invoke "/x402/verify", return {
"success": false,
"isValid": false,
"invalidReason": "invalid_exact_evm_payload_signature",
"payer": "0xF6C....."
}
The EVM signature is valid cryptographically, but it does NOT match the exact message that the verifier reconstructs.
To be honest, I don't know exactly which request headers this interface is going to pass in, because I don't see the instructions in the documentation, I can only view it through the source code
