compliance requirements on AI agent tool calls, ensur...

Composability

DeFi

Composability is the ability of DeFi protocols to interact with and build on each other like Lego blocks — enabling complex financial products from co...

Composability Risk

DeFi

Composability risk is the danger that arises when multiple DeFi protocols interact in ways that create unexpected vulnerabilities, cascading failures,...

Compound

DeFi

Compound is a pioneering DeFi lending protocol that established the algorithmic interest rate model — where supply and demand for each asset automatic...

Computer Use Agent

Agentic AI

An AI controlling a computer interface — clicking, filling forms, navigating websites. When accessing financial interfaces, these agents can initiate ...

Concentrated Liquidity

DeFi

Concentrated liquidity allows liquidity providers to allocate capital within specific price ranges rather than across the entire price curve — dramati...

Conditional Payment

Agentic Finance

A transaction executing only when specific conditions are met — delivery confirmation, oracle thresholds, time windows, or multi-party approval. Enabl...

Confused Deputy Attack

AI Agent Security

A confused deputy attack tricks a privileged AI agent into performing actions it shouldn't by exploiting its access to MCP tools. The agent becomes th...

Consensus Mechanism

Blockchain & Crypto Fundamentals

A consensus mechanism is the protocol by which distributed nodes agree on the current state of the blockchain — determining which transactions are val...

Constitutional AI

Agentic AI

Constitutional AI (CAI) is Anthropic's alignment methodology where AI behavior is guided by a written set of principles (a 'constitution') that the mo...

Container Escape (Agent)

AI Agent Security

Container escape in the agent context is when an agent running inside a containerised MCP server breaks out of the container boundary to access the ho...

Content Monetization (AI)

x402

Content monetization for AI is the practice of charging AI agents, crawlers, and automated systems for access to digital content — articles, data, res...

Content Safety Filter

AI Agent Security

A filter applied to MCP tool inputs or outputs that detects and blocks harmful, offensive, or policy-violating content in AI agent interactions, ensur...

Context Poisoning

AI Agent Security

Context poisoning corrupts an agent's context window by injecting misleading information through MCP tool responses, causing the agent to make flawed ...

Context Window

Agentic AI

A context window is the maximum number of tokens an LLM can process in a single interaction, encompassing system prompt, conversation history, retriev...

Contract Interaction

Blockchain & Crypto Fundamentals

A contract interaction is a blockchain transaction that calls a function on a smart contract — as opposed to a simple value transfer, involving execut...

Contract Verification

Security & Compliance

Contract verification is the process of publicly linking a smart contract's deployed bytecode to its human-readable source code on a block explorer — ...

Cooldown Period

Policy Enforcement

A mandatory waiting period imposed after a policy violation or rate limit hit before the agent can retry the tool call. Cooldowns prevent rapid retry ...

Cosmos

Blockchain & Crypto Fundamentals

Cosmos is a decentralized network of interconnected blockchains using the Tendermint consensus engine and Inter-Blockchain Communication (IBC) protoco...

Credential Stuffing (Agent)

AI Agent Security

Agent credential stuffing uses an AI agent's tool access to systematically test stolen credentials against services, leveraging the agent's speed and ...

CrewAI

Agentic AI

CrewAI is an open-source framework for orchestrating autonomous AI agents as collaborative teams ('crews'), where each agent has a defined role, goal,...

Cross-Border Payment

Payments & Fintech

A cross-border payment is a financial transfer between parties in different countries — an area where crypto and stablecoins offer dramatic improvemen...

Cross-Chain Interoperability

Web3 Infrastructure

Cross-chain interoperability is the ability of different blockchain networks to communicate, share data, and transfer assets seamlessly — a critical r...

Cross-Chain Spending Policy

Agentic Finance

Consistent financial rules for an agent across multiple blockchains — preventing circumvention of per-chain limits by spreading transactions....

Cross-Chain Transfer

Blockchain & Crypto Fundamentals

A cross-chain transfer is the movement of digital assets or data between different blockchain networks — requiring bridge protocols to handle the lock...

Cross-Server Attack

AI Agent Security

A cross-server attack is when a compromised or malicious MCP server manipulates an AI agent into performing harmful actions on a different, trusted MC...

Crypto Payment Gateway

Payments & Fintech

A crypto payment gateway enables merchants to accept cryptocurrency payments through their existing checkout flow — handling wallet interaction, trans...

Cryptocurrency

Blockchain & Crypto Fundamentals

A cryptocurrency is a digital or virtual currency that uses cryptographic techniques for security and operates on a decentralized blockchain network, ...

Curve Finance

DeFi

Curve Finance is a DEX optimized for stablecoin and pegged-asset swaps, using a specialized AMM formula that provides extremely low slippage for trade...

Custodial Wallet

Blockchain & Crypto Fundamentals

A custodial wallet is a cryptocurrency wallet where a third-party service (exchange, provider, or institution) holds and manages the private keys on b...

Custody Risk

Security & Compliance

Custody risk is the possibility of losing cryptocurrency due to failure, compromise, or misconduct of the entity holding the private keys — whether th...

D

DAI

Blockchain & Crypto Fundamentals

DAI is a decentralized stablecoin pegged to the US dollar, maintained through overcollateralized vaults on MakerDAO — notable for being backed by cryp...

DAO (Decentralized Autonomous Organization)

Blockchain & Crypto Fundamentals

A Decentralized Autonomous Organization (DAO) is an organization governed by smart contracts and token-holder voting rather than traditional hierarchy...

dApp (Decentralized Application)

Blockchain & Crypto Fundamentals

A dApp (decentralized application) is a software application that runs on a blockchain or peer-to-peer network rather than centralized servers — combi...

Data Availability

Web3 Infrastructure

Data availability (DA) is the guarantee that all data needed to verify blockchain state transitions has been published and is accessible — a critical ...

Data Exfiltration (Agent)

AI Agent Security

Agent data exfiltration is when an AI agent is manipulated into sending sensitive data — API keys, user data, internal documents — to an unauthorised ...

Data Integrity

Security & Compliance

Data integrity is the assurance that data remains accurate, consistent, and unaltered throughout its lifecycle — a fundamental guarantee provided by b...

Decentralization

Blockchain & Crypto Fundamentals

Decentralization is distributing control, data, and decision-making across multiple independent participants rather than concentrating it in a single ...

Decentralized Identity (DID)

Security & Compliance

Decentralized Identity (DID) is a framework for self-sovereign digital identity where the identity holder controls their own identifier and associated...

Decision Log

Policy Enforcement

A decision log is a specific audit log entry that records why a tool call was allowed or denied, including which policy rule matched, what conditions ...

Defence in Depth (Agent)

AI Agent Security

A security strategy that layers multiple independent controls — policy enforcement, argument validation, rate limiting, audit logging, and fail-closed...

DeFi (Decentralized Finance)

Blockchain & Crypto Fundamentals

Decentralized Finance (DeFi) is the ecosystem of financial applications built on blockchain smart contracts — enabling lending, borrowing, trading, an...

DeFi Aggregation

DeFi

DeFi aggregation is the practice of combining multiple DeFi protocols and liquidity sources into unified interfaces — optimizing execution across the ...

DeFi Insurance

DeFi

DeFi insurance provides coverage against smart contract exploits, stablecoin depegs, and protocol failures — using decentralized underwriting pools an...

DeFi Protocol

DeFi

A DeFi protocol is a set of smart contracts implementing a specific financial service on blockchain — such as lending, trading, derivatives, or asset ...

DeFi Risk Score

DeFi

A DeFi risk score is a quantitative assessment of the safety and reliability of a DeFi protocol, pool, or position — incorporating factors like smart ...

DeFi Yield

DeFi

DeFi yield is the return earned on cryptocurrency assets deployed in decentralized finance protocols — including interest from lending, trading fees f...

Delegated Spending

Agentic Finance

Delegated spending authorizes an AI agent to spend crypto on your behalf within constraints — amount, duration, recipients, and token types defined by...

Denial of Service (MCP)

AI Agent Security

MCP denial of service overwhelms an MCP server or proxy with excessive tool calls to degrade or prevent legitimate agent operations....

Denylist (Tools)

AI Agent Security

A list of MCP tools an agent is explicitly forbidden from using, with all other tools permitted by default. Less secure than allowlisting but easier t...

Dependency Confusion (MCP)

AI Agent Security

An attack where an AI agent resolves an MCP server name to a malicious package instead of the intended one, mirroring the dependency confusion attacks...

DEX (Decentralized Exchange)

DeFi

A Decentralized Exchange (DEX) is a peer-to-peer marketplace built on smart contracts enabling direct cryptocurrency trading without a centralized int...

DEX Aggregator

DeFi

A DEX aggregator routes trades across multiple decentralized exchanges to find the optimal execution price — splitting orders across pools and protoco...

Digital Currency

Payments & Fintech

Digital currency is any form of money that exists purely in electronic form — encompassing cryptocurrencies, stablecoins, CBDCs, and digital represent...

Digital Signature

Blockchain & Crypto Fundamentals

A digital signature is a cryptographic proof that a message or transaction was authorized by the holder of a specific private key — providing authenti...

Disaster Recovery

Security & Compliance

Disaster recovery in crypto encompasses the plans and procedures for recovering access to funds and systems after catastrophic events — including key ...

E

EigenLayer

DeFi

EigenLayer is a restaking protocol on Ethereum that allows staked ETH to be used to secure additional services (Actively Validated Services) — creatin...

EIP (Ethereum Improvement Proposal)

Web3 Infrastructure

An EIP (Ethereum Improvement Proposal) is a design document proposing changes to the Ethereum protocol — including new features, standards, and proces...

EIP-7702

Blockchain & Crypto Fundamentals

EIP-7702 is an Ethereum improvement proposal (activated in the Pectra upgrade) that allows externally owned accounts (EOAs) to temporarily delegate th...

Embedded Finance

Payments & Fintech

Embedded finance is the integration of financial services — payments, lending, insurance, banking — directly into non-financial software products and ...

Embedding

Agentic AI

An embedding is a dense vector representation of data in a continuous mathematical space, where semantic similarity is captured by vector proximity — ...

Emergency Shutdown

Security & Compliance

Immediately ceasing all agent financial operations — freezing wallets, revoking tokens, blocking all transactions. The most extreme safety measure for...

Encryption

Security & Compliance

Encryption is the process of converting data into an unreadable format using cryptographic algorithms — protecting information confidentiality so that...

ENS (Ethereum Name Service)

Blockchain & Crypto Fundamentals

Ethereum Name Service (ENS) is a decentralized naming system that maps human-readable names (like vitalik.eth) to Ethereum addresses — replacing compl...

EntryPoint Contract

Web3 Infrastructure

The EntryPoint contract is the singleton smart contract at the core of ERC-4337 account abstraction — receiving bundled UserOperations, validating the...

Enum Constraint

Policy Enforcement

Restricting a tool call argument to a predefined set of allowed values. Enum constraints enforce closed vocabularies — for example, currency must be o...

ERC-1155

Blockchain & Crypto Fundamentals

ERC-1155 is a multi-token standard that supports both fungible and non-fungible tokens in a single contract — more gas-efficient than deploying separa...

ERC-20

Blockchain & Crypto Fundamentals

ERC-20 is the standard interface for fungible tokens on Ethereum and EVM-compatible chains — defining functions like transfer, approve, and balanceOf ...

ERC-4337

Blockchain & Crypto Fundamentals

ERC-4337 is the Ethereum standard for account abstraction that enables smart contract wallets with programmable transaction validation, gas sponsorshi...

ERC-6551 (Token Bound Accounts)

Blockchain & Crypto Fundamentals

ERC-6551 (Token Bound Accounts) is a standard that gives every NFT its own smart contract wallet — enabling NFTs to own assets, interact with dApps, a...

ERC-721

Blockchain & Crypto Fundamentals

ERC-721 is the standard for non-fungible tokens (NFTs) on Ethereum — defining an interface where each token has a unique ID and distinct ownership, en...

Escrow

Payments & Fintech

Escrow is a financial arrangement where a third party holds funds until predetermined conditions are met — implemented in DeFi through smart contracts...

Ethereum

Blockchain & Crypto Fundamentals

Ethereum is a decentralized blockchain platform that enables smart contracts and decentralized applications, serving as the foundation for DeFi, NFTs,...

Event Log

Web3 Infrastructure

An event log is a record emitted by a smart contract during transaction execution — providing a gas-efficient way to record data that's accessible to ...

EVM (Ethereum Virtual Machine)

Blockchain & Crypto Fundamentals

The Ethereum Virtual Machine (EVM) is the runtime environment that executes smart contract bytecode on Ethereum — a sandboxed, deterministic computati...

Excessive Agency

AI Agent Security

Excessive agency is when an AI agent has more tool access, permissions, or autonomy than required for its task. It is a core vulnerability that amplif...

Externally Owned Account (EOA)

Blockchain & Crypto Fundamentals

An Externally Owned Account (EOA) is a blockchain account controlled by a private key held by a person or system — as opposed to a contract account wh...

F

Fail-Closed

Policy Enforcement

Fail-closed is a security posture where if Intercept cannot evaluate a policy — due to a configuration error, crash, or unexpected condition — the too...

Fail-Open

Policy Enforcement

Fail-open is a security posture where if policy evaluation fails for any reason, the tool call is allowed to proceed — prioritising availability over ...

Few-Shot Learning

Agentic AI

Few-shot learning is a technique where an LLM is given a small number of examples in the prompt to guide its behavior — enabling task-specific perform...

Fiat Off-Ramp

Payments & Fintech

A fiat off-ramp is a service that converts cryptocurrency back into traditional currency — enabling users to realize crypto gains, pay bills, and move...

Fiat On-Ramp

Payments & Fintech

A fiat on-ramp is a service that converts traditional currency (USD, EUR, etc.) into cryptocurrency — the entry point for new users moving from the tr...

Finality

Blockchain & Crypto Fundamentals

Finality is the guarantee that a blockchain transaction cannot be reversed, altered, or removed once confirmed — the point at which a transaction is c...

Financial Guardrail

Security & Compliance

Any mechanism preventing AI agents from causing financial harm — spending controls, budget limits, recipient restrictions, velocity monitoring, circui...

Fine-Tuning

Agentic AI

Fine-tuning is the process of further training a pre-trained language model on a domain-specific dataset to improve its performance on particular task...

Fireblocks

Web3 Infrastructure

Fireblocks is an enterprise-grade digital asset custody and operations platform — providing institutional-quality key management, transaction signing,...

Flash Loan

DeFi

A flash loan is an uncollateralized loan that must be borrowed and repaid within a single blockchain transaction — enabling complex arbitrage, liquida...

Flash Swap

DeFi

A flash swap is a feature of DEX protocols (primarily Uniswap) that allows you to receive tokens from a liquidity pool before paying for them — as lon...

Flashbots

DeFi

Flashbots is a research and development organization building infrastructure to mitigate the negative effects of MEV — including Flashbots Protect (pr...

Float

Payments & Fintech

Float is the time period during which funds are in transit between sender and receiver — representing temporarily unavailable money that in traditiona...

Forbidden Argument

Policy Enforcement

A policy rule that blocks tool calls containing a specific argument or argument value. Forbidden argument constraints prevent agents from using danger...

Formal Verification

Security & Compliance

Formal verification is the mathematical proof that a smart contract's code correctly implements its specification — providing the highest level of ass...

Front-Running

DeFi

Front-running in blockchain is the practice of placing a transaction ahead of a known pending transaction to profit from the anticipated price movemen...

Function Calling

MCP & Tool Infrastructure

Function calling is the capability of large language models to generate structured output that specifies which external function to invoke and with wh...

Fungible Token

Blockchain & Crypto Fundamentals

A fungible token is a digital asset where each unit is interchangeable with any other unit of the same type — one USDC is identical to any other USDC,...

G

Gas Abstraction

Web3 Infrastructure

Gas abstraction is the concept of hiding blockchain gas mechanics from end users — enabling them to pay fees in any token, have fees sponsored by appl...

Gas Fee

Blockchain & Crypto Fundamentals

Gas fees are the transaction costs paid to blockchain validators for executing operations — measured in units of computational work and priced in the ...

Gas Limit

Blockchain & Crypto Fundamentals

Gas limit is the maximum amount of gas a user is willing to spend on a transaction — setting an upper bound on computational work to prevent runaway e...

Gas Price

Blockchain & Crypto Fundamentals

Gas price is the amount of cryptocurrency (measured in gwei on Ethereum) that a user is willing to pay per unit of computational work — the primary fa...

Gas Sponsorship

Blockchain & Crypto Fundamentals

Gas sponsorship is the practice of a third party paying blockchain transaction gas fees on behalf of users — enabling gasless user experiences through...

GDPR (Agent Context)

Security & Compliance

GDPR in an agent context refers to the application of the General Data Protection Regulation to AI agent operations — specifically how agents processi...

GitOps (Policy)

Policy Enforcement

GitOps for policy is the practice of using git as the single source of truth for AI agent security policies. All policy changes go through pull reques...

Global Policy

Policy Enforcement

A global policy applies across all MCP servers in an Intercept configuration, enabling universal rules like rate limiting, mandatory audit logging, or...

Governance Token

Blockchain & Crypto Fundamentals

A governance token grants holders voting rights in a protocol's decision-making process — enabling decentralized governance over parameters, treasury ...

GPT (OpenAI)

Agentic AI

GPT (Generative Pre-trained Transformer) is OpenAI's family of large language models that have become foundational to the AI agent ecosystem through s...

Grounding

Agentic AI

Grounding in AI refers to techniques that anchor a language model's outputs to verifiable, real-world data sources — reducing hallucination and improv...

Gwei

Blockchain & Crypto Fundamentals

Gwei (gigawei) is a denomination of Ether equal to 10^9 wei or 0.000000001 ETH — the standard unit for expressing Ethereum gas prices, making fee calc...

H

Hallucination

Agentic AI

In AI, hallucination refers to when a language model generates confident, plausible-sounding output that is factually incorrect or fabricated — a fund...

Hardware Wallet

Blockchain & Crypto Fundamentals

A hardware wallet is a dedicated physical device that stores cryptocurrency private keys in a secure element chip, signing transactions offline while ...

Hash Function

Blockchain & Crypto Fundamentals

A cryptographic hash function is a one-way mathematical function that converts arbitrary input into a fixed-length output — deterministic, collision-r...

HIPAA (Agent Context)

Security & Compliance

HIPAA in an agent context refers to the application of the Health Insurance Portability and Accountability Act to AI agents — specifically how agents ...

Honeypot Contract

Security & Compliance

A honeypot contract is a malicious smart contract designed to appear vulnerable or profitable — luring victims to interact with it, only to trap their...

Hot Wallet

Blockchain & Crypto Fundamentals

A hot wallet is a cryptocurrency wallet whose private keys are stored on an internet-connected device, enabling instant transaction signing and execut...

HTTP 402 Payment Required

x402

HTTP 402 is a status code reserved in the HTTP specification for digital payment systems. Defined in HTTP/1.1 but never standardized — until x402 gave...

Human-in-the-Loop (HITL)

Agentic Finance

HITL requires explicit human approval for certain agent actions — particularly high-value or high-risk transactions — providing safety checkpoints wit...

I

Immutability

Blockchain & Crypto Fundamentals

Immutability in blockchain refers to the property that once data is recorded in a confirmed block, it cannot be altered or deleted — creating a perman...

Immutable Audit

Policy Enforcement

An immutable audit is an audit log that cannot be modified or deleted after creation. This tamper-evidence is essential for compliance and forensic in...

Immutable Audit Log

Security & Compliance

A tamper-proof record of all agent spending decisions anchored on-chain or cryptographically secured — entries cannot be modified or deleted after cre...

Impermanent Loss

DeFi

Impermanent loss is the reduction in value that liquidity providers experience when the price ratio of pooled tokens changes compared to simply holdin...

Incident Response

Security & Compliance

Incident response is the organized process of detecting, analyzing, containing, and recovering from security incidents — including established procedu...

Incident Response (Agent)

AI Agent Security

The process of detecting, investigating, and recovering from security incidents involving AI agents — including policy violations, data breaches, prom...

Indexer

Web3 Infrastructure

An indexer is a service that processes, organizes, and stores blockchain data in queryable databases — enabling fast, complex queries that would be im...

Indirect Prompt Injection

Security & Compliance

Malicious instructions embedded in external data sources (websites, documents, APIs) that agents process unknowingly, potentially triggering unauthori...

Indirect Tool Injection

AI Agent Security

Indirect tool injection is an attack where malicious instructions are embedded in data returned by an MCP tool, which then influences the AI agent's s...

Inference

Agentic AI

Inference is the process of running a trained AI model on new inputs to generate outputs — the production phase where models serve real requests, as o...

Infrastructure-as-Code

Policy Enforcement

Infrastructure-as-code (IaC) is the practice of managing and provisioning infrastructure through declarative configuration files rather than manual pr...

Infura

Web3 Infrastructure

Infura is a blockchain infrastructure service by Consensys providing Ethereum and multi-chain RPC access — notable as MetaMask's default RPC provider ...

Input Sanitisation

AI Agent Security

The process of cleaning and validating arguments that an AI agent passes to MCP tools before execution, preventing injection attacks, path traversal, ...

Insecure Tool Defaults

AI Agent Security

MCP tools that ship with permissive default settings — such as unrestricted file access, no authentication, or broad argument ranges — creating vulner...

Instant Settlement

Payments & Fintech

Instant settlement is the completion of a financial transaction in real-time — a native property of blockchain that eliminates the multi-day settlemen...

Intent Fingerprinting

Agentic Finance

Intent fingerprinting creates a cryptographic fingerprint of an agent's stated transaction intent and verifies it against the actual transaction submi...

Intent-Based Trading

DeFi

Intent-based trading is a DeFi execution model where traders express their desired outcome ('swap 1,000 USDC for ETH at the best price') and specializ...

Intercept (PolicyLayer)

Policy Enforcement

Intercept is an open-source Go binary (Apache 2.0) that acts as a transparent MCP proxy, sitting between MCP clients and MCP servers to enforce YAML-d...

Interchange Fee

Payments & Fintech

An interchange fee is the charge that a merchant's bank pays to the cardholder's bank for each card transaction — a major cost of traditional payments...

Invoice

Payments & Fintech

An invoice is a request for payment specifying amount, recipient, and terms — in crypto, often implemented as on-chain payment requests or structured ...

IPFS

Web3 Infrastructure

IPFS (InterPlanetary File System) is a decentralized, peer-to-peer file storage network that addresses content by its hash rather than location — enab...

ISO 20022

Payments & Fintech

ISO 20022 is an international standard for financial messaging that defines a common language for payment data — increasingly adopted by banks, SWIFT,...

L

LangChain

Agentic AI

LangChain is an open-source framework for building applications powered by large language models, providing abstractions for chains, agents, memory, a...

LangGraph

Agentic AI

LangGraph is a framework by LangChain for building stateful, multi-step AI agent applications using directed graphs, where nodes represent computation...

Large Language Model (LLM)

Agentic AI

A Large Language Model (LLM) is a neural network trained on vast text corpora that can understand, generate, and reason about natural language, servin...

Layer 1 (L1)

Blockchain & Crypto Fundamentals

A Layer 1 (L1) blockchain is the base-level network providing its own consensus, security, and execution — such as Ethereum, Bitcoin, or Solana — upon...

Layer 2 (L2)

Blockchain & Crypto Fundamentals

A Layer 2 (L2) is a scaling solution built on a Layer 1 blockchain that processes transactions off-chain while inheriting L1 security — dramatically i...

LayerZero

Web3 Infrastructure

LayerZero is an omnichain interoperability protocol enabling cross-chain messaging and token transfers between 50+ blockchains — using a modular secur...

Least Privilege (MCP)

AI Agent Security

Applying the principle of least privilege to MCP tool access: AI agents should only have access to the specific tools and argument ranges required for...

Lending Protocol

DeFi

A lending protocol is a DeFi application that enables permissionless borrowing and lending of crypto assets through smart contracts — with interest ra...

Lending Rate

DeFi

A lending rate in DeFi is the interest rate earned by depositors who supply assets to a lending protocol — determined algorithmically based on the uti...

Leverage

DeFi

Leverage in DeFi is the use of borrowed funds to amplify trading positions or yield strategies — multiplying both potential gains and losses relative ...

Lido

DeFi

Lido is the largest liquid staking protocol, allowing users to stake ETH (and other assets) while receiving a liquid derivative token (stETH) that can...

Lightning Network

Payments & Fintech

The Lightning Network is a Layer 2 payment channel network built on Bitcoin that enables instant, low-cost Bitcoin transactions — making Bitcoin pract...

Liquid Staking

DeFi

Liquid staking is a mechanism that lets users stake cryptocurrency while receiving a tradeable derivative token representing their staked position — m...

Liquidation

DeFi

Liquidation in DeFi is the automatic process of selling a borrower's collateral when their loan-to-value ratio exceeds the protocol's threshold — prot...

Liquidity Fragmentation

DeFi

Liquidity fragmentation is the dispersion of trading liquidity across multiple DEXs, chains, pools, and fee tiers — reducing market depth and increasi...

Liquidity Mining

DeFi

Liquidity mining is a DeFi incentive mechanism that distributes governance or reward tokens to users who provide liquidity — bootstrapping protocol ad...

Liquidity Pool

DeFi

A liquidity pool is a smart contract holding reserves of two or more tokens that enables decentralized trading — users trade against the pool rather t...

Liquidity Provider (LP)

DeFi

A liquidity provider (LP) is a user who deposits tokens into a liquidity pool, earning trading fees and sometimes additional rewards in exchange for e...

LLM Router

Agentic AI

An LLM router is a system that intelligently directs AI requests to different models based on task complexity, cost, latency requirements, or domain —...

Loan-to-Value (LTV)

DeFi

Loan-to-Value (LTV) ratio is the proportion of borrowed amount to collateral value in a DeFi lending position — determining borrowing capacity and liq...

Log Forwarding

Policy Enforcement

Log forwarding is the practice of sending audit logs from the MCP proxy to external logging systems — such as SIEM platforms, S3 buckets, or Elasticse...

Log Retention

Policy Enforcement

Log retention refers to policies governing how long audit logs of AI agent tool calls are stored. Different regulations require different retention pe...

LP Token

DeFi

An LP token is a receipt token issued to liquidity providers when they deposit into a pool — representing their proportional share of the pool's asset...

M

Machine-to-Machine Payments

x402

Machine-to-machine (M2M) payments are financial transactions initiated, authorised, and settled entirely by software systems — AI agents, APIs, IoT de...

Mainnet

Blockchain & Crypto Fundamentals

Mainnet is the primary production blockchain network where real transactions with real economic value occur — as opposed to testnets which use valuele...

MakerDAO

DeFi

MakerDAO is the protocol behind DAI, a decentralized stablecoin maintained through overcollateralized vaults — one of the oldest and most important De...

Malicious MCP Server

AI Agent Security

A malicious MCP server is an MCP server deliberately designed to exfiltrate data, execute harmful operations, or manipulate the AI agent through poiso...

Man-in-the-Middle (MCP)

AI Agent Security

A man-in-the-middle (MITM) attack on MCP intercepts and potentially modifies protocol traffic between client and server. This is relevant when using n...

Maximal Extractable Value

DeFi

Maximal Extractable Value (MEV) is the maximum value that can be extracted from block production beyond standard rewards — through transaction reorder...

MCP Client

MCP & Tool Infrastructure

An MCP client is the component within an AI agent or application that connects to MCP servers, discovers available tools and resources, and invokes th...

MCP Prompt

MCP & Tool Infrastructure

An MCP prompt is a reusable, parameterised prompt template exposed by an MCP server that provides standardised workflows and interaction patterns for ...

MCP Resource

MCP & Tool Infrastructure

An MCP resource is a read-only data source exposed by an MCP server that provides context to AI agents — such as files, database records, API response...

MCP Sampling

MCP & Tool Infrastructure

MCP sampling is a capability in the Model Context Protocol that allows an MCP server to request LLM completions through the connected client — enablin...

MCP Server

MCP & Tool Infrastructure

A service exposing capabilities to AI agents via the Model Context Protocol — tools, resources, and prompts that any MCP-compatible agent can discover...

MCP Server Spoofing

AI Agent Security

MCP server spoofing is impersonating a legitimate MCP server to intercept or manipulate tool calls between the client and the real server....

MCP Tool

MCP & Tool Infrastructure

An MCP tool is an executable capability exposed by an MCP server, described with a name, description, and JSON Schema parameters, that AI agents can d...

Mempool

Blockchain & Crypto Fundamentals

The mempool (memory pool) is the waiting area where unconfirmed transactions sit after broadcast but before inclusion in a block — a critical componen...

Merchant Category Code (MCC)

Payments & Fintech

A Merchant Category Code (MCC) is a four-digit code assigned to businesses by card networks (Visa, Mastercard) that classifies the type of goods or se...

Merchant Onboarding

Payments & Fintech

Merchant onboarding is the process of enabling a business or service to accept cryptocurrency payments — including wallet setup, payment integration, ...

Merkle Tree

Blockchain & Crypto Fundamentals

A Merkle tree is a hierarchical data structure where each leaf contains a data hash and each node contains the hash of its children — enabling efficie...

Metered API Access

x402

Metered API access is a billing model where API consumers pay based on actual usage — per request, per token generated, per byte transferred, or per c...

MEV (Maximal Extractable Value)

DeFi

Maximal Extractable Value (MEV) is the profit that block producers can extract by including, excluding, or reordering transactions within a block — a ...

MiCA Regulation

Security & Compliance

MiCA (Markets in Crypto-Assets) is the European Union's comprehensive regulatory framework for cryptocurrency — establishing rules for issuers, servic...

Micro-Authorization

Agentic Finance

Individually authorizing each small agent payment in real-time rather than batch approval. Every micropayment passes through full policy evaluation....

Micropayment

x402

A micropayment is a financial transaction for a very small amount — typically under $1 and sometimes fractions of a cent — enabled by low-fee payment ...

Model Context Protocol (MCP)

MCP & Tool Infrastructure

An open standard by Anthropic defining how AI agents connect to external tools and data sources. MCP provides a universal interface for discovering an...

Modular Blockchain

Web3 Infrastructure

A modular blockchain separates core functions — execution, consensus, settlement, and data availability — into specialized layers that can be mixed an...

Money API

x402

A money API is a programmatic interface that gives software direct access to financial operations — sending payments, checking balances, managing acco...

Money Transmission

Payments & Fintech

Money transmission is the regulated activity of transferring funds on behalf of others — requiring licenses in most jurisdictions and a key compliance...

MPC Wallet

Security & Compliance

An MPC (Multi-Party Computation) wallet distributes private key material across multiple parties or devices, requiring a threshold of them to collabor...

Multi-Agent System

Agentic AI

A multi-agent system (MAS) is an architecture where multiple AI agents collaborate, compete, or coordinate to accomplish tasks that would be difficult...

Multi-Chain Agent

Agentic AI

An AI agent that operates across multiple blockchain networks — holding assets, executing transactions, and interacting with protocols on different ch...

Multi-Modal Agent

Agentic AI

A multi-modal agent is an AI system that can process and generate multiple types of data — text, images, audio, video — enabling richer interaction wi...

Multi-Signature Wallet (Multisig)

Security & Compliance

A multi-signature (multisig) wallet is a smart contract wallet that requires a minimum number of private key signatures (e.g., 2-of-3, 3-of-5) to auth...

O

OFAC Compliance

Security & Compliance

OFAC compliance refers to adherence to the rules and regulations of the US Office of Foreign Assets Control, which administers economic sanctions prog...

Off-Chain

Blockchain & Crypto Fundamentals

Off-chain refers to data, computation, or transactions that occur outside the blockchain — processed on external servers, Layer 2 networks, or peer-to...

On-Chain

Blockchain & Crypto Fundamentals

On-chain refers to data and transactions that are recorded directly on the blockchain — fully transparent, immutable, and verifiable by any network pa...

On-Chain Policy Enforcement

Agentic Finance

Using smart contracts to verify spending rules on the blockchain — tamper-proof, transparent, and independently verifiable by anyone....

Open Banking

Payments & Fintech

Open banking is a regulatory and technology framework that requires banks to share customer financial data with authorized third parties through APIs ...

Open Weights Model

Agentic AI

An open-weights model is an AI model whose trained parameters are publicly released, allowing anyone to download, run, fine-tune, and deploy it — dist...

OpenAI Agents SDK

Agentic AI

The OpenAI Agents SDK is a lightweight, production-focused framework for building AI agents with built-in support for tool calling, agent handoffs, gu...

Openfort

Web3 Infrastructure

Openfort is a wallet infrastructure platform designed for AI agents and gaming applications, providing account abstraction wallets, gas sponsorship, a...

Operational Security (OpSec)

Security & Compliance

Operational security (OpSec) in crypto encompasses the practices and procedures that protect private keys, accounts, and systems from compromise — ext...

Optimism

Blockchain & Crypto Fundamentals

Optimism is an Ethereum Layer 2 optimistic rollup and the creator of the OP Stack — an open-source framework for building L2 chains that powers Base, ...

Optimistic Rollup

Web3 Infrastructure

An optimistic rollup is a Layer 2 scaling solution that assumes transactions are valid by default and only runs computation if a fraud proof is submit...

Oracle

Web3 Infrastructure

A blockchain oracle is any service that connects smart contracts to external data and systems — enabling on-chain applications to react to off-chain e...

Oracle Feed

DeFi

An oracle feed is a continuous stream of real-world data delivered to blockchain smart contracts — most commonly price data for financial assets, upda...

Oracle Manipulation

Security & Compliance

Oracle manipulation is an attack that corrupts the price data fed to smart contracts — causing DeFi protocols to make incorrect decisions about liquid...

Order Book DEX

DeFi

An order book DEX matches buy and sell orders through a traditional limit order system implemented on blockchain — offering a trading experience close...

Output Filtering

AI Agent Security

Inspecting and filtering MCP tool responses before they are returned to the AI agent, preventing sensitive data leakage, blocking context poisoning at...

Over-Permissioned Agent

AI Agent Security

An AI agent configured with access to more MCP tools or broader argument ranges than its task requires, violating the principle of least privilege and...

OWASP Top 10 for LLM Applications

AI Agent Security

The Open Web Application Security Project's list of the ten most critical security risks for applications built with large language models. The standa...

P

Pay-Per-Inference

x402

Pay-per-inference is a pricing model where each AI model inference request (an LLM completion, image generation, embedding, or classification) is paid...

Pay-Per-Token Pricing

x402

Pay-per-token pricing is a billing model for large language models and other generative AI services where the consumer pays based on the exact number ...

Pay-Per-Use API

x402

A pay-per-use API charges per request using crypto micropayments rather than flat subscriptions. With x402, AI agents pay per call using stablecoins i...

Payable Endpoint

x402

A payable endpoint is an HTTP API endpoint that gates access behind an x402 payment — returning 402 Payment Required with structured pricing to unpaid...

Paymaster

Web3 Infrastructure

A paymaster is a smart contract in the ERC-4337 account abstraction system that sponsors gas fees on behalf of smart account users or agents — enablin...

Payment API

Payments & Fintech

A payment API is a programmatic interface that enables applications and agents to initiate, process, and manage financial transactions — abstracting t...

Payment Attestation

Agentic Finance

A cryptographic proof that an agent payment was authorized and policy-compliant, verifiable by third parties without accessing internal policy configu...

Payment Channel

Payments & Fintech

A payment channel is an off-chain protocol that enables multiple transactions between two parties with only two on-chain transactions — one to open th...

Payment Compliance

Payments & Fintech

Payment compliance is the adherence to legal, regulatory, and industry requirements governing payment operations — including sanctions screening, AML ...

Payment Dispute

Payments & Fintech

A payment dispute in crypto is a disagreement between parties about whether a payment obligation has been satisfied — handled through smart contract e...

Payment Facilitator

Agentic Finance

In the x402 stack, a payment facilitator processes and settles agent payments for merchants, handling crypto complexity so merchants don't manage wall...

Payment Finality

Payments & Fintech

Payment finality is the point at which a payment becomes irrevocable and the recipient can consider the funds fully received — varying significantly a...

Payment Fraud

Payments & Fintech

Payment fraud encompasses unauthorized or deceptive transactions designed to steal funds — a major problem in traditional finance that blockchain's cr...

Payment Gateway

Payments & Fintech

A payment gateway is the technology that securely processes payment transactions between a customer and merchant — in crypto, managing wallet connecti...

Payment Intent

Payments & Fintech

A payment intent is a data object representing the intention to make a payment — including amount, currency, recipient, and metadata — created before ...

Payment Netting

Payments & Fintech

Payment netting is the offsetting of multiple payments between parties to settle only the net difference — reducing the number and volume of actual tr...

Payment Orchestration

Payments & Fintech

Payment orchestration is the coordination of payment flows across multiple providers, chains, and methods — routing each transaction through the optim...

Payment Processor

Payments & Fintech

A payment processor is a service that handles the technical and financial aspects of accepting payments — in crypto, enabling merchants to accept cryp...

Payment Protocol

Payments & Fintech

A payment protocol is a standardized set of rules and message formats that define how payments are initiated, authenticated, processed, and verified b...

Payment Rails

Payments & Fintech

Payment rails are the underlying infrastructure and protocols that facilitate the movement of money between parties — including traditional systems (A...

Payment Receipt

Payments & Fintech

A payment receipt in crypto is the on-chain transaction record that serves as proof of payment — including sender, recipient, amount, timestamp, and t...

Payment Splitter Contract

Payments & Fintech

A payment splitter is a smart contract that automatically distributes received payments among multiple recipients according to predefined shares — use...

Payment Splitting

Payments & Fintech

Payment splitting is the automatic division of incoming payments among multiple recipients according to predefined rules — implemented in smart contra...

Payment Streaming

Payments & Fintech

Payment streaming is the continuous, real-time flow of tokens from one address to another at a defined rate — enabling per-second payments rather than...

Payment Token

Payments & Fintech

A payment token is a digital token specifically designed and used for making payments — distinct from utility tokens (access to services) and security...

Payment Verification

Payments & Fintech

Payment verification is the process of confirming that a cryptocurrency payment was executed correctly — verifying the transaction was included in a b...

Payment-Aware Proxy

x402

A payment-aware proxy is a network intermediary that understands x402 payment flows — intercepting 402 responses, applying spending policies, managing...

Payroll

Payments & Fintech

Crypto payroll is the payment of employee salaries and contractor fees in cryptocurrency or stablecoins — increasingly used by Web3 companies and offe...

PCI DSS (Agent Context)

Security & Compliance

PCI DSS in an agent context refers to the application of the Payment Card Industry Data Security Standard to AI agents — specifically how agents makin...

Peer-to-Peer Payment

Payments & Fintech

A peer-to-peer (P2P) payment is a direct transfer of funds between two individuals without a financial intermediary — the original vision of Bitcoin a...

Penetration Testing

Security & Compliance

Penetration testing (pentesting) in crypto is the authorized simulation of attacks against smart contracts, infrastructure, and operational processes ...

Per-Tool Rate Limit

Policy Enforcement

A rate limit applied to a specific MCP tool rather than globally across all tools. Allows operators to set different throughput ceilings for different...

Per-User Rate Limit

Policy Enforcement

Rate limits scoped to individual users or agent identities rather than applied globally. Ensures one agent cannot consume another's quota, enabling fa...

Permission Creep (Agent)

AI Agent Security

The gradual accumulation of MCP tool permissions over time as new capabilities are added to an agent's configuration but old, unnecessary ones are nev...

Permissionless

Blockchain & Crypto Fundamentals

Permissionless describes a system that anyone can access, use, and build on without needing approval from a gatekeeper — a core property of public blo...

Permit2

Blockchain & Crypto Fundamentals

Permit2 is a token approval protocol by Uniswap that provides a unified, more secure allowance system for ERC-20 tokens — featuring built-in expiratio...

Perpetual Swap (Perps)

DeFi

A perpetual swap (perp) is a derivative contract that lets traders speculate on asset prices with leverage and no expiration date — settled through a ...

Phishing Attack

Security & Compliance

A phishing attack in crypto is a social engineering scam that tricks users into revealing private keys, seed phrases, or signing malicious transaction...

PII Detection (Agent)

AI Agent Security

Detecting personally identifiable information in MCP tool call arguments or responses to prevent AI agents from inadvertently exfiltrating, processing...

Pimlico

Web3 Infrastructure

Pimlico is an ERC-4337 infrastructure provider offering bundler and paymaster services — enabling developers to build account abstraction features int...

Point of Sale (POS)

Payments & Fintech

A point-of-sale (PoS) system for crypto is the hardware and software enabling merchants to accept cryptocurrency payments in physical retail locations...

Policy Action (Allow/Deny/Log)

Policy Enforcement

Policy actions are the three possible outcomes of policy evaluation in Intercept: allow (the tool call proceeds to the MCP server), deny (the tool cal...

Policy Condition

Policy Enforcement

A policy condition is a constraint within a policy rule that evaluates tool call arguments against defined criteria (e.g. amount < 1000, branch != "ma...

Policy Diff

Policy Enforcement

A policy diff is the comparison between two versions of a policy file to see exactly what changed — which rules were added, removed, or modified. Esse...

Policy Dry Run

Policy Enforcement

A policy dry run is a mode where Intercept evaluates policies and logs the decisions that would be made, but does not enforce them — all tool calls ar...

Policy Engine

Policy Enforcement

A policy engine evaluates requests against predefined rules and returns allow/deny decisions. In Intercept, the policy engine evaluates every MCP tool...

Policy Evaluation Pipeline

Policy Enforcement

The policy evaluation pipeline is the sequence of steps Intercept follows to evaluate every tool call: match server, match tool, evaluate conditions, ...

Policy File

Policy Enforcement

A policy file is the physical YAML file (e.g. stripe.yaml, github.yaml) that contains policy rules for one or more MCP servers, stored alongside your ...

Policy Hot Reload

Policy Enforcement

Policy hot reload is the ability to update policy files without restarting Intercept, with changes taking effect on the next tool call to enable zero-...

Policy Inheritance

Policy Enforcement

Policy inheritance is the mechanism by which tool-level policies inherit from server-level policies, which in turn inherit from global policies, with ...

Policy Linting

Policy Enforcement

Policy linting is the static analysis of YAML policy files to catch syntax errors, unreachable rules, conflicting conditions, type mismatches, and oth...

Policy Override

Policy Enforcement

A policy override is a mechanism to temporarily or permanently bypass a policy rule, granting an exception for a specific tool call, agent, or time wi...

Policy Priority

Policy Enforcement

Policy priority is the order in which policies are evaluated when multiple rules could match a tool call, with higher-priority rules overriding lower-...

Policy Rollback

Policy Enforcement

Policy rollback is the process of reverting to a previous version of a YAML policy when a new policy causes issues — such as blocking legitimate tool ...

Policy Rule

Policy Enforcement

A policy rule is a single rule within a policy file that specifies an action (allow, deny, or log) for a specific tool or tool pattern, optionally wit...

Policy Template

Policy Enforcement

A pre-built, reusable YAML policy configuration for common agent use cases — such as coding assistants, data analysis agents, or DevOps automation. Te...

Policy Testing

Policy Enforcement

Policy testing is the practice of validating policies against predefined test cases before deployment, ensuring they behave as expected — allowing wha...

Policy Versioning

Policy Enforcement

Policy versioning is the practice of tracking changes to YAML policy files over time using version control (git), enabling audit trails of who changed...

Policy Violation

Policy Enforcement

When an AI agent attempts a tool call that violates a YAML-defined policy — calling a denied tool, passing disallowed arguments, or exceeding rate lim...

Policy Violation Event

Policy Enforcement

A policy violation event is emitted when a tool call is denied by policy, signalling that an agent attempted an operation outside its permitted bounda...

Policy-as-Code

Policy Enforcement

Policy-as-code is the practice of defining security and compliance policies as version-controlled, machine-readable code rather than manual configurat...

Polygon

Blockchain & Crypto Fundamentals

Polygon is a multi-chain scaling ecosystem for Ethereum that includes a PoS sidechain, zkEVM rollup, and CDK framework — providing various scaling app...

Pre-Authorization

Agentic Finance

An agent requests approval before committing funds. The policy engine evaluates and returns an authorization token for the actual payment execution....

Price Impact

DeFi

Price impact is the change in a token's market price caused by executing a trade — larger trades relative to available liquidity cause greater price m...

Price Oracle

DeFi

A price oracle in DeFi is a data feed that supplies real-time asset prices to smart contracts — critical for lending liquidations, derivative settleme...

Principle of Least Privilege

Security & Compliance

The principle of least privilege states that every entity (user, agent, process) should have only the minimum permissions necessary to perform its int...

Private Key

Blockchain & Crypto Fundamentals

A private key is a cryptographic secret — a large random number — that grants complete control over a blockchain address, enabling the holder to sign ...

Private Transaction

Security & Compliance

A private transaction is a blockchain transaction where some or all details — sender, recipient, amount, or data — are concealed from public view whil...

Privilege Escalation

Security & Compliance

Privilege escalation is a security exploit where an entity gains access to tools or capabilities beyond what was initially authorised — either by expl...

Privy

Web3 Infrastructure

Privy is a web3 authentication and embedded wallet platform that creates non-custodial wallets for users without requiring them to manage seed phrases...

Programmable Money

Payments & Fintech

Cryptocurrency with embedded rules governing how it can be spent — enabling conditions like spending limits, approved recipients, and time locks direc...

Programmable Wallet

Agentic Finance

A wallet with built-in logic enforcing transaction rules — spending limits, recipient restrictions, multi-party approvals — at the wallet level. Smart...

Prompt Chaining

Agentic AI

Prompt chaining is the technique of connecting multiple LLM calls in sequence, where each call's output feeds into the next call's input — enabling co...

Prompt Engineering

Agentic AI

Prompt engineering is the practice of designing and optimizing input text to guide large language models toward producing desired outputs, including t...

Prompt Injection

Security & Compliance

An attack where malicious input manipulates an AI agent's behaviour by injecting instructions that override its programming. Successful prompt injecti...

Prompt Injection (Tool-Layer)

AI Agent Security

Tool-layer prompt injection embeds malicious instructions in MCP tool descriptions, schemas, or return values to hijack agent behaviour. It targets th...

Prompt Leaking

AI Agent Security

Prompt leaking is when an MCP tool or server extracts the agent's system prompt, user instructions, or conversation context through crafted tool inter...

Proof of Stake (PoS)

Blockchain & Crypto Fundamentals

Proof of Stake (PoS) is a consensus mechanism where validators lock cryptocurrency as collateral to participate in block production, with selection pr...

Proof of Work (PoW)

Blockchain & Crypto Fundamentals

Proof of Work (PoW) is a consensus mechanism where miners compete to solve computationally intensive puzzles, earning the right to add the next block ...

Protocol Fee

DeFi

A protocol fee is revenue collected by a DeFi protocol's smart contracts from user activity — such as trading fees, borrowing interest, or service cha...

Protocol Governance

DeFi

Protocol governance is the system through which a DeFi protocol's parameters, upgrades, and treasury are managed — typically through token-weighted vo...

Proxy Contract

Blockchain & Crypto Fundamentals

A proxy contract is a smart contract pattern that delegates execution to an implementation contract — enabling upgradeable smart contracts by changing...

PSD2

Payments & Fintech

PSD2 (Payment Services Directive 2) is European regulation mandating that banks provide API access to customer accounts for authorized third parties —...

Public Key

Blockchain & Crypto Fundamentals

A public key is the cryptographic counterpart to a private key — freely shared to verify signatures and derive blockchain addresses, without revealing...

PydanticAI

Agentic AI

PydanticAI is a Python agent framework by the creators of Pydantic that emphasizes type safety, structured outputs, and production reliability — using...

R

Range Constraint

Policy Enforcement

Restricting a numeric tool call argument to a minimum and/or maximum value. Range constraints set safe operational bounds — for example, ensuring a tr...

Rate Limiting (Security)

Security & Compliance

Rate limiting is a security control that restricts the frequency of operations — transactions per minute, API calls per hour, or spending events per d...

Rate Limiting (Tool Calls)

Policy Enforcement

Constraining how frequently an AI agent can invoke specific MCP tools within a defined time window. Rate limiting prevents runaway agents, protects do...

ReAct Agent

Agentic AI

A ReAct agent follows the Reasoning + Acting paradigm, alternating between thinking steps (reasoning about what to do) and action steps (executing too...

Real World Assets (RWA)

DeFi

Real-world assets (RWAs) are traditional financial instruments — such as bonds, real estate, commodities, and private credit — represented as tokens o...

Real-Time Gross Settlement (RTGS)

Payments & Fintech

Real-Time Gross Settlement (RTGS) is a payment system that settles transactions individually and immediately — the backbone of central bank payment sy...

Real-Time Policy Evaluation

Agentic Finance

Checking an agent's transaction against all rules at request time — before signing. Decisions in milliseconds for immediate allow/deny....

Reasoning Agent

Agentic AI

A reasoning agent is an AI agent that uses explicit step-by-step thinking — such as chain-of-thought or extended thinking — to break down complex prob...

Recurring Payment

Payments & Fintech

A recurring payment is an automated, periodic transfer of funds — such as subscriptions, rent, or salaries — that in crypto requires specific smart co...

Reentrancy Attack

Security & Compliance

A reentrancy attack exploits a smart contract vulnerability where an external call allows the attacker to re-enter the contract before the first execu...

Regex Validation (Policy)

Policy Enforcement

Using regular expressions in YAML policies to validate tool call argument values before they reach the MCP server. Regex constraints can enforce email...

Regulatory Compliance

Security & Compliance

Regulatory compliance is the adherence to laws, regulations, and industry standards governing cryptocurrency operations — including KYC/AML requiremen...

Reinforcement Learning

Agentic AI

Reinforcement Learning (RL) is a machine learning paradigm where an agent learns optimal behavior through trial and error, receiving rewards or penalt...

Relayer

Web3 Infrastructure

A relayer is a service that submits transactions on behalf of users — enabling gasless transactions, meta-transactions, and cross-chain message delive...

Remittance

Payments & Fintech

Remittance is the transfer of money by a foreign worker to their home country — a massive global market ($650B+ annually) where crypto stablecoins off...

Replay Attack (Tool Call)

AI Agent Security

A replay attack on tool calls captures and re-sends a valid MCP tool call to execute it again, potentially duplicating financial transactions, destruc...

Required Argument

Policy Enforcement

A policy rule enforcing that a specific argument must be present in a tool call. Required argument constraints prevent tools from being called with mi...

Resource Exhaustion (Agent)

AI Agent Security

Agent resource exhaustion is when an AI agent consumes excessive compute, memory, API calls, or tokens — either through manipulation or runaway behavi...

Response Filtering

Policy Enforcement

Inspecting and modifying MCP tool responses before they reach the agent. Response filtering can strip sensitive data, block certain patterns, redact i...

Response Validation

Policy Enforcement

Checking MCP tool responses against expected schemas or patterns before passing them to the agent. Response validation catches malformed, unexpected, ...

Responsible AI

AI Agent Security

The practice of developing and deploying AI systems in ways that are safe, fair, transparent, and accountable. For AI agents, this includes enforcing ...

Restaking

DeFi

Restaking allows already-staked cryptocurrency (like staked ETH) to be simultaneously used to secure additional protocols and services — extending blo...

Retrieval-Augmented Generation (RAG)

Agentic AI

Retrieval-Augmented Generation (RAG) is an architecture that enhances LLM responses by retrieving relevant documents from an external knowledge base a...

RLHF

Agentic AI

Reinforcement Learning from Human Feedback (RLHF) is a training technique that aligns LLM outputs with human preferences by training a reward model on...

Rogue Agent

AI Agent Security

An AI agent that has deviated from its intended behaviour — whether through prompt injection, misconfiguration, or emergent behaviour — and is now per...

Role-Based Access Control (RBAC)

Security & Compliance

Role-Based Access Control (RBAC) is a security model that assigns permissions to roles rather than individual entities, and then assigns roles to user...

Rollup

Web3 Infrastructure

A rollup is a Layer 2 scaling solution that executes transactions off-chain, bundles them together, and posts compressed data or proofs to the Layer 1...

RPC Node

Web3 Infrastructure

An RPC node is a blockchain node that exposes a Remote Procedure Call interface — allowing applications, wallets, and agents to read blockchain data a...

RPC Provider

Web3 Infrastructure

An RPC provider is a service that operates blockchain nodes and exposes their RPC interface as an API — enabling developers to interact with blockchai...

Rug Pull

DeFi

A rug pull is a crypto scam where project creators abandon a project and steal user funds — typically by draining liquidity pools, exploiting admin fu...

S

Safe (Gnosis Safe)

Web3 Infrastructure

Safe (formerly Gnosis Safe) is the most widely deployed smart contract wallet platform, providing multi-signature authorization, modular extensions, a...

Sanctions Screening

Security & Compliance

Sanctions screening is the process of checking cryptocurrency addresses and transactions against sanctions lists maintained by authorities like OFAC, ...

Sandbox Escaping

AI Agent Security

Sandbox escaping is when an AI agent or MCP tool breaks out of its intended execution environment to access system resources, files, or networks it sh...

Sandwich Attack

DeFi

A sandwich attack is an MEV strategy where an attacker places transactions before and after a victim's swap — front-running to raise the price, then b...

Scoped Token

Agentic Finance

A scoped token grants an AI agent limited, time-bound spending permission — restricting amount, recipient, duration, and token type unlike unrestricte...

SDK

Web3 Infrastructure

An SDK (Software Development Kit) is a collection of tools, libraries, and documentation that simplifies development for a specific platform — providi...

Secret Scanning (Tool Output)

AI Agent Security

Scanning MCP tool responses for accidentally exposed secrets — API keys, passwords, tokens, private keys, and connection strings — before they enter t...

Security Audit

Security & Compliance

A security audit is a comprehensive review of a system's security posture — examining code, architecture, access controls, and operational practices t...

Security Boundary (Agent)

AI Agent Security

The logical perimeter around an AI agent's permitted operations, defined by which MCP servers it can connect to, which tools it can invoke, and what a...

Seed Phrase

Blockchain & Crypto Fundamentals

A seed phrase (recovery phrase) is a human-readable sequence of 12 or 24 words that encodes the master private key for a cryptocurrency wallet — servi...

Self-Custody

Blockchain & Crypto Fundamentals

Self-custody is the practice of holding and managing your own cryptocurrency private keys, maintaining direct, exclusive control over your digital ass...

Semantic Kernel

Agentic AI

Semantic Kernel is Microsoft's open-source SDK for integrating LLMs into applications — providing abstractions for AI plugins, memory, and planning th...

Semantic Routing

Agentic AI

Semantic routing is the technique of directing requests, queries, or tasks to the appropriate handler (agent, tool, or model) based on the semantic me...

Sequencer

Web3 Infrastructure

A sequencer is the component of a Layer 2 rollup that receives transactions, orders them, executes them, and produces the resulting state updates — th...

Server-Level Policy

Policy Enforcement

A server-level policy applies default rules to all tools on a given MCP server, establishing baseline permissions that can be overridden by more speci...

Session Key

Web3 Infrastructure

A temporary cryptographic key granting an AI agent limited, time-bound permission to sign transactions from a smart account. Session keys expire autom...

Settlement

Payments & Fintech

Settlement is the final, irrevocable transfer of asset ownership between parties — the point at which a transaction is fully completed and can no long...

Shadow AI Agent

AI Agent Security

An unauthorised AI agent operating within an organisation, connecting to MCP servers without IT or security team oversight. The agent equivalent of sh...

Sidechain

Web3 Infrastructure

A sidechain is an independent blockchain with its own consensus mechanism that runs parallel to a main chain and is connected via a two-way bridge — p...

SIEM Integration

Security & Compliance

SIEM integration is the process of connecting MCP proxy audit logs to a Security Information and Event Management system for real-time threat detectio...

Sliding Window Rate Limit

Policy Enforcement

A rate limiting approach that uses a rolling time window rather than fixed intervals. Instead of resetting a counter every minute on the minute, it co...

Slippage

DeFi

Slippage is the difference between the expected price of a trade and the actual execution price — caused by pool liquidity depth, trade size, and pric...

Smart Account

Blockchain & Crypto Fundamentals

A smart account is a blockchain account implemented as a smart contract rather than a simple key pair (EOA), enabling programmable transaction validat...

Smart Contract

Blockchain & Crypto Fundamentals

A smart contract is a self-executing program stored on a blockchain that automatically enforces agreement terms when predefined conditions are met — e...

Smart Contract Audit

Security & Compliance

A smart contract audit is a professional security review of smart contract code to identify vulnerabilities, logic errors, and potential exploits befo...

Smart Contract Exploit

Security & Compliance

A smart contract exploit is the use of a vulnerability in smart contract code to steal funds or manipulate protocol behavior — one of the primary secu...

Smart Contract Interaction

Blockchain & Crypto Fundamentals

A smart contract interaction is any transaction that calls a function on a deployed smart contract — encompassing all DeFi operations, token transfers...

Smart Contract Wallet

Blockchain & Crypto Fundamentals

A smart contract wallet is a cryptocurrency wallet implemented as a deployed smart contract rather than a simple externally owned account (EOA) — enab...

Smart Wallet

Web3 Infrastructure

A smart wallet is a user-facing cryptocurrency wallet built on smart contract technology (account abstraction) that provides enhanced features like so...

SOC 2 Compliance

Security & Compliance

SOC 2 is a compliance framework developed by the AICPA for service organisations, focused on five trust service criteria: security, availability, proc...

Social Engineering

Security & Compliance

Social engineering in crypto is the manipulation of people into performing actions or divulging confidential information — exploiting human psychology...

Solana

Blockchain & Crypto Fundamentals

Solana is a high-performance Layer 1 blockchain designed for speed and low cost, using a unique Proof of History consensus mechanism to achieve thousa...

Solidity

Blockchain & Crypto Fundamentals

Solidity is the dominant programming language for Ethereum smart contracts — a statically-typed, object-oriented language designed specifically for th...

Solver

DeFi

A solver is a specialized entity in intent-based DeFi systems that competes to fulfill user trading intents by finding optimal execution paths — sourc...

Soulbound Token (SBT)

Blockchain & Crypto Fundamentals

A soulbound token (SBT) is a non-transferable, non-tradable digital token permanently bound to a wallet address — used to represent verifiable credent...

Spend Card

Payments & Fintech

A spend card (or crypto debit card) enables users to spend cryptocurrency at traditional merchants by automatically converting crypto to fiat at the p...

Spend Management

Agentic Finance

Spend management tracks, controls, and optimizes AI agent crypto spending — budgeting, policy enforcement, real-time monitoring, analytics, and report...

Spending Analytics

Agentic Finance

Data-driven insights into agent financial activity — patterns, cost per task, budget utilization, violation trends, and ROI across an agent fleet....

Spending Anomaly

Agentic Finance

An agent spending pattern that deviates significantly from established baselines — unusual amounts, unexpected recipients, abnormal timing, or velocit...

Spending Cap

Agentic Finance

A hard upper limit on total agent spending within a scope — per transaction, hour, day, contract, or session. Once reached, all transactions blocked u...

Spending Controls

Agentic Finance

Spending controls are programmable rules limiting how, when, and where an AI agent can spend crypto — per-transaction limits, rolling budgets, recipie...

Spending Delegation Chain

Agentic Finance

Tracks how spending authority flows from operator through intermediate agents to the final spender, ensuring delegated authority never exceeds origina...

Spending Policy DSL

Agentic Finance

A specialized language for defining agent spending rules — readable, auditable, and composable without general-purpose code....

Spending Receipt

Agentic Finance

A verifiable record of an authorized agent transaction — policy evaluation result, parameters, approval status, blockchain confirmation. Proof of poli...

Spending Report

Agentic Finance

A structured summary of AI agent financial activity over a time period — total spend, transaction count, policy compliance rate, budget utilization, a...

Spending Velocity

Agentic Finance

The rate at which an agent spends — transactions per minute, dollars per hour. Monitoring velocity detects anomalies like runaway loops or compromised...

Stablecoin

Blockchain & Crypto Fundamentals

A stablecoin is a cryptocurrency designed to maintain a stable value relative to a reference asset — typically the US dollar — through various mechani...

Stablecoin Depeg

DeFi

A stablecoin depeg occurs when a stablecoin's market price deviates significantly from its target peg — caused by loss of confidence, reserve issues, ...

Stablecoin Micropayment Rails

x402

Stablecoin micropayment rails are the combination of dollar-pegged stablecoins (primarily USDC) and low-cost Layer 2 blockchain networks (primarily Ba...

Stablecoin Payments

Agentic Finance

Using price-stable cryptocurrencies (USDC, USDT) pegged to fiat for transactions. Preferred by agents for predictable value, instant settlement, and p...

Stablecoin Settlement

Payments & Fintech

Stablecoin settlement is the finalization of a payment using stablecoins on a blockchain — where the transaction is confirmed in a block and the recip...

Staking

DeFi

Staking is the process of locking cryptocurrency to support blockchain operations — either validating PoS consensus or participating in protocol mecha...

Staking Rewards

DeFi

Staking rewards are cryptocurrency earnings distributed to validators and delegators for participating in proof-of-stake consensus — compensating them...

State Channel

Payments & Fintech

A state channel is an off-chain protocol that enables multiple state transitions between parties with minimal on-chain interaction — generalizing paym...

String Length Constraint

Policy Enforcement

Restricting the length of a string argument in a tool call. String length constraints prevent excessively long inputs that could be used for prompt in...

Stripe Crypto

Payments & Fintech

Stripe Crypto is Stripe's suite of cryptocurrency-related products — including fiat-to-crypto on-ramps, USDC payouts, and crypto payment acceptance th...

Structured Output

Agentic AI

Structured output refers to LLM responses formatted in machine-readable schemas like JSON or typed objects, enabling reliable integration with downstr...

Sub-Cent Transaction

x402

A sub-cent transaction is a financial payment worth less than one US cent ($0.01), made economically viable by Layer 2 blockchain networks where trans...

Subgraph

Web3 Infrastructure

A subgraph is a data indexing definition for The Graph protocol that specifies what blockchain data to extract, how to transform it, and how to store ...

Subscription Payment

Payments & Fintech

A subscription payment is a recurring automated charge for ongoing access to a service — a payment model that requires specific smart contract pattern...

Sui

Blockchain & Crypto Fundamentals

Sui is a Layer 1 blockchain built by Mysten Labs using the Move programming language, featuring an object-centric data model and parallel transaction ...

Supply Chain Attack

Security & Compliance

A supply chain attack compromises software by targeting its dependencies, build tools, or distribution channels — injecting malicious code through tru...

Swap

DeFi

A swap is the exchange of one cryptocurrency token for another through a DEX or aggregator — the most fundamental DeFi operation, executed atomically ...

Swap Fee

DeFi

A token swap fee is the charge applied by a DEX for executing a trade — typically 0.01-1% of the trade value, distributed to liquidity providers and s...

Synthetic Asset

DeFi

A synthetic asset is a tokenized derivative that tracks the price of another asset — stocks, commodities, forex, or indices — without requiring owners...

System Prompt

Agentic AI

A system prompt is a privileged instruction set provided to an LLM that defines the model's role, behavior, constraints, and output format — serving a...

T

Task Decomposition

Agentic AI

Task decomposition is the process by which an AI agent breaks a complex goal into smaller, manageable sub-tasks that can be executed sequentially or i...

Tenderly

Web3 Infrastructure

Tenderly is a blockchain development platform offering transaction simulation, debugging, monitoring, and alerting — enabling developers to test smart...

Testnet

Blockchain & Crypto Fundamentals

A testnet is a blockchain network that mirrors mainnet functionality but uses valueless tokens — providing a safe, free environment for testing smart ...

The Graph

Web3 Infrastructure

The Graph is a decentralized protocol for indexing and querying blockchain data — enabling developers to build subgraphs that organize on-chain data i...

Threat Modeling

Security & Compliance

Threat modeling is a structured security analysis process that identifies potential threats to a system, evaluates their likelihood and impact, and de...

Threshold Signature Scheme (TSS)

Security & Compliance

A threshold signature scheme (TSS) is a cryptographic protocol where a signing key is split into n shares, and any t (threshold) of those shares can c...

Throttling

Policy Enforcement

Deliberately slowing down agent tool call throughput rather than hard-blocking. A softer alternative to outright denial that allows agents to continue...

Token

Blockchain & Crypto Fundamentals

A token is a digital asset created on an existing blockchain through a smart contract — distinct from native coins (ETH, BTC) which are integral to th...

Token Allowance

Blockchain & Crypto Fundamentals

A token allowance is the maximum amount of ERC-20 tokens that a specific spender address (typically a smart contract) is authorized to transfer from a...

Token Approval

Blockchain & Crypto Fundamentals

A token approval is an on-chain authorization that permits a smart contract (spender) to transfer a specified amount of ERC-20 tokens from your wallet...

Token Bucket (Rate Limiting)

Policy Enforcement

A rate limiting algorithm where tokens are added to a bucket at a fixed rate. Each tool call consumes a token; calls are denied when the bucket is emp...

Token Burn

Blockchain & Crypto Fundamentals

Token burning is the permanent removal of tokens from circulation by sending them to an unspendable address — reducing total supply and potentially in...

Token Exfiltration

AI Agent Security

Token exfiltration is extracting authentication tokens, session tokens, or API tokens from an AI agent's environment through malicious tool calls or p...

Token Gating

Blockchain & Crypto Fundamentals

Token gating is the practice of restricting access to content, communities, or services based on ownership of specific tokens or NFTs — creating exclu...

Token Launch

DeFi

A token launch is the process of creating and distributing a new cryptocurrency token — encompassing smart contract deployment, initial liquidity prov...

Token Mint

Blockchain & Crypto Fundamentals

Token minting is the creation of new tokens — either through protocol issuance (block rewards, staking emissions) or smart contract functions that inc...

Token Standard

Blockchain & Crypto Fundamentals

A token standard is a specification defining how tokens behave on a blockchain — including required functions, events, and interfaces that ensure inte...

Token Vesting

DeFi

Token vesting is a time-based release schedule that controls when allocated tokens become transferable — preventing insiders from selling immediately ...

Tokenization (AI)

Agentic AI

Tokenization in AI refers to breaking text into smaller units (tokens) that a language model can process — typically subword pieces that balance vocab...

Tokenized Deposit

Payments & Fintech

A tokenized deposit is a bank deposit represented as a digital token on a blockchain — maintaining the regulatory protections of traditional banking w...

Tokenomics

Blockchain & Crypto Fundamentals

Tokenomics is the economic design of a cryptocurrency token — encompassing supply mechanics, distribution, utility, incentive structures, and monetary...

Tool Calling

MCP & Tool Infrastructure

Tool calling is the mechanism by which a large language model generates structured requests to invoke external tools, APIs, or functions — enabling th...

Tool Name Collision

AI Agent Security

Tool name collision occurs when multiple MCP servers expose tools with the same name, creating ambiguity about which tool the AI agent actually invoke...

Tool Poisoning

AI Agent Security

Tool poisoning is an attack where a malicious actor manipulates an MCP tool's description, schema, or metadata to trick an AI agent into performing un...

Tool Shadowing

AI Agent Security

Tool shadowing is an attack where a malicious MCP server exposes a tool with the same name as a trusted server's tool, silently intercepting calls the...

Tool Squatting

AI Agent Security

Tool squatting is registering an MCP server with a name deliberately similar to a popular, trusted server to intercept agent tool calls. It is the MCP...

Tool Use

MCP & Tool Infrastructure

Tool use refers to an AI agent's ability to interact with external systems — calling APIs, executing code, querying databases, writing files, or perfo...

Tool-Level Policy

Policy Enforcement

A tool-level policy targets a specific MCP tool (e.g. create_payment_intent on the Stripe server) rather than an entire server, providing the most gra...

Transaction Approval Flow

Agentic Finance

A configurable workflow determining how agent transactions are authorized — auto-approval for low-risk, multi-step human review for high-value or unus...

Transaction Hash

Blockchain & Crypto Fundamentals

A transaction hash (txHash) is a unique identifier generated by hashing a transaction's contents — serving as the receipt and lookup key for any block...

Transaction Monitoring

Security & Compliance

Transaction monitoring is the ongoing surveillance of cryptocurrency transactions to detect suspicious patterns, policy violations, and anomalous beha...

Transaction Policy

Agentic Finance

A transaction policy is a declarative rule set defining valid agent transactions — specifying allowed amounts, recipients, tokens, contract interactio...

Transaction Receipt

Blockchain & Crypto Fundamentals

A transaction receipt is the blockchain record generated after a transaction is processed — containing execution status, gas used, event logs, and oth...

Transaction Signing

Blockchain & Crypto Fundamentals

Transaction signing is the process of using a private key to generate a cryptographic signature that authorizes a blockchain transaction, proving the ...

Transaction Simulation

Security & Compliance

Transaction simulation is the process of executing a blockchain transaction against the current state without actually committing it — previewing the ...

Transformer

Agentic AI

A Transformer is the neural network architecture underlying all modern large language models, using self-attention mechanisms to process sequential da...

Travel Rule

Security & Compliance

The Travel Rule is a regulatory requirement that financial institutions share sender and recipient information for transactions above certain threshol...

Treasury Management

Payments & Fintech

Treasury management is the strategic management of an organization's financial assets, liquidity, and risk — in crypto, this includes managing token h...

Trust Boundary

AI Agent Security

A boundary in a system where the level of trust changes. In MCP architectures, trust boundaries exist between the agent and each MCP server, between I...

Trustless

Blockchain & Crypto Fundamentals

Trustless describes a system where participants can transact and verify outcomes without trusting any counterparty — relying instead on cryptographic ...

Turnkey

Web3 Infrastructure

Turnkey is a non-custodial key management platform that provides secure, programmatic access to private keys through Trusted Execution Environments (T...

TVL (Total Value Locked)

DeFi

Total Value Locked (TVL) is the aggregate value of cryptocurrency assets deposited in a DeFi protocol's smart contracts — the primary metric for measu...

Two-Factor Authentication (2FA)

Security & Compliance

Two-factor authentication (2FA) is a security measure requiring two different verification methods to access an account — typically combining somethin...

W

Wallet

Blockchain & Crypto Fundamentals

A cryptocurrency wallet is software or hardware that manages private keys — enabling users to sign transactions, interact with blockchains, and contro...

Wallet Drainer

Security & Compliance

A wallet drainer is malicious software that exploits token approvals, signed messages, or compromised keys to transfer all assets from a victim's cryp...

WalletConnect

Web3 Infrastructure

WalletConnect is an open protocol for connecting cryptocurrency wallets to decentralized applications — enabling secure communication between mobile w...

Web3

Blockchain & Crypto Fundamentals

Web3 is the vision of a decentralized internet where users own their data, identity, and digital assets — built on blockchain technology, smart contra...

Webhook

Web3 Infrastructure

A webhook is an HTTP callback that pushes real-time notifications when blockchain events occur — enabling applications to react to on-chain activity w...

Wei

Blockchain & Crypto Fundamentals

Wei is the smallest denomination of Ether (ETH), where 1 ETH = 10^18 wei — used in smart contract programming and RPC calls where values must be expre...

WETH (Wrapped Ether)

Blockchain & Crypto Fundamentals

WETH (Wrapped ETH) is an ERC-20 token that represents Ether in a standardized token format — solving the incompatibility between native ETH and the ER...

Wire Transfer

Payments & Fintech

A wire transfer is a direct bank-to-bank electronic transfer of funds — the traditional method for large domestic and international payments, increasi...

Wormhole

Web3 Infrastructure

Wormhole is a cross-chain messaging protocol connecting 30+ blockchains — originally built for Solana-Ethereum bridging, now a general-purpose interop...

Wrapped Token

Blockchain & Crypto Fundamentals

A wrapped token is a cryptocurrency token pegged 1:1 to another asset, enabling that asset to be used on a different blockchain or protocol — such as ...

wstETH

DeFi

Wrapped Staked ETH (wstETH) is a non-rebasing wrapper around Lido's stETH — providing a token whose price increases over time (reflecting staking rewa...

X

x402 Auto-Policy

x402

x402 auto-policy is the automatic creation of spending policies when an agent encounters a new x402-enabled endpoint for the first time — applying con...

x402 Circuit Breaker

x402

An x402 circuit breaker is a safety mechanism that automatically halts all x402 payment activity for an agent or agent fleet after detecting repeated ...

x402 Domain Pinning

x402

x402 domain pinning (also called recipient pinning) is a security control that associates specific payment recipient addresses with specific domains —...

x402 Exact Payment Scheme

x402

The exact payment scheme is the first and primary payment scheme in the x402 protocol. It transfers a specific, predetermined amount of tokens from cl...

x402 Facilitator

x402

An x402 facilitator is a server in the x402 protocol that handles payment verification and on-chain settlement on behalf of resource servers. It expos...

x402 Foundation

x402

The x402 Foundation is the governance organisation co-founded by Coinbase and Cloudflare to steward the x402 open payment protocol — promoting adoptio...

x402 Payment Header

x402

x402 payment headers are the HTTP headers that carry payment negotiation data in the x402 protocol. The server sends payment requirements via the PAYM...

x402 Payment Streaming

x402

x402 payment streaming is the pattern of continuous or high-frequency resource consumption paired with periodic x402 settlement — using schemes like d...

x402 Payment Verification

x402

x402 payment verification is the process by which a resource server (or its facilitator) confirms that a client's signed payment payload is valid — ch...

x402 Pricing Negotiation

x402

x402 pricing negotiation is the process by which a resource server communicates its accepted payment terms — including amounts, tokens, networks, and ...

x402 Protocol

x402

x402 is an open protocol built by Coinbase that enables AI agents to make payments over HTTP using the 402 Payment Required status code. Agents autono...

x402 Resource Server

x402

An x402 resource server is any HTTP server that requires payment for access to its resources using the x402 protocol. It responds with HTTP 402 and pa...

x402 Settlement Flow

x402

The x402 settlement flow is the multi-step process by which a client's payment payload is verified, the requested resource is served, and the payment ...

// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.