CuseTheJuice

CuseTheJuice

Full Stack AI Engineer developing useful payment required tools for the masses

Pay to play

Passwords and MFA can be phished or shared; a paid session adds economic friction. Here, unlocking is a real Coinbase x402 payment whose USD amount scales with your fuse-strike tier ($0.01 × 1.32^strikes). After payment you get an httpOnly session cookie; when the fuse expires, the app revokes it and you must pay again.

Demo / QA. Fuse strikes are browser-only; not billing truth. Reset is for testing—in production, tier would be server-bound and not resettable from the client like this.

Pay to play

Penalties stack fuse strikes; each unlock is an x402 payment at the quoted tier. After you pay, you get a signed browser session until the fuse burns out or you reset.

Each fuse strike multiplies the next quote by 1.32× (tier-zero base $0.01).

$0.01· 0 fuse strikes

Pay with x402 (wallet)

Opens the Coinbase x402 paywall for this URL. You must complete payment in-wallet; then you'll return here with access.

Demo disclaimer & policy

This playfield is a demonstration. Fuse-strike counts and the reset control live in sessionStorage in your browser. They are not a warranty, invoice, or enforcement of a commercial penalty tier. The quoted x402 amount follows the URL you open in your wallet; we do not claim client-side state is tamper-proof.

Acknowledged workarounds in this demo

  • Anyone can edit sessionStorage, DevTools, or the strikes= query on the unlock link before paying, to aim for a lower displayed tier—still subject to what the x402 route validates when you pay.
  • The paywall overlay and disabled grid are presentation only. They do not cryptographically enforce access.
  • Continued access after payment depends on the server-issued httpOnly signed session cookie, not on React state in the page.

Production hardening tips

  • Treat penalty tier as server authority: bind it to payment receipts, a signed server payload, wallet identity, or persisted abuse state—not to editable browser storage alone.
  • If the unlock price must match a quoted tier, include that tier (or a nonce) inside the signed cookie or token so the client cannot silently downgrade the tier the server will honor.
  • Keep your session signing secret long and private; rotate it if leaked; use session TTLs appropriate to risk.
  • Protect APIs with the same cookie (or stronger auth); never trust headers or body fields from the client for “is paid” or “tier” without verification.
  • Mitigate session theft with httpOnly cookies, tight CSP against XSS, and monitoring—stolen cookies are stolen sessions.
Pay to play (x402) | CuseTheJuice