UCPReady — spec-complete WooCommerce implementation, live on 40k+ SKU store #297
Replies: 3 comments 9 replies
-
|
Great write-up, Almin — and congrats on the 98 schema quality score. We built SkyeWoo, a WooCommerce plugin for token-gating and wallet-verified discounts. Merchants set conditions per product (chain, contract address, threshold), customers connect their wallet, and the plugin verifies holdings server-side using cryptographically signed attestations (ES256 JWTs, verifiable offline via JWKS). 30+ chains, multiple wallet types. Reading your post, the use case that jumped out immediately: token-gated products + autonomous AI agents. A few real scenarios where this matters:
Right now SkyeWoo's gating is human-interactive — a person clicks "Connect Wallet" in their browser. But gating conditions are already structured data (chain ID, contract, threshold, decimals). If UCPReady exposed extension points for product-level capabilities and checkout preconditions, SkyeWoo could:
The agent gets the full loop: discover → verify eligibility → purchase. No human in the middle. On our side, the verification and JWT validation logic already exists. The bridge would be SkyeWoo hooking into UCPReady's manifest generation and checkout flow — which means the integration depends on UCPReady exposing WordPress filter hooks for other plugins to extend. Would you be open to collaborating on this? Happy to share more about how the attestation format works and sketch out what the capability definition could look like. If the pattern generalizes, it could be worth proposing as a UCP capability so any commerce plugin can declare eligibility preconditions that AI agents can satisfy programmatically. |
Beta Was this translation helpful? Give feedback.
-
|
Absolutely — here's the detail on both questions. 1. JWT binding + replay prevention The attestation JWT includes these claims (all set server-side, ES256-signed):
For checkout binding: the Verification is offline — fetch the JWKS from 2. When is the gate evaluated? SkyeWoo supports both levels, configurable per product:
Most merchants will want the second model for AI agents — the agent needs to see the conditions to know what attestation to obtain. Hidden products are useful for exclusive drops where even the existence of the product is gated. Sample gating condition object (as stored per product): {
"type": "token_balance",
"contractAddress": "0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48",
"chainId": 1,
"threshold": 500,
"decimals": 6,
"label": "Hold ≥500 USDC on Ethereum"
}Happy to continue async — this thread is probably the best place to iterate on the capability definition where others can see and contribute. |
Beta Was this translation helpful? Give feedback.
-
|
Good question — and the answer is simpler than you might expect: there's no merchant registration step. SkyeWoo doesn't use So the onboarding is: install plugin → activate license → configure conditions on products. Zero accounts to create on our side, zero registry entries. The SkyeWoo license handles auth and metering at the plugin layer. For the UCP capability, the same model applies. The gating conditions would live in the WooCommerce product metadata (where they already are) and get surfaced in the UCP manifest. No extra registration, no merchant ID to manage. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi UCP team,
Sharing what we've built: UCPReady is a WooCommerce plugin that implements the full UCP spec. It's live in production at [houseofparfum.nl](https://houseofparfum.nl) — 40,000+ SKUs.
Live discovery endpoint: https://houseofparfum.nl/.well-known/ucp
What's implemented
complete_checkout/cancel_checkoutenforceidempotency-keyvia MCPdev.ucp.common.identity_linking— full OAuth 2.0 Authorization Code + PKCE S256, RFC 7591 dynamic client registration, RFC 7009 cascade revocation, RFC 8414/.well-known/oauth-authorization-serversigning_keysat root levelucpready_process_payment— complete purchase with no browser redirectfulfillmentwith machine-readableconfigblock (allows_multi_destination,allows_method_combinations)Validation
UCP Playground (Ben Fisher): Schema Quality score A (98). During interop testing we also surfaced 4 edge-case bugs in Playground's embedded checkout implementation — all fixed same day.
Full write-up
Screenshots of the complete autonomous purchase flow — OAuth consent screen → identity-linked buyer pre-population → wallet debit → WooCommerce order paid, zero human interaction after initial consent:
👉 https://dev.to/zologic/how-i-built-autonomous-ai-purchasing-on-woocommerce-oauth-20-identity-linking-and-wallet-5148
Why WooCommerce matters for UCP adoption
WooCommerce powers ~6.5 million active stores. Shopify is already a co-developer of UCP. UCPReady is the path for the other half of the ecommerce long tail — SMBs, independent retailers, niche stores — to become UCP-compatible without custom builds.
Happy to contribute WooCommerce-specific feedback to the TC. Variable product handling, partial payment flows, and multi-destination constraints are areas where real-world implementation at scale reveals gaps worth addressing in the spec.
— Almin Zolotic, [Zologic](https://zologic.nl)
Beta Was this translation helpful? Give feedback.
All reactions