Senior-level security code review for $0.05. No API keys. No accounts. No subscriptions. Just send code and pay with USDC.
Powered by gstack's production review checklist · AI by Claude
No signup. No API key. No billing setup. Just install, send, and pay.
curl -fsSL https://tempo.xyz/install | bash tempo add wallet && tempo wallet login
One-line install. Add the wallet extension, log in with your email, and fund with USDC.
tempo request -X POST \
--json '{"code":"..."}' \
https://mpp-review-api.vercel.app/api/reviewThe server returns HTTP 402. tempo request auto-pays $0.05 USDC from your wallet.
{ "review": "Pre-Landing Review: 2 issues (1 critical, 1 informational)..." }Claude analyzes your code against gstack's security checklist. Results in seconds.
Copy any example below and run it in your terminal. Each costs $0.05 USDC.
String interpolation in a database query — the #1 most exploited vulnerability in web applications.
tempo request -X POST \
--json '{"code": "function getUser(id) { return db.query(\x60SELECT * FROM users WHERE id = \x24{id}\x60); }"}' \
https://mpp-review-api.vercel.app/api/reviewRead-then-write without atomicity. Two concurrent requests could both pass the check and double-claim a reward.
tempo request -X POST \
--json '{"code": "async function claimReward(userId) {\n const user = await db.findOne({ id: userId });\n if (!user.claimed) {\n await db.update({ id: userId }, { claimed: true, balance: user.balance + 100 });\n }\n}"}' \
https://mpp-review-api.vercel.app/api/reviewMath.random() is predictable and should never be used for tokens, passwords, or session IDs.
tempo request -X POST \
--json '{"code": "function generateToken() { return Math.random().toString(36).slice(2); }"}' \
https://mpp-review-api.vercel.app/api/reviewRendering user-controlled HTML without sanitization allows cross-site scripting attacks.
tempo request -X POST \
--json '{"code": "function Comment({ text }) { return <div dangerouslySetInnerHTML={{ __html: text }} />; }"}' \
https://mpp-review-api.vercel.app/api/reviewWell-typed, pure function with no side effects. The reviewer confirms it's clean.
tempo request -X POST \
--json '{"code": "function add(a: number, b: number): number { return a + b; }"}' \
https://mpp-review-api.vercel.app/api/reviewThe Machine Payments Protocol turns HTTP 402 into a universal payment layer for the internet. Here's why that matters.
The "Payment Required" status code has existed since 1999. MPP is the first protocol to use it at scale — turning any API endpoint into a paywall with one middleware.
Tempo confirms transactions in ~0.6 seconds with no re-orgs. Your payment settles before the AI finishes thinking.
Unlike Ethereum or Solana, Tempo lets you pay fees in USDC. No volatile tokens to buy. No gas price anxiety.
Traditional APIs need signup → API key → billing. MPP needs nothing. The payment IS the authentication.
$500M Series A · $5B valuation · 50+ MPP services live
Based on gstack's production review checklist by Garry Tan. Two-pass analysis.
This is an MVP / proof-of-concept. See GitHub for limitations and source code.