Capability-based access control for the AI era
Traditional APIs use identity-based access: "Prove who you are, then we decide what you can do."
SatGate uses capability-based access: "Present a cryptographic token that already encodes what you can do."
SatGate never holds, controls, or has access to your funds. Payments settle directly from payers to your Lightning node. We never touch your private keys.
L402 creates a new security primitive: paid capabilities. Payment gates token issuance, and the token itself encodes permissions via macaroon caveats.
Spam becomes expensive and self-limiting. High-volume callers must continuously pay to continue. This complements (not replaces) your existing WAF/CDN for network-layer protection.
SatGate is a Zero Trust Policy Enforcement Point for paid and capability-based API access. It verifies every protected request and enforces scoped access via L402/macaroons—no network trust assumptions.
All SatGate code is open source under the MIT License. You can audit every line, fork it, and run your own infrastructure. No black boxes.
View Source on GitHub →Found a security vulnerability? We appreciate responsible disclosure. Please report security issues privately before public disclosure.
Email: contact@satgate.io
| Threat | Protection |
|---|---|
| API scraping | ✓ Economic cost per request |
| Bot abuse | ✓ Payment required = economic friction |
| Credential theft | ✓ Tokens can have short expiration |
| Chargebacks | ✓ Lightning payments are final |
| Network DDoS (volumetric) | ⚠ Use CDN/WAF (Cloudflare, etc.) |