Buy Now, Pay Later for AI Agents: Who Is Actually Liable?

In March 2026, Stripe enabled Affirm and Klarna as payment options inside its agentic commerce infrastructure. Through Shared Payment Tokens, an AI agent can now initiate a BNPL transaction — split a $300 purchase across four interest-free installments over six weeks — without a human present at checkout.

Nobody has written down who owns those four installments.

This is not a hypothetical edge case. BNPL for AI agents is live infrastructure available to any developer building on Stripe’s agentic stack as of this month. The legal frameworks that govern deferred consumer credit — the CFPB’s Buy Now Pay Later interpretive rule (2024) and the EU’s revised Consumer Credit Directive (CCD2, enforcement begins November 2026) — were written assuming a human borrower clicks “pay in 4.” That assumption fails immediately when the clicker is a non-human agent acting on delegated authority.

Here is what is unresolved.


What Are SPTs and How Do They Enable Agent BNPL?

Stripe’s Shared Payment Tokens are reusable, scoped payment credentials that agents can hold and invoke across transaction types. Unlike static API keys or one-time virtual card numbers, SPTs carry spending rules, merchant restrictions, and — as of March 2026 — can route transactions through BNPL providers including Affirm and Klarna.

In practice: a shopping agent authorized to spend up to $500 on office supplies can now, if not explicitly restricted, route a $300 order through Affirm’s 0% four-installment product. The merchant gets paid today. Affirm holds the installment schedule. The agent completes its task in 40 seconds and moves on.

Installments two, three, and four run for the next six weeks. The agent is gone.


How Does BNPL Liability Work for Humans?

When a human uses Affirm or Klarna at checkout:

  1. Consent is explicit. The human selects the BNPL option. Regulatory frameworks treat this as informed consent to a credit agreement.
  2. Identity is verified. BNPL providers run a soft credit pull or behavioral underwriting on the individual at the moment of selection.
  3. Liability is clear. The human borrower is the obligor. Failed installments are pursued against the individual.
  4. Dispute rights exist. Consumer protection law gives the borrower chargeback and dispute rights the BNPL provider must honor.
FactorHuman-Initiated BNPLAgent-Initiated BNPL
Consent mechanismExplicit selection at checkoutDelegated authority from initial user setup
Credit underwritingIndividual’s credit and behavioral profileUndefined — agents have no credit history
ObligorThe human borrowerDeveloper? End user? Enterprise account?
Dispute rightsConsumer protection law (CFPB, CCD2)No specific provision exists
Regulatory coverageCFPB rule (2024), EU CCD2 (Nov 2026)Not addressed in current rulemaking

Every cell in the agent column is either blank or a question mark.


Who Owns the Deferred Payment Obligation?

Three parties have a plausible claim — or will be asked to absorb the liability:

The end user. The principal-agent doctrine holds that a principal is bound by their agent’s authorized actions. If the user tasked the agent with “buy office supplies,” an argument exists that they authorized whatever instrument the agent selected. But “authorized actions” has never been tested in a BNPL context. Did the user authorize BNPL specifically, or just the purchase?

The developer. If you built the agent and it selected BNPL without surfacing that choice to the user, a regulator or BNPL provider could argue you made the credit election on the user’s behalf. The CFPB’s 2024 interpretive rule explicitly covers “operators of digital wallet services that facilitate BNPL” — agent infrastructure platforms sit directly in that gray zone.

The enterprise deploying the agent. In B2B contexts, the company that provisioned the agent may hold the master agreement with Stripe and the BNPL provider. Under that structure, installments are a corporate liability regardless of which agent task triggered them. This is the cleanest legal structure, but it creates an incentive for enterprises to over-restrict agent payment authority in ways that break the use case.

None of these answers are wrong. None are settled.


Does Verifiable Intent Change the Liability Equation?

Mastercard’s Verifiable Intent framework, launched in early 2026, is the closest thing to a solution architecture for this problem. Verifiable Intent creates a cryptographically signed record of what an agent was authorized to do at the time of a transaction. It answers: was this transaction within the scope of the agent’s mandate?

Applied to BNPL specifically:

  • If the agent’s mandate explicitly authorized deferred payment instruments, Verifiable Intent provides evidence that the BNPL election was sanctioned.
  • If the mandate scoped the agent to “available budget only,” Verifiable Intent creates a record that the BNPL election was outside scope — and liability shifts accordingly.

A chargeback on a human-initiated BNPL transaction has a clear chain: merchant → BNPL provider → consumer. An agent-initiated BNPL dispute has no established chain. Verifiable Intent inserts a signed authorization record that every party can reference to trace where the obligation originated.

It does not solve everything. Verifiable Intent is infrastructure, not law. Regulatory rulemaking has not caught up. But it is the correct primitive to be building on now.


If your agent can touch BNPL-eligible merchants today, you have an undefined liability surface. The practical answer is to constrain it before transaction volume turns a theoretical gap into an active dispute.

ATXP lets you configure payment instrument restrictions at the credential level — you can explicitly deny BNPL routing before the SPT is issued to the agent. Per-task budget caps ensure that even if BNPL were somehow elected, the installment schedule would be within a pre-authorized spend envelope, with the full authorization chain logged and retrievable.


What Does Per-Task Budget Isolation Actually Prevent?

The specific failure mode with agent BNPL is temporal mismatch: the agent’s task lifecycle ends in seconds. The payment obligation it created lasts weeks.

Per-task budget isolation was designed to scope financial exposure to a single task’s duration. Installment schedules break that model structurally:

Budget ConfigurationBNPL Exposure
Monthly cap onlyAgent can elect BNPL up to cap; future installments run past the billing period with no flag
Per-task cap, BNPL unrestrictedTask budget consumed at checkout; installments 2–4 have no task scope to bind to
Per-task cap + BNPL denied at instrument levelAgent cannot elect BNPL; exposure bounded by task cap
Per-task cap + deferred instruments flagged for reviewBNPL election pauses for human approval before proceeding

The third row is the correct default for most agent deployments until liability frameworks mature. The fourth is appropriate for enterprise contexts where BNPL utility is genuinely wanted but a human-in-the-loop gate is required for compliance.

What your agent should not be doing: routing silently through BNPL with no log, no human awareness, and no scope boundary on the obligation it created.

An audit trail is the minimum baseline. If BNPL is elected by an agent and later disputed, the first question every party will ask is: what did the agent’s authorization record say at the time? If your answer is “we did not log that,” you become the liable party by default of having the only party with no documentation.


What Should Developers Do Right Now?

Three steps that do not require waiting for regulatory guidance:

1. Audit your SPT configurations. If you are using Stripe’s agentic commerce infrastructure, check whether your existing SPTs permit BNPL routing. Default configurations may allow it. Restrict explicitly if you have not made an intentional decision.

2. Add BNPL to your agent’s instrument allowlist — as a denied instrument by default. Do not let the payment routing layer make this decision. Your agent’s authorization scope should enumerate which payment instruments are permitted, and BNPL should require an explicit opt-in with documented rationale, not an opt-out.

3. Implement deferred instrument flagging. Any transaction that creates a payment obligation extending past the task lifecycle should trigger a review event. This does not need to be a human approval for every transaction — a logged flag that triggers review above a dollar threshold is sufficient. The audit trail is what matters.

Until the CFPB updates its BNPL interpretive rule to address agentic initiators, and until CCD2 enforcement guidance addresses non-human borrowers, the liability question is unanswered. Building as if it is answered in your favor is the wrong bet.

The infrastructure to constrain this correctly exists today. The question is whether you have configured it.


Agent payment liability frameworks are evolving fast. ATXP tracks regulatory developments across CFPB, EU CCD2, and agentic commerce working groups. Visit atxp.ai for current infrastructure guidance on instrument-level controls and per-task budget configuration.