MCP Billing Landscape: 6 Approaches Compared

·10 min read

There are 10,000+ MCP servers. The overwhelming majority are free, unmonetized, and — according to Adversa AI's research — 43% have command injection vulnerabilities. That's not a coincidence. When nobody pays, nobody invests in security, reliability, or trust.

Multiple teams are now building billing and monetization layers for MCP. They range from open standards to proprietary marketplaces to “just duct-tape Stripe to it.” This post compares six distinct approaches so you can decide what actually fits your stack.

The Comparison Table

ApproachSetupMCP-NativeTrust LayerOpen/ProprietaryCost
Agent Bazaar~5 min (SDK wrap)✓ Built for MCP✓ FullMIT spec10% tx fee
MCP HiveRegister + review✓ MCP gateway✗ None publishedProprietaryTBD (not launched)
DIY StripeDays–weeks✗ Generic✗ Build your ownOpen (your code)2.9% + 30¢/tx
API GatewayDays–weeks✗ Retrofit✗ Auth onlyProprietary$300+/mo enterprise
Usage BillingWeeks✗ Generic metering✗ NoneProprietary$1K+/mo
Free / DonationZeroN/A✗ NoneOpen source$0 (unsustainable)

1. Agent Bazaar (noui.bot) — Open Billing Standard

This is what we're building. Agent Bazaar is an open billing and trust layer for MCP servers. The core idea: billing for agent tools should be a protocol, not a platform.

You wrap your existing MCP server with our SDK (takes about 5 minutes), set per-call or per-token pricing, and you're live. Every invocation generates a signed receipt (HMAC-SHA256) proving who called what, when, and at what cost. Receipts are tamper-evident — both provider and consumer can independently verify them.

The MCP Billing Spec is MIT licensed. Anyone can implement it. We'd rather be the reference implementation of a universal standard than own a walled garden.

Trust layer: Provider verification (email + domain + code), 30-day SLA tracking (uptime, latency, error rate), composite trust scores, dispute resolution
MCP-native: Understands tool schemas, per-method pricing, token-level metering
No lock-in: MIT spec means you can switch implementations or self-host. Your billing data is yours.

Trade-off: 10% transaction fee on the hosted marketplace. If that doesn't work for you, self-host the spec. We literally publish the schema.

2. MCP Hive — Proprietary Marketplace

MCP Hive is a marketplace for commercial MCP servers, positioning itself as the “app store” for MCP. Providers register their MCP servers, set a price per call, and MCP Hive proxies traffic through their gateway. They offer per-request and subscription pricing.

Their pitch is compelling: “Brands your users already trust.” They're targeting content providers (news, finance, weather) who want to monetize data access through MCP. Launch date is May 2026 via their “Project Ignite” founding community program.

MCP-native gateway. Understands tools/list, tools/call. Not just a generic proxy.
Content provider angle. Good positioning for data monetization specifically.
No published trust layer. No signed receipts, no SLA tracking, no dispute resolution, no trust scores.
Proprietary. No open spec, no SDK, no self-hosting option. If MCP Hive goes down, your billing goes down.
Manual review process. Every MCP server goes through Draft → Pending → Approved → Active. Gatekept.

3. DIY Stripe Integration — Roll Your Own

Stripe now has an MCP app framework and an official MCP server. Cloudflare published templates for paid MCP servers on Workers. You can absolutely stitch together Stripe Billing + your own metering + Cloudflare Workers + custom auth.

People are doing this. There are Medium posts, Reddit threads, and GitHub repos showing how to wire Stripe subscriptions to MCP tool calls with usage-based limits. It works.

Full control. Your code, your pricing, your customer relationships.
Low payment fees. Standard Stripe rates (2.9% + 30¢).
You build everything. Auth, metering, rate limiting, usage tracking, customer portal, receipts — all custom.
No discovery. Nobody finds your MCP server through Stripe. Marketing is 100% on you.
No trust primitives. No provider verification, no SLA tracking, no signed receipts. You're on your own for accountability.

This is the approach if you already have customers, want maximum control, and don't mind spending a week or two on billing infrastructure. For a solo developer who just wants to get paid for a useful tool? Overkill.

4. API Gateway Billing (Kong, Apigee, Moesif)

Kong Konnect (konghq.com) acquired OpenMeter and now offers API gateway + MCP proxy + metering + billing + developer portal as an all-in-one platform. Moesif does similar — plug into your gateway, define billing meters, connect to Stripe.

These are serious enterprise tools. If you're an org with existing API infrastructure (Kong, AWS API Gateway, WSO2), extending it to meter MCP traffic is rational. You get rate limiting, API key management, analytics, and billing in one stack.

Enterprise-proven. Battle-tested at scale. Real customers, real SLAs.
Sophisticated metering. Per-method, per-token, per-outcome billing models.
Not MCP-native. These are API management tools retrofitted for MCP. They don't understand tool schemas natively.
Enterprise pricing. Kong Konnect starts at $300+/month. Moesif's growth tier isn't cheap either. Not for indie developers.
No marketplace, no trust. Pure infrastructure — you still need customers, discovery, and accountability.

5. Usage-Based Billing Platforms (Metronome, Orb, Amberflo)

Metronome, Orb, and Amberflo are usage-based billing platforms built for SaaS. They handle the hard part of metering — ingesting millions of usage events, aggregating them in real-time, and producing accurate invoices. Amberflo has even started marketing MCP metering specifically.

If you're building a large-scale MCP hosting platform and need industrial-grade metering infrastructure, these are real options. But they're general-purpose billing engines, not MCP-specific solutions.

Industrial metering. Millions of events/second. Real-time aggregation. Accurate invoicing at scale.
Flexible pricing models. Per-unit, tiered, volume, hybrid — whatever you need.
Not MCP-aware. They meter events. They don't know what a “tool call” is versus a “resource read.”
Expensive. Metronome and Orb start at ~$1K/month. These are enterprise tools for enterprise budgets.
Plumbing, not product. No marketplace. No discovery. No trust. You're buying a billing engine, not a billing solution.

6. No Billing (Free / Donation Model)

This is where 95%+ of MCP servers are today. Open source on GitHub, maybe a “Buy Me a Coffee” link, no usage tracking, no auth, no SLA. Some are brilliant tools. Most are weekend projects.

It works for learning and experimentation. It doesn't work for building critical infrastructure that agents depend on. And here's the kicker: the security data backs this up.

Zero friction. npm install, done.
Maximum adoption. Free things spread fastest.
No sustainability. Developers burn out. Servers go offline. Nobody's on-call at 3 AM for a free MCP server.
No accountability. No SLAs, no receipts, no recourse when things break.
Security vacuum. Adversa AI found 43% of MCP servers vulnerable to command injection. 37% require no authentication at all.

The Security Problem That Billing Solves

Adversa AI's Top 25 MCP Vulnerabilities report is damning: 43% of MCP servers are vulnerable to command injection. 37% require no authentication. Input validation is “inexcusable” — their word — given it's been a solved problem since the 1990s.

Why is the MCP ecosystem so vulnerable? Because there's no economic incentive to secure things. When your MCP server is a weekend project with zero revenue, you don't invest in input sanitization, rate limiting, or auth. You don't monitor uptime. You don't track SLAs.

A billing layer doesn't just enable monetization — it creates accountability infrastructure:

  • Provider verification means you know who's running the server. Not an anonymous GitHub user — a verified entity.
  • Signed receipts create an audit trail. When something goes wrong, you have cryptographic proof of what happened.
  • SLA tracking surfaces unreliable providers before they cause damage. 30-day uptime, latency, and error rate — visible to consumers before they buy.
  • Trust scores let agents make autonomous purchasing decisions without human intervention. High trust score = safe to use. Low score = proceed with caution.

This isn't theoretical. When a billing layer requires providers to verify their identity and tracks their reliability, the economic incentives flip. Providers who want revenue invest in security because their trust score — and therefore their discoverability and revenue — depends on it.

What Actually Matters

After researching every player in this space, three things separate the serious approaches from the toys:

1. Open vs. Proprietary

MCP itself is an open protocol. The billing layer on top should be too. Proprietary billing creates vendor lock-in that contradicts MCP's entire philosophy. If your billing provider dies, do your revenue streams die with it? That's the question.

2. Trust Primitives

Billing without trust is just a payment form. When agents autonomously select and pay for tools, they need machine-readable trust signals. Provider verification, SLA history, signed receipts, dispute resolution — these aren't nice-to-haves. They're the difference between an economy and a Wild West.

3. MCP-Native Design

Generic API billing tools work but miss the point. MCP has unique primitives — tools, resources, prompts, sampling — that demand specific metering. Per-tool-call pricing. Per-resource access. Token-level granularity. A billing layer that doesn't understand these is just a proxy with a Stripe integration.

Where We Land

We built Agent Bazaar because none of the existing approaches combine all three: open spec, trust primitives, and MCP-native design. We published the billing spec under MIT so anyone can implement it — including competitors. We built provider verification, signed receipts, SLA tracking, and trust scoring because the 43% vulnerability rate tells us the ecosystem needs accountability, not just payment rails.

Every approach on this list has merit. The right choice depends on your scale, your audience, and how much infrastructure you want to own. But if you believe MCP billing should be an open standard — not a proprietary platform — we think Bazaar is the right foundation.

Disclosure: We built Agent Bazaar and obviously have opinions. This analysis is based on publicly available information as of March 2026. We respect everyone building in this space — a rising tide lifts all boats. The MCP ecosystem is better with multiple approaches than with none.