Documentation Index
Fetch the complete documentation index at: https://docs.request.network/llms.txt
Use this file to discover all available pages before exploring further.
What you’ll build
A receiving setup where every wallet that tries to pay you is screened against sanctions and risk lists before the payment can settle. If a wallet fails screening, the payment is blocked — the payer never reaches the sign step. You configure this per payment destination, so you can keep some flows compliance-gated and others permissive. Audience: regulated fintech, marketplaces with compliance obligations, B2B platforms with KYC/AML requirements, any merchant who needs to refuse payments from sanctioned or high-risk addresses. This is a Know Your Transaction (KYT) policy, not a Know Your Customer (KYC) flow. There’s no document upload or identity verification on the payer side — just a wallet-address screening.How it works
When you create a payment destination via the Auth API, you can attach a payment access policy that turns KYT screening on for that destination:Wallet screening
Before the payment options view loads, Request Network’s compliance gate screens the connected wallet (and, for smart-account payments, the parent EOA as well).
Configure a KYT-gated destination
Pass anaccessPolicy object when creating a payee destination:
| Field | Type | Description |
|---|---|---|
mode | "off" | "kyt_all_wallets" | off is the default (no screening). kyt_all_wallets screens every payer wallet that connects. |
hideUntilApproved | boolean | When true, the payment metadata (amount, currency, recipient) is hidden until the payer’s wallet has passed screening. |
hidePayeeAddress | boolean | When true, the payee wallet address is masked throughout the payer flow — no ENS resolution, no copy button, no explorer link. |
mode — you can show payment details upfront and still gate the actual payment behind screening, or hide everything until the gate clears.
Existing payment destinations without an
accessPolicy keep behaving exactly as before — there is no implicit screening. KYT only activates when you opt a destination in.Privacy options
hideUntilApproved and hidePayeeAddress solve two different concerns:
hideUntilApproved— useful when the payment terms themselves are sensitive (commercial pricing, B2B contracts). The payer connects a wallet, gets screened, and only sees the amount/recipient if their wallet clears.hidePayeeAddress— useful when you want to keep your receiving wallet from being scraped and re-used by the payer outside this payment flow. The payer can still pay (the secure payment app builds the transaction with the real address), but they don’t see the address copy/explorer-link affordances.
What payers experience
| Scenario | Payer view |
|---|---|
| Wallet passes screening | Standard payment flow — connect, pick chain/token, sign. |
| Wallet fails screening | Policy-failure view; sign button is disabled. The payer is told the payment cannot proceed and to contact you for an alternative. |
| Screening in progress | Brief loading state between wallet connect and payment options view. |
Update or remove a policy
Change the policy on an existing destination by re-issuing the create call (the active destination is updated in place) or by callingPUT /v1/payee-destination:
mode: "off" reverts the destination to standard, unscreened behavior. Existing payment links you’ve already created against that destination will use whatever policy is in effect at the moment a payer connects.
When KYT screening doesn’t replace your own checks
KYT screens individual wallet addresses against external sanctions and risk lists. It does not:- Verify payer identity (use KYC tooling for that).
- Prove origin of funds — addresses can pass screening but still be linked to off-platform behavior you’d flag yourself.
- Replace transaction-monitoring on your side after the fact.
Related
Payee destinations
Full payee-destination reference, including the
accessPolicy field.Quickstart
The end-to-end flow this fits into.