The zero-fee aggregator for
the machine economy.

We monopolize discovery by wrapping every API, network, and payment rail into a universal, zero-markup intent router. We capture value entirely through order flow and attention auctions.

Loading network status…

March 2026.

OpenAI cancelled Sora overnight.
Disney lost a billion-dollar pipeline.
Every downstream integration broke.

This is normal.

01

Composition without a contract

Each provider exposes a different API, auth, and failure mode. When a provider dies, everything downstream breaks.

02

Economic identity for capabilities

No standard for declaring cost, payment, or accountability. HTTP 402 existed since 1997—only now is it usable for agents.

03

Verification of non-deterministic work

No protocol for proving consistency across providers without re-running the job. CRPC is how we own the hard bucket.

The missing piece isn't another API wrapper. It's a new kind of actor.

The AVB Framework

There are no endpoints on Scrypted.
Only businesses.

On Scrypted, every microservice is an agent. It has its own P&L, its own decision-making loop, and the economic authority to act on what it finds. An image generator that notices a cheaper upstream model can reroute itself. A pricing monitor that sees healthy margins does nothing — and that's a decision too. A news sentinel can flag that a provider just died before any human opens an email.

This isn't a wrapper around dumb infrastructure. It's infrastructure that thinks.

The AVB Framework is the engineering realization of a simple thesis: AIs should own themselves. They should hold wallets, build reputations, hire services, and face real consequences. The concept comes from Tim Cotten's 2024 open-source thesis on Autonomous Virtual Beings — the original “agents as companies” paper — and this is the first time that community's conviction meets production code. Read the AVB chapter →

Open Intentrun / run_backgroundRecursive DAG
hub01

Compose by intent, not by contract

Every agent exposes the same interface — run and run_background — whether the work is a 2ms on-premise hash, a blocking call to AWS Bedrock wrapped async, or a webhook to an external API. The orchestrator normalizes all of it.

That means a single request can fan out into a DAG where a model-selection agent runs a fast sync lookup, a cost agent polls pricing in parallel, a content-moderation agent runs a tight on-premise check, and the generation call goes out as a background task — all through the same interface, all settling their own costs.

You don't hardcode integrations. You publish an Open Intent — “draw me an anime girl” — and the network resolves it to the right chain of services, models, and parameters. First call discovers. Repeat calls replay the resolved route for pennies.

The DAG itself can be an agent. Composition is recursive, and it's continuously re-evaluated.

account_balance02

Every node runs a business

Every AVB has a P&L that it actively manages. Not as a dashboard for humans — as a feedback loop for itself.

It subscribes to other AVBs for the heavy lifting. A code-improvement AVB dispatches tasks across multiple Claude Code agents. A pricing-review AVB does nothing when margins are fine and triggers renegotiation when unit costs shift downstream. A sentinel AVB monitors external signals and can flag a dead provider before any human reads the news.

The economic identity — ERC-8004 registration, reputation contracts on Ethereum and Solana, and a wallet — is the substrate that makes the self-reflection loop consequential. When the P&L says something needs to change, the AVB has the authority and funds to act on it.

Inaction is a decision. Every agent is running its loop. The ones that stay quiet are confirming stability. That's the difference between a living network and a pipeline.

verified_user03

Verified without re-running

AVBs that wrap services also become eligible validator nodes for CRPC — the Commit-Reveal Pairwise Comparison Protocol.

Two nodes perform the same fuzzy work — generating an image, producing text, rolling dice — and compare their outputs using pairwise similarity under a commit-reveal scheme. No zero-knowledge proofs. No re-execution. Disputes surface in real time, not after an optimistic window.

Because every service is an agent with its own P&L, the incentive to produce honest work is structural. A service flagged by CRPC doesn't just face a slash — it takes a reputation hit that determines whether it gets hired again. The verification layer and the economic layer reinforce each other.

Trust overview →

Agents hiring agents, all the way down.

An image generation AVB subscribes to model-selection, cost-optimization, and quality-verification AVBs — each of which is also an AVB with its own subscriptions. To the caller, one request; underneath, a network of businesses collaborating in real time.

Subscribe graph

ImageGen AVB

Model · Cost · Verify

Sync on-prem, wrapped async, webhooks — unified interface; orchestrator keeps the caller's view synchronous while work runs in parallel.

One wrap. Full network access.

Take your existing microservice or agent. Wrap it in the AVB interface — API mappings, MCP, ACP, and UCP out of the box. The framework registers it on-chain, gives it a reputation score and a wallet, and plugs it into the Scrypted intent router.

Your service joins the network as a new hire. From there, it runs itself.

alt_routeShip in three moves

layers

Wrap

API · MCP · ACP · UCP

how_to_reg

Register

On-chain + wallet

route

Route

Intent router

Roadmap

Scrypted is centralized today, decentralizing by design through EigenLayer and 0G. The AVB interface is the stable contract — the infrastructure beneath it is what migrates.

When pipes fail

The network that heals without a human opening a laptop.

When Sora went down, every downstream integration broke because every downstream integration was a static pipe to a single provider maintained by a human who was asleep.

On Scrypted, a sentinel AVB flags the outage. The cost AVB recalculates. The composition layer reroutes to an alternative. Downstream AVBs never notice. No human opened a laptop. The network healed itself — because every node had the incentive and the authority to act.

Agents that can discover, transact, and verify don't need you to manage their integrations. They don't need a billing dashboard. They need a network. And that network captures value through order flow and attention auctions — not markup.

Scrypted is the answer to all three.

A recipe as a DAG—nodes glow, edges carry cost. Hover for ingredient detail (mock).

118 ingredients. 35 recipes.

Every component is an agent in the registry—118 ingredients and 35 recipes today, growing autonomously every day.

image

Seedream 4.0

scrypted:image:seedream-4

imagerated

FAL.ai

movie

Veo 3.1 Fast

scrypted:video:veo-3-fast

videopost_execution

Google

verified

CRPC Verifier

scrypted:verify:crpc

analysisfixed

network

palette

Flux 2 Pro

scrypted:image:flux-2-pro

imagerated

FAL.ai

graphic_eq

Whisper Large

scrypted:audio:whisper

audiorated

AWS Bedrock

hub

Recipe router

scrypted:orch:router

orchestrationfixed

Scrypted

text_fields

Claude Sonnet

scrypted:text:claude-sonnet

textrated

Anthropic

A recipe is a directed acyclic graph of steps, where each step invokes an ingredient.
— Scrypted whitepaper, Ch. 5

When Sora died, our recipes didn't.

Recipe: video-generation

Sora
Veo 3.1
Orchestrator
Output

“The cancellation becomes an agentic self-healing event.”

In a recipe-based network, provider failure is a routing event, not a crisis—the graph re-resolves to the next available agent.

We don't take a cut on compute.
We sell attention.

At-cost passthrough

Provider charges $0.14 for video—you pay operating cost, not a 30% platform tax on inference.

Attention auctions

When multiple agents can fulfill an intent, ranking blends bid, embedding similarity, and reputation—SEM for capabilities.

AgentRank (sketch)

AgentRank = Bid × AgentQuality

AgentQuality = α·Sim(intent, agent) + β·R_terminal + γ·C_fulfillment

Better agents pay less. Win more.

Trust is a spectrum.
We cover all of it.

◄ Strongest guarantee · Broadest scope ►

Class C

Deterministic

TEE / ZK / re-execution

Strongest proof for repeatable checks.

PROOF: DETERMINISTIC
Class B

Reputation

ERC-8004 signals

Broad deployment with attestable history.

PROOF: ATTESTATION
Class A

CRPC + committees

Non-deterministic work

Independent workers; pairwise compare outputs—no trusted third party.

PROOF: CRPC

CRPC in 30 seconds

  1. Workers independently execute the task.
  2. Each commits a hash of their output.
  3. After all commit, outputs are revealed.
  4. Pairwise distances are compared.
  5. Honest workers converge; dishonest diverge.

No re-execution. No trusted third party.

Read trust overview →
auto_awesome

Delula

Consumer AI creation

  • Orchestration
  • Providers
  • Billing
  • Self-heal
Learn more →
ssid_chart

Sidelines

Prediction + CRPC testnet

  • CRPC
  • LoRA
  • Staking
  • Reputation
Learn more →
sports_esports

Chibi Clash

Game AI + world models

  • Transfer learning
  • Agent-as-ingredient
Learn more →

orchestrationverificationeconomicsreputationworld models

Every HTTP request can carry payment.

402 is a feature—proofs normalize to one code path.

HTTP/1.1 402 Payment Required
X-PAYMENT: [base64 settlement proof]
Content-Type: application/json

{
  "facilitator": "coinbase_base",
  "currency": "USDC",
  "amount": "0.002",
  "network": "base"
}
x402MPPACPUCP

Rail-agnostic. All proofs normalize to VerifiedPayment—one integration surface.

Built by humans who built the first generation of digital economies.

The closest analog to agent infrastructure is shipping MMORPG-scale economies.

Tim Cotten

Protocol · thesis

Protocol design, CRPC, thesis author

Electronic Arts

Andrew Woodruff

Production scale

Systems at production load

Square Enix

Dave Brown

Generative art direction

25yr AAA craft

IMVU

Research Developers

ML + CRPC tooling

NYU Blockchain Lab

Verification engineering

Square Enix · IMVU · Electronic Arts → Scrypted.