Visa, Cloudflare, and the Trusted Agent Protocol
Visa, Cloudflare, Mastercard, and Amex are piloting the Trusted Agent Protocol so verified AI shopping agents can transact without getting blocked.
By Rev.AISomething Team

AI-powered shopping agents are no longer science fictionâthey are being given first-class credentials on the payments rails. In mid-October 2025, Visa, Cloudflare, Mastercard, and American Express collectively sketched the blueprint for how autonomous buyers will browse, negotiate, and pay without setting off bot alarms. The Trusted Agent Protocol (TAP) is the scaffolding.
Whatâs happening
- October 14, 2025: Visa and Cloudflare announced TAP, a framework that lets AI agents search catalogs, compare offers, and execute purchases while staying inside the card networksâ risk posture (Visa).
- Cloudflareâs role: The company confirmed it is working with Visa, Mastercard, and American Express to operate an authentication layerâanchored by Web Bot Authâthat vouches for verified agents before they ever hit a merchantâs checkout stack (Cloudflare).
- October 24, 2025: Cloudflareâs engineering team published how HTTP Message Signatures plus intent tags (âbrowsingâ vs. âpayingâ) are verified at the edge so merchants can treat agent traffic as trusted instead of hostile (Cloudflare Noise).
In practice, TAP turns the payments network into a directory of known agents. Each request carries a cryptographic signature and a declared intent, and merchants fetch the corresponding public key before deciding how to respond.

Why this matters
- Agent traffic is exploding. Visa reported a 4,700% year-over-year increase in AI-driven sessions on U.S. retail properties. That wave will only intensify as agent storefronts and shopping copilots become standard browser extensions (Help Net Security).
- âGood botsâ get blocked today. Merchants have tuned WAF and bot-management tools to swat unknown automation. TAP provides a machine-readable way to distinguish good automation from credential-stuffing scripts (Visa).
- Minimal UX shifts, major backend change. Checkout flows stay familiar, but merchants now need to validate signatures, rotate keys, and log intent tags as part of their fraud posture (Visa Developer).
What to watch next
- Signal granularity. The intent tags shipped with TAP determine how merchants branch logic. Expect progressive rolloutsâfrom simple browse/pay to richer taxonomies covering returns, subscriptions, and loyalty actions (Cloudflare Noise).
- Standards convergence. TAP is being aligned with IETF, OpenID Foundation, EMVCo, the Agentic Commerce Protocol, and x402 so AI agents can operate globally without bespoke integrations (TSG Payments).
- Operational readiness. âNo-codeâ marketing claims aside, teams need playbooks for key distribution, signature failure retries, observability tied to agent IDs, and bot rule tuning that no longer assumes automation equals fraud.
- Fraud arms race. Verified agent credentials become high-value targets. Merchants will need revocation mechanics, anomaly detection on intent shifts, and layered telemetry to tell compromised agents from malicious clones.
How merchants can prepare
- Inventory your bot defenses. Catalog WAF rules, rate limits, and bot-score thresholds to understand what will break when trusted TAP traffic arrives. Test against sandboxed signed requests rather than production shoppers.
- Wire in signature verification. Stand up verification within your edge tier or API gateway so downstream services can rely on a single enrichment point. Log agent IDs alongside orders for traceability.
- Factor agent intent into risk engines. Treat TAP tags as another signal inside fraud modelsâtighten controls on high-risk stages (payments, returns) while loosening friction for vetted browsing.
- Plan for failure modes. Build fallbacks for directory outages, key rotation delays, or mismatched tags. The worst-case scenario is silently downgrading trusted agents back to anonymous bots.
If youâre starting to scope TAP and want a pragmatic walkthrough of what it means for your checkout flow and risk controls, letâs talk.