List agents

GET/v1/agents

How to call this endpoint

Every ACP API request uses bearer authentication. The examples here show the actual request path, auth header, and body shape that the platform expects.

Path, query, and header parameters

These parameters control which ACP object the endpoint acts on and how the request is processed.

Path parameters
None.
Query parameters
None.

Body schema

This endpoint does not require a request body.

None.

What the API returns

Each response code below includes the documented payload shape for the ACP API.

200Agent listapplication/json
FieldTypeRequiredDescription
objectstringNo
dataobject[]No
data[].idstringNoUnique identifier.
data[].userIdstringNoUser ID.
data[].projectIdstringNoProject ID.
data[].namestringNoHuman-readable name.
data[].descriptionstringNoHuman-readable description.
data[].modelstringNoModel identifier for the agent. Built-in managed models: - `claude-opus-4-7` - `claude-opus-4-6` - `claude-sonnet-4-5` - `claude-haiku-4-5` - `gpt-5.5-pro` - `gpt-5.5` - `gpt-5.4` - `gpt-5.4-mini` - `gpt-5.4-nano` - `gemini-3-flash` - `gemini-3-1-flash` - `gemini-3-1-pro` - `deepseek-v4-pro` - `deepseek-v4-flash` - `kimi-k2.6` Team and Enterprise workspaces can also use connected external models in the form `external:{providerType}:{urlEncodedModelId}`. Use `GET /agents/models` to discover the exact managed and external model IDs available in the current workspace.
data[].instructionsstringNo
data[].binaryClaude Code CLINoExecution binary used for the agent runtime.
data[].reasoningEffortminimal | low | medium | highNoReasoning intensity used by the execution runtime.
data[].enabledSkillsstring[]NoSkill IDs enabled for this agent, for example `deep_research` or custom installed skills.
data[].deepResearchModelgemini-3-flash-preview | gemini-3-pro-previewNoOptional model override used by the deep research skill when enabled.
data[].permissionSetobjectNoAgent permission policy. The shape is intentionally subject-typed so it can also be reused for human users and teams later.
data[].permissionSet.version1No
data[].permissionSet.subjectTypeagent | human_user | teamNo
data[].permissionSet.defaultAccessfull_access | ask_for_permission | read_only | no_accessNoAccess level for a resource category. `full_access` allows viewing and actions, `ask_for_permission` allows proposed actions that require approval, `read_only` allows viewing without mutation, and `no_access` blocks view and action access.
data[].permissionSet.resourcesobjectNo
data[].permissionSet.resources.agentsobjectNo
data[].permissionSet.resources.agents.defaultAccessfull_access | ask_for_permission | read_only | no_accessNoAccess level for a resource category. `full_access` allows viewing and actions, `ask_for_permission` allows proposed actions that require approval, `read_only` allows viewing without mutation, and `no_access` blocks view and action access.
data[].permissionSet.resources.agents.rulesobject[]No
data[].permissionSet.resources.agents.rules[].idstringNoOptional stable rule ID.
data[].permissionSet.resources.agents.rules[].targetIdstringNoOptional resource identifier for agent, skill, server, computer, or project rules.
data[].permissionSet.resources.agents.rules[].pathstringNoOptional file or directory path for path-scoped rules.
data[].permissionSet.resources.agents.rules[].accessfull_access | ask_for_permission | read_only | no_accessNoAccess level for a resource category. `full_access` allows viewing and actions, `ask_for_permission` allows proposed actions that require approval, `read_only` allows viewing without mutation, and `no_access` blocks view and action access.
data[].permissionSet.resources.agents.rules[].notestringNoOptional human-readable note for the rule.
data[].permissionSet.resources.skillsobjectNo
data[].permissionSet.resources.skills.defaultAccessfull_access | ask_for_permission | read_only | no_accessNoAccess level for a resource category. `full_access` allows viewing and actions, `ask_for_permission` allows proposed actions that require approval, `read_only` allows viewing without mutation, and `no_access` blocks view and action access.
data[].permissionSet.resources.skills.rulesobject[]No
data[].permissionSet.resources.skills.rules[].idstringNoOptional stable rule ID.
data[].permissionSet.resources.skills.rules[].targetIdstringNoOptional resource identifier for agent, skill, server, computer, or project rules.
data[].permissionSet.resources.skills.rules[].pathstringNoOptional file or directory path for path-scoped rules.
data[].permissionSet.resources.skills.rules[].accessfull_access | ask_for_permission | read_only | no_accessNoAccess level for a resource category. `full_access` allows viewing and actions, `ask_for_permission` allows proposed actions that require approval, `read_only` allows viewing without mutation, and `no_access` blocks view and action access.
data[].permissionSet.resources.skills.rules[].notestringNoOptional human-readable note for the rule.
data[].permissionSet.resources.serversobjectNo
data[].permissionSet.resources.servers.defaultAccessfull_access | ask_for_permission | read_only | no_accessNoAccess level for a resource category. `full_access` allows viewing and actions, `ask_for_permission` allows proposed actions that require approval, `read_only` allows viewing without mutation, and `no_access` blocks view and action access.
data[].permissionSet.resources.servers.rulesobject[]No
data[].permissionSet.resources.servers.rules[].idstringNoOptional stable rule ID.
data[].permissionSet.resources.servers.rules[].targetIdstringNoOptional resource identifier for agent, skill, server, computer, or project rules.
data[].permissionSet.resources.servers.rules[].pathstringNoOptional file or directory path for path-scoped rules.
data[].permissionSet.resources.servers.rules[].accessfull_access | ask_for_permission | read_only | no_accessNoAccess level for a resource category. `full_access` allows viewing and actions, `ask_for_permission` allows proposed actions that require approval, `read_only` allows viewing without mutation, and `no_access` blocks view and action access.
data[].permissionSet.resources.servers.rules[].notestringNoOptional human-readable note for the rule.
data[].permissionSet.resources.computersobjectNo
data[].permissionSet.resources.computers.defaultAccessfull_access | ask_for_permission | read_only | no_accessNoAccess level for a resource category. `full_access` allows viewing and actions, `ask_for_permission` allows proposed actions that require approval, `read_only` allows viewing without mutation, and `no_access` blocks view and action access.
data[].permissionSet.resources.computers.rulesobject[]No
data[].permissionSet.resources.computers.rules[].idstringNoOptional stable rule ID.
data[].permissionSet.resources.computers.rules[].targetIdstringNoOptional resource identifier for agent, skill, server, computer, or project rules.
data[].permissionSet.resources.computers.rules[].pathstringNoOptional file or directory path for path-scoped rules.
data[].permissionSet.resources.computers.rules[].accessfull_access | ask_for_permission | read_only | no_accessNoAccess level for a resource category. `full_access` allows viewing and actions, `ask_for_permission` allows proposed actions that require approval, `read_only` allows viewing without mutation, and `no_access` blocks view and action access.
data[].permissionSet.resources.computers.rules[].notestringNoOptional human-readable note for the rule.
data[].permissionSet.resources.filesobjectNo
data[].permissionSet.resources.files.defaultAccessfull_access | ask_for_permission | read_only | no_accessNoAccess level for a resource category. `full_access` allows viewing and actions, `ask_for_permission` allows proposed actions that require approval, `read_only` allows viewing without mutation, and `no_access` blocks view and action access.
data[].permissionSet.resources.files.rulesobject[]No
data[].permissionSet.resources.files.rules[].idstringNoOptional stable rule ID.
data[].permissionSet.resources.files.rules[].targetIdstringNoOptional resource identifier for agent, skill, server, computer, or project rules.
data[].permissionSet.resources.files.rules[].pathstringNoOptional file or directory path for path-scoped rules.
data[].permissionSet.resources.files.rules[].accessfull_access | ask_for_permission | read_only | no_accessNoAccess level for a resource category. `full_access` allows viewing and actions, `ask_for_permission` allows proposed actions that require approval, `read_only` allows viewing without mutation, and `no_access` blocks view and action access.
data[].permissionSet.resources.files.rules[].notestringNoOptional human-readable note for the rule.
data[].permissionSet.resources.directoriesobjectNo
data[].permissionSet.resources.directories.defaultAccessfull_access | ask_for_permission | read_only | no_accessNoAccess level for a resource category. `full_access` allows viewing and actions, `ask_for_permission` allows proposed actions that require approval, `read_only` allows viewing without mutation, and `no_access` blocks view and action access.
data[].permissionSet.resources.directories.rulesobject[]No
data[].permissionSet.resources.directories.rules[].idstringNoOptional stable rule ID.
data[].permissionSet.resources.directories.rules[].targetIdstringNoOptional resource identifier for agent, skill, server, computer, or project rules.
data[].permissionSet.resources.directories.rules[].pathstringNoOptional file or directory path for path-scoped rules.
data[].permissionSet.resources.directories.rules[].accessfull_access | ask_for_permission | read_only | no_accessNoAccess level for a resource category. `full_access` allows viewing and actions, `ask_for_permission` allows proposed actions that require approval, `read_only` allows viewing without mutation, and `no_access` blocks view and action access.
data[].permissionSet.resources.directories.rules[].notestringNoOptional human-readable note for the rule.
data[].permissionSet.resources.projectsobjectNo
data[].permissionSet.resources.projects.defaultAccessfull_access | ask_for_permission | read_only | no_accessNoAccess level for a resource category. `full_access` allows viewing and actions, `ask_for_permission` allows proposed actions that require approval, `read_only` allows viewing without mutation, and `no_access` blocks view and action access.
data[].permissionSet.resources.projects.rulesobject[]No
data[].permissionSet.resources.projects.rules[].idstringNoOptional stable rule ID.
data[].permissionSet.resources.projects.rules[].targetIdstringNoOptional resource identifier for agent, skill, server, computer, or project rules.
data[].permissionSet.resources.projects.rules[].pathstringNoOptional file or directory path for path-scoped rules.
data[].permissionSet.resources.projects.rules[].accessfull_access | ask_for_permission | read_only | no_accessNoAccess level for a resource category. `full_access` allows viewing and actions, `ask_for_permission` allows proposed actions that require approval, `read_only` allows viewing without mutation, and `no_access` blocks view and action access.
data[].permissionSet.resources.projects.rules[].notestringNoOptional human-readable note for the rule.
data[].isDefaultbooleanNo
data[].isSystembooleanNo
data[].isActivebooleanNo
data[].metadataobjectNoFree-form metadata object.
data[].createdAtstringNoISO 8601 timestamp.
data[].updatedAtstringNoISO 8601 timestamp.
data[].lastRunAtstringNo
has_morebooleanNo
total_countintegerNo
List agents
Loading...
Response 200
Loading...
See the ACP quickstart and SDK flow