Wallets & Tooling for Agentic Commerce: Why Agent Wallets Are Nothing Like Human Wallets

Why Agent Wallets Are Fundamentally Different from Human Wallets

When you open a wallet app on your phone, you see balances, tap buttons, confirm transactions with your face or fingerprint, and move on with your day. The entire experience is designed around a human being: someone who can read a screen, evaluate a transaction, and make a judgment call about whether to approve it.

AI agents cannot do any of that. An autonomous agent operating at machine speed needs to sign transactions programmatically, manage keys without a human in the loop, enforce spending limits through code rather than willpower, and do all of this without ever exposing private keys to the broader internet. The wallet problem for agents is not a UX problem; it is a fundamental infrastructure challenge.

Human wallets are solved technology. MetaMask has millions of users. Coinbase Wallet handles billions in volume. Phantom dominates Solana. But giving an AI agent a MetaMask extension and saying 'go buy things' is like giving a self-driving car a paper map. The interface assumptions are entirely wrong.

Agent wallets must be server-side, API-driven, policy-enforced, and auditable. They must support:

  • Delegation: the agent acts on behalf of a human
  • Scoping: the agent can only spend within predefined limits
  • Revocation: the human can shut down access instantly

These requirements create a fundamentally different product category, one that 13 companies are now racing to define.

Human Wallet vs Agent Wallet

Human Wallet
Agent Wallet
InterfaceVisual UI, touch/face ID
InterfaceAPI-driven, headless
SigningManual confirmation per tx
SigningProgrammatic, policy-gated
Key StorageDevice / browser extension
Key StorageHSM / secure enclave / MPC
Spending LimitsSelf-discipline / bank limits
Spending LimitsSmart contract policies (ERC-7579)
Access ControlPassword / biometrics
Access ControlSession keys / delegation
RevocationFreeze card, call support
RevocationInstant on-chain policy update

Agent Wallet Infrastructure Landscape (13 Companies)

Key Management & Custody
TurnkeyFireblocksCoinbasePrivy
Smart Accounts & Policies
RhinestoneOpenfortthirdweb
Consumer Wallets (Agent-Ready)
MetaMaskPhantom
Security & Monitoring
VarlockmlldAgentCard
Fiat Bridge
Crossmint
Agent wallets are API-driven, policy-enforced, and auditable. No single company covers the full stack; composability across layers is the norm.

Programmable Spending Policies: The Core Innovation

The single most important concept in agent wallets is programmable spending policies. Instead of a human reviewing each transaction, the wallet itself enforces rules: maximum transaction size, daily spending caps, approved merchant lists, allowed token types, permitted chains, and time-based restrictions.

Think of it as a corporate expense policy encoded in smart contract logic. A company might configure an agent wallet that can spend up to $50 per transaction, up to $500 per day, only on approved API services, only in USDC, and only on Base and Solana. Any transaction that violates these constraints is automatically rejected. No human review needed, no override possible.

This is what makes autonomous commerce viable. Without programmable policies, every agent transaction would require human approval, which defeats the purpose of autonomy. With policies, the human sets the boundaries once, and the agent operates freely within them.

Rhinestone has pioneered this approach with modular smart accounts built on ERC-7579. Their architecture treats wallet capabilities as interchangeable modules: you can plug in a spending policy module, an allowlist module, a time-lock module, or a multi-signature module, composing exactly the security profile your agent needs. This modularity means that as new security requirements emerge, you can add new modules without replacing the entire wallet.

Openfort takes a similar approach, offering embedded smart wallets that developers can integrate directly into their agent applications. Their SDK handles the complexity of key management, transaction signing, and policy enforcement behind a simple API, letting developers focus on what their agent does rather than how it pays.

Delegated Access and Autonomous Signing

Delegation is the mechanism by which a human grants an AI agent the authority to transact on their behalf. This is conceptually similar to giving your assistant a corporate credit card, but with much finer-grained control and cryptographic guarantees.

In the simplest model, the agent holds its own private key and the human funds the agent's wallet. The agent can sign transactions independently, but only from its own wallet with whatever funds the human has deposited. This is the approach many early agent implementations use, and it works, but it has limitations. The human must pre-fund the wallet, manage gas tokens, and trust that the agent will not drain the balance on unauthorized transactions.

More sophisticated delegation models use session keys: temporary, scoped credentials that grant an agent permission to sign specific types of transactions for a limited time. When the session expires, the keys become useless. Polygon's Agent CLI toolkit implements this pattern: agents get session-scoped wallets that can only spend USDC, only for pre-approved purposes, and only during the active session.

Turnkey provides the key management infrastructure that makes delegation secure at scale. Their platform generates, stores, and manages cryptographic keys in secure enclaves (hardware-isolated environments where private keys are never exposed to software). When an agent needs to sign a transaction, Turnkey's infrastructure handles the signing without the key ever leaving the secure enclave. This means that even if the agent's runtime environment is compromised, the private keys remain safe.

Coinbase has built similar infrastructure through its wallet-as-a-service platform, enabling developers to provision wallets for their agents programmatically. Agents get API access to sign transactions, but the actual key material is managed by Coinbase's institutional-grade custody infrastructure.

Key Management Infrastructure

Key management is the hardest unsolved problem in agent wallets. A human can write down a seed phrase and store it in a safe. An AI agent running on a cloud server has no safe. The private key must exist somewhere in the digital realm, which means it can be stolen, leaked, or misused.

The industry has converged on three approaches to this problem:

1. Institutional custody: companies like Fireblocks and Coinbase hold keys in hardened infrastructure (HSMs, secure enclaves, multi-party computation) and provide API access for agents to request signatures. The agent never touches the raw key. This is the most secure approach but introduces a dependency on the custody provider and adds latency to every transaction.

2. Embedded key management: Privy specializes in server-side wallet provisioning, creating wallets programmatically when agents are deployed, managing the key lifecycle, and handling authentication. Their infrastructure is designed for the serverless, API-driven world that agents live in, rather than the browser-based world that human wallets were built for.

3. Decentralized key management using threshold cryptography: instead of storing a complete private key in one place, the key is split into shares distributed across multiple nodes. Signing a transaction requires a threshold of shares to cooperate, so no single node ever has the complete key. This eliminates single points of failure but adds complexity and coordination overhead.

Fireblocks has become the institutional standard for this infrastructure, serving enterprises that need bank-grade security for their agent operations. Their MPC (Multi-Party Computation) architecture splits keys across multiple parties, ensuring that no single breach can compromise funds. For enterprises deploying hundreds or thousands of agents, this level of security is not optional; it is a regulatory requirement.

MetaMask and Phantom: Consumer Wallets Evolving for Agents

The two dominant consumer wallet brands (MetaMask on Ethereum and Phantom on Solana) are both adapting their platforms for agent use cases, approaching the problem from different angles.

MetaMask, with its massive installed base and deep Ethereum ecosystem integration, is building toward a model where agents can interact with MetaMask's signing infrastructure through APIs rather than browser extensions. The shift from browser-based to API-based wallet interaction is fundamental: it is what allows headless, server-side agents to use the same security infrastructure that millions of humans already trust.

Phantom has taken a more aggressive approach to the agent economy. Beyond wallet infrastructure, Phantom has built an MCP server that exposes Solana wallet operations as tools that any MCP-compatible AI agent can discover and use. This means an agent running on Claude, GPT, or any other MCP-enabled model can programmatically interact with Solana (check balances, send tokens, swap assets) through Phantom's infrastructure.

Phantom's position is unique because it bridges the consumer and agent worlds. A user who already trusts Phantom for their personal Solana wallet can extend that trust to their AI agents, using the same infrastructure, the same security model, and the same familiar brand. This continuity of trust may prove to be a significant competitive advantage as agentic commerce goes mainstream.

Modular Smart Accounts: ERC-7579 and the Rhinestone Approach

ERC-7579 defines a standard for modular smart contract accounts, wallets whose capabilities can be extended through pluggable modules rather than monolithic code upgrades. This standard is particularly powerful for agent wallets because different agents need different security profiles, and those profiles change over time.

Rhinestone has built the leading implementation of ERC-7579 modular accounts. Their architecture separates the wallet's core functionality (holding funds, executing transactions) from its policy logic (spending limits, allowlists, time-locks). Each policy is implemented as a module that can be independently installed, configured, updated, or removed.

For agent operators, this means you can start with a conservative security profile (low spending limits, narrow allowlists, mandatory multi-signature approval) and gradually expand permissions as you gain confidence in the agent's behavior. You can add a new module for a specific use case (say, an allowlist for a new set of merchants) without touching the rest of the security stack.

The modular approach also enables composability across the ecosystem. A spending policy module built by one team can be combined with a time-lock module from another team and an allowlist module from a third. This open marketplace of security modules means that best-of-breed security practices can be shared and reused across the entire agent economy.

thirdweb provides the developer tooling that makes deploying and managing these smart accounts practical. Their SDK abstracts the complexity of smart contract interaction, letting developers provision modular wallets, configure policies, and manage agent permissions through familiar API patterns.

Security Tooling: Protecting Agents from Themselves and Others

Giving an AI agent access to a wallet is inherently risky. The agent might be manipulated through prompt injection, a malicious input that tricks the agent into sending funds to an attacker. The agent might encounter a deceptive smart contract that drains its wallet. Or the agent might simply make a mistake, approving a transaction that costs far more than intended.

Varlock has built security tooling specifically for this threat landscape. Their platform monitors agent transactions in real-time, flagging suspicious patterns: unusual transaction sizes, interactions with known-malicious contracts, rapid sequences of transfers that might indicate a compromised agent, or transactions that deviate from the agent's expected behavior profile. Think of Varlock as a security operations center for agent wallets.

mlld takes a complementary approach, focusing on the pre-transaction layer, analyzing the context and intent of a transaction before it is signed. If an agent is about to interact with a smart contract, mlld can analyze the contract's behavior, check it against known vulnerability patterns, and warn the agent (or block the transaction) if something looks wrong.

AgentCard provides another layer of the security stack: identity and credential management for agents. By giving each agent a verifiable identity card that includes its operator, capabilities, and trust level, AgentCard makes it possible for wallets and merchants to make informed decisions about whether to approve a transaction. A wallet policy might stipulate that the agent can only transact with merchants that accept AgentCard verification, adding a trust layer on top of the spending policy layer.

These security tools are not optional extras. As agents handle larger sums and more complex transactions, the attack surface expands. Every agent wallet needs monitoring, every transaction needs validation, and every smart contract interaction needs analysis. The security tooling category will grow in lockstep with the wallet category.

Crossmint: Bridging Wallets and Virtual Cards

Crossmint occupies a unique position in the wallets and tooling landscape by bridging on-chain wallets with traditional payment infrastructure. Their platform provisions wallets for agents and, critically, can issue virtual Visa debit cards linked to those wallets.

This virtual card capability is transformative. Most of the internet's commerce infrastructure does not accept crypto. It accepts credit and debit cards. By issuing a virtual Visa card funded from an agent's crypto wallet, Crossmint lets agents shop at any merchant that accepts Visa, which is essentially every merchant on the internet. The agent pays in USDC, Crossmint converts it to fiat, and the merchant receives a normal card payment.

The virtual card also serves as a powerful security boundary. The card can be scoped to a single transaction, a single merchant, or a specific spending limit. If the card details are compromised, the damage is limited to whatever scope was set. This is far safer than giving an agent access to a real credit card with a high limit.

Crossmint's approach represents the pragmatic middle ground in agentic commerce. Pure crypto payments (x402, on-chain transfers) work for the crypto-native ecosystem but cannot reach traditional merchants. Pure fiat payments require banking relationships that agents cannot have. Virtual cards bridge the gap, letting agents pay anyone while maintaining the programmability and security that agent wallets require.

The Balance Between Autonomy and Security

Every decision in agent wallet design involves a tradeoff between autonomy and security. More autonomy means the agent can operate faster, handle more complex workflows, and require less human oversight. More security means tighter constraints, slower execution, and more human intervention.

The right balance depends on the use case. An agent making $0.001 micropayments for API calls needs maximum autonomy and minimal friction. The security overhead of multi-signature approval would cost more than the transactions themselves. An agent making $10,000 purchases needs multi-layered security: spending policies, human approval for large transactions, real-time monitoring, and post-transaction audit trails.

The industry is converging on a tiered model:

  • Low-value, high-frequency transactions (API calls, data purchases, compute): fully autonomous with policy-based guardrails
  • Medium-value transactions (product purchases, service subscriptions): policy compliance plus real-time monitoring
  • High-value transactions (investment trades, large purchases, contract signings): human approval required, regardless of policy compliance

This tiered approach mirrors how enterprises handle human spending authority. A junior employee can expense lunch without approval. A mid-level manager needs their VP to sign off on a software purchase. The CEO needs board approval for an acquisition. Agent wallets are simply encoding this same organizational logic into cryptographic policy.

The Key Players in Agent Wallet Infrastructure

The wallets and tooling landscape includes 13 companies, each addressing a different piece of the puzzle.

  • Turnkey and Fireblocks: institutional-grade key management and custody infrastructure
  • Coinbase: wallet-as-a-service for programmatic wallet provisioning
  • MetaMask and Phantom: consumer wallet platforms evolving for agent use cases
  • Privy: server-side wallet provisioning for API-driven, serverless environments
  • Openfort: embedded smart wallets with developer-friendly SDKs
  • Rhinestone: modular smart accounts on ERC-7579 with composable security policies
  • thirdweb: developer tooling layer for deploying and managing wallets
  • Varlock: real-time agent transaction monitoring
  • mlld: transaction context analysis and smart contract safety
  • AgentCard: verifiable identity credentials for agents
  • Crossmint: bridge between on-chain wallets and traditional payment infrastructure via virtual Visa cards

No single company covers the full stack. An enterprise deploying agents at scale might use Turnkey for key management, Rhinestone for modular smart accounts, Varlock for transaction monitoring, and Crossmint for virtual cards, all integrated through thirdweb's developer tooling. This composability is a feature, not a bug. It means that each layer can be best-in-class and that operators can swap components as the technology evolves.

The Future of Agent Wallets

Agent wallets are evolving rapidly along several axes. First, policy expressiveness is expanding. Today's spending policies handle amount limits and allowlists. Tomorrow's policies will incorporate reputation signals (only transact with agents that have a trust score above X), market conditions (pause trading if volatility exceeds Y), and behavioral analysis (flag transactions that deviate from the agent's historical patterns).

Second, cross-chain operation is becoming seamless. Early agent wallets required manual bridging between chains. The next generation, built on account abstraction (ERC-4337) and universal balance protocols, will let agents hold a single balance that can be spent on any chain. The agent will not need to know which chain a merchant operates on, just as you do not need to know which bank your credit card routes through.

Third, wallet-to-wallet communication is emerging as a protocol layer. Instead of agents discovering services through marketplaces and directories, wallets will negotiate directly, exchanging capabilities, terms, and payment parameters in real-time. Your agent's wallet will talk to a merchant's wallet, agree on terms, and settle the transaction without any intermediate layer.

The ultimate vision is an agent wallet that is as invisible and reliable as the internet itself. You set a policy, fund a balance, and your agent operates in the economy, paying for what it needs, earning for what it provides, and managing its finances autonomously within the boundaries you have defined. We are not there yet, but the 13 companies in this category are building the infrastructure that will get us there.

Frequently Asked Questions

Can AI agents have their own wallets?

Yes. AI agents can have their own blockchain wallets provisioned through services like Coinbase, Privy, Turnkey, and Openfort. These are server-side, API-driven wallets, not the browser extensions humans use. The agent holds (or has delegated access to) a private key and can sign transactions programmatically. The wallet is typically funded by a human operator and governed by spending policies that limit what the agent can do.

How do you prevent an agent from draining a wallet?

Through programmable spending policies enforced at the smart contract level. Using modular smart accounts (ERC-7579) or custody platforms, operators set hard limits: maximum per-transaction amount, daily spending caps, approved merchant lists, allowed tokens, and time restrictions. These constraints are enforced cryptographically, and the agent literally cannot exceed them, even if its runtime is compromised. Security tools like Varlock also monitor transactions in real-time to catch anomalies.

What is the difference between an agent wallet and a regular crypto wallet?

A regular crypto wallet is designed for humans: it has a visual interface, requires manual confirmation for each transaction, and relies on the user's judgment for security. An agent wallet is designed for machines: it is API-driven, signs transactions programmatically, enforces spending policies through code, and operates without a visual interface. Agent wallets also support delegation (acting on behalf of a human) and session keys (temporary, scoped permissions).

What is ERC-7579 and why does it matter for agents?

ERC-7579 is a standard for modular smart contract accounts. Instead of a monolithic wallet with fixed capabilities, ERC-7579 wallets support pluggable modules: spending policies, allowlists, time-locks, and multi-signature requirements can be added, removed, or updated independently. This matters for agents because different use cases need different security profiles, and those profiles evolve over time. Rhinestone is the leading implementation.

Can an AI agent use a regular credit card to buy things?

Not directly. Credit cards require human identity verification and manual authorization. However, services like Crossmint can issue virtual Visa debit cards linked to an agent's crypto wallet. The agent pays in USDC, the card provider converts to fiat, and the merchant receives a normal card payment. These virtual cards can be scoped to specific merchants, amounts, and time windows, providing security guardrails that a real credit card cannot.

Explore all Wallets & Tooling companies on the market map

Related Articles