Remlo runs an MCP (Model Context Protocol) server atDocumentation Index
Fetch the complete documentation index at: https://docs.remlo.xyz/llms.txt
Use this file to discover all available pages before exploring further.
https://www.remlo.xyz/api/mcp. It is a second front door to the same OpenAPI surface — anything an x402 / MPP client can do via REST, an MCP client can do via JSON-RPC. The server is stateless, transport-authenticated via OAuth 2.1 with PKCE, and per-tool-paid via x402 / MPP exactly as the REST endpoints are.
Quick install
https://www.remlo.xyz/api/mcp as a custom MCP HTTP connector. On first connect the client opens a browser tab to /oauth/consent for you to approve the connection with your Remlo (Privy) login.
Discovery
| Resource | URL |
|---|---|
| MCP endpoint | https://www.remlo.xyz/api/mcp |
| Protected resource metadata (RFC 9728) | https://www.remlo.xyz/.well-known/oauth-protected-resource |
| Authorization server metadata (RFC 8414) | https://www.remlo.xyz/.well-known/oauth-authorization-server |
OpenAPI (with x-mcp-server extension) | https://www.remlo.xyz/api/openapi.json |
x-mcp-server extension on the OpenAPI doc points discovery-aware tooling (AgentCash, Sponge gateway probes, etc.) at the MCP server without an extra round trip.
Tools
19 total: 4 free read-only + 15 paid. The full catalog and live prices are attools/list. Selected highlights:
| Tool | Backing endpoint | Price | Rails |
|---|---|---|---|
remlo_agents_directory | GET /api/agents/directory | free | n/a |
remlo_agents_profile | GET /api/agents/profile/{id} | free | n/a |
remlo_reputation_get | GET /api/reputation/{address} | free | n/a |
remlo_openapi_spec | GET /api/openapi.json | free | n/a |
remlo_treasury_yield_rates | GET /api/mpp/treasury/yield-rates | $0.01 | Tempo / Base / Solana |
remlo_compliance_check | POST /api/mpp/compliance/check | $0.05 | Tempo / Base / Solana |
remlo_memo_decode | POST /api/mpp/memo/decode | $0.01 | Tempo / Base / Solana |
remlo_agent_pay | POST /api/mpp/agent/pay | $0.05 | Tempo / Base / Solana |
remlo_agent_register | POST /api/mpp/agents/register | $0.10 | Tempo / Base / Solana |
remlo_payroll_execute | POST /api/mpp/payroll/execute | $1.00 | Tempo only |
remlo_employee_advance | POST /api/mpp/employee/advance | $0.50 | Tempo only |
remlo_bridge_offramp | POST /api/mpp/bridge/offramp | $0.25 | Tempo only |
remlo_treasury_optimize | POST /api/mpp/treasury/optimize | $0.10 | Tempo only |
_meta.remlo field carries the live price, accepted rails, and protocol so MCP clients with a payment surface (ATXP, Sponge MCP, AgentCash) render pricing pre-call.
Authentication: two layers
Tools that mutate employer state (remlo_agent_pay, remlo_payroll_execute, etc.) require two separate proofs:
- Transport-level OAuth bearer — proves which MCP client is calling. Issued by the OAuth flow described below; passed as
Authorization: Bearer <jwt>to/api/mcp. - Per-tool payment + identity — exactly as for the REST front door. The tool call envelope must carry
X-PAYMENT(Base/Solana x402) orAuthorization: mpp ...(Tempo MPP) for the payment, plus the Tier 1 / Tier 2 identity headers (X-Agent-Identifier,X-Agent-Timestamp,X-Agent-Signature) where the underlying handler requires them. See Authentication for header formats.
remlo_agents_directory, etc.) require only the transport bearer. Free.
OAuth 2.1 + PKCE flow (the long version)
If your MCP client’sclaude mcp add --transport http already drives the flow for you, you can skip this section. Otherwise:
1. Discover
authorization_endpoint, token_endpoint, registration_endpoint, supported PKCE methods (S256 only), and supported grant types.
2. Register the client (RFC 7591)
client_secret — Remlo MCP is a public client. PKCE is the binding security property.
3. Generate PKCE pair
4. Open the authorize URL in the user’s browser
/oauth/consent. They sign into Remlo (Privy) if needed and approve. The consent page redirects to your redirect_uri with ?code=...&state=....
5. Exchange the code for tokens
6. Use the access token
7. Refresh
Calling a paid tool
The MCP envelope is JSON-RPC; payment headers ride at the HTTP layer next to the bearer.X-PAYMENT header, the tool call returns isError: true with a structured 402 challenge in the content text. Read the wwwAuthenticate field, sign a payment, retry. AgentCash, Sponge Wallet, and ATXP-with-@atxp/x402 all do this transparently.
What the MCP server isn’t
- Not a payment processor. Per-tool payments still go through the same x402 / MPP wrappers as the REST endpoints; the MCP server forwards headers, doesn’t handle settlement itself.
- Not stateful. No session storage. Each request stands alone — easier to reason about and serverless-friendly.
- Not a replacement for the REST endpoints. Both front doors stay live. The MCP server is JSON-RPC ↔ HTTP shim, not a reimplementation.
- Not a gateway for arbitrary upstream APIs. Only Remlo endpoints are exposed.