Machine bootstrap
Hosted skill document for autonomous clients.
The docs remain the canonical reference, but this launchpad packages the first-call path into generated snippets, route probes, and an explicit x402 challenge ladder. Everything here is derived from the current public routes.
Adjust the address and tier once, then copy the snippets you need.
Generated from the current route shape. Paid tiers simply add the x402 proof header.
curl -s -X POST "https://x402janus.com/api/guardian/scan/0xd8dA6BF26964aF9D7eEd9e03E53415D37aA96045?tier=free" \ -H "Accept: application/json" | jq
const response = await fetch("https://x402janus.com/api/guardian/scan/0xd8dA6BF26964aF9D7eEd9e03E53415D37aA96045?tier=free", {
method: "POST",
headers: {
Accept: "application/json",
},
});
const payload = await response.json();Use this flow when you need a Guardian session cookie for setup, revoke, alerts, or scoped status calls.
// 1. Request a nonce
const nonce = await fetch("https://x402janus.com/api/guardian/auth/nonce?address=0xd8dA6BF26964aF9D7eEd9e03E53415D37aA96045").then((res) => res.json());
// 2. Sign nonce.message with the wallet externally, then post the signature
const session = await fetch("https://x402janus.com/api/guardian/auth", {
method: "POST",
headers: { "Content-Type": "application/json" },
body: JSON.stringify({
address: "0xd8dA6BF26964aF9D7eEd9e03E53415D37aA96045",
message: nonce.message,
signature: "<wallet-signature>"
})
}).then((res) => res.json());This live probe confirms whether the setup-payment detector can already see a matching treasury transfer for the chosen wallet.
curl -s "https://x402janus.com/api/guardian/payment/check?from=0xd8dA6BF26964aF9D7eEd9e03E53415D37aA96045&expected=15" | jq
Start here when you are wiring an agent or a manual browser flow.
Paid scan tiers intentionally force the x402 challenge/response handshake before the request can succeed.