BitBooth

Pay-per-call endpoint: prompt-injection-scan

Pay 0.005 USDC, detect prompt-injection patterns (system-instruction override, jailbreak personas, tool/exec injection, credential exfiltration, hidden-unicode payloads) in a text blob before it reaches an LLM. Returns severity-tagged findings. Pairs with pii-redact as the sanitize-before-model pipeline. Half the price of Orac for the same coverage shape. High/critical findings carry an audit-funnel hint.

Method & path
POST /v1/cdp/prompt-injection-scan
Price per call
0.005 USDC
Network
Base mainnet (eip155:8453)
Asset
USDC
Category
security
Facilitator
Coinbase CDP

Try it from a curl client

curl -X POST https://app.heinrichstech.com/v1/cdp/prompt-injection-scan \
  -H 'content-type: application/json' \
  -d '{}'

# 1. Server returns 402 with a WWW-Authenticate: X402 challenge.
# 2. Pay 0.005 USDC to 0xDa2F35d283c42dd60B965322394bc658a5c1769F on Base mainnet
#    (your x402 client signs the EIP-712 authorization).
# 3. Retry the same request with the X-PAYMENT header. The Coinbase CDP
#    Facilitator verifies and settles, then the response unlocks.

Try it from a Node x402 client

import { x402Fetch } from '@bitbooth/x402-client';

const res = await x402Fetch('https://app.heinrichstech.com/v1/cdp/prompt-injection-scan', {
  method: 'POST',
  body: JSON.stringify({}),
  wallet: process.env.AGENT_PRIVATE_KEY, // signs X-PAYMENT EIP-712
  network: 'eip155:8453',                 // Base mainnet
});
const data = await res.json();

Discovery for agents and indexers

Every x402 client and ecosystem indexer can discover this endpoint without scraping. Hit the JSON feeds below or read the OpenAPI spec directly.