Skip to content

CLI Commands

Terminal window
agentzero [OPTIONS] <COMMAND>
FlagDescription
--data-dir <PATH>Override data/config directory (alias: --config-dir)
--config <PATH>Override config file path
-v, --verboseIncrease verbosity: -v=error, -vv=info, -vvv=debug, -vvvv=trace
--jsonEmit structured JSON output for any command
CodeMeaning
0Success (including --help, --version)
1Runtime or execution failure
2CLI usage or argument parsing error

Send a single message through the agent loop. The agent processes your message, calls tools as needed, and returns a response.

Terminal window
agentzero agent -m "hello"
agentzero agent -m "List files in the current directory"
agentzero agent -m "Summarize this repo" --provider openai --model gpt-4o-mini
agentzero agent -m "hello" --profile my-anthropic-profile
FlagDescription
-m, --message <TEXT>(Required) Message to send
-p, --provider <NAME>Override the configured provider (e.g., openrouter, openai, ollama)
--model <ID>Override the configured model (e.g., gpt-4o-mini, llama3.1:8b)
--profile <NAME>Use a specific auth profile by name (from auth list)

Generate a starter agentzero.toml config file in the current directory. The interactive wizard walks you through provider, model, memory, and security settings.

Terminal window
agentzero onboard # Quick setup (uses defaults or env vars)
agentzero onboard --interactive # Full wizard with prompts
agentzero onboard --force --provider openrouter --model anthropic/claude-sonnet-4-6 --yes
FlagDescription
--interactiveLaunch full onboarding wizard
--forceOverwrite existing config without confirmation
--provider <NAME>Provider name (openai, openrouter, anthropic, ollama, etc.)
--base-url <URL>Provider base URL
--model <ID>Model identifier
--memory <BACKEND>Memory backend: sqlite (default), lucid, markdown, none
--memory-path <PATH>Database file path
--allowed-root <PATH>Filesystem scope root
--allowed-commands <LIST>Comma-separated command allowlist
--api-key <KEY>API key (quick mode only, ignored with --interactive)
--yesSkip prompts, auto-accept defaults
--no-totpDisable OTP in quick setup (not recommended)
--channels-onlyReconfigure channels only (fast repair)

Show a minimal runtime status summary including recent memory count.

Terminal window
agentzero status
agentzero --json status

Run diagnostics for model availability and trace inspection.

Probe model catalogs across all configured providers. Shows provider status, model count, and cache freshness.

Terminal window
agentzero doctor models # Probe all known providers
agentzero doctor models --provider openrouter # Specific provider only
agentzero doctor models --use-cache # Prefer cached catalogs
FlagDescription
--provider <NAME>Probe specific provider only
--use-cachePrefer cached catalogs when available

List recent tool execution traces and model replies in reverse chronological order. Reads from {data_dir}/trace_events.jsonl.

Terminal window
agentzero doctor traces # Last 20 events
agentzero doctor traces --event tool --contains shell --limit 50
agentzero doctor traces --id abc123 # Show specific event
FlagDescription
--id <ID>Show specific trace event by id
--event <TYPE>Filter by event type
--contains <TEXT>Case-insensitive text match across message/payload
--limit <N>Maximum events to display (default: 20)

List all supported AI providers with their status and configuration.

Terminal window
agentzero providers # Table output
agentzero providers --json # Machine-readable
agentzero providers --no-color # Disable ANSI colors
FlagDescription
--jsonEmit machine-readable JSON output
--no-colorDisable ANSI color in table output

Inspect provider rate limits, API key status, and circuit breaker state.

Terminal window
agentzero providers-quota
agentzero providers-quota --provider openrouter --json
FlagDescription
--provider <NAME>Specific provider to inspect
--jsonEmit machine-readable JSON output

Start the HTTP gateway server in the foreground. Blocks until stopped. Exposes REST, WebSocket, and webhook endpoints for programmatic access.

Terminal window
agentzero gateway # Defaults: 127.0.0.1:8080
agentzero gateway --host 0.0.0.0 --port 8081 # Custom bind address
agentzero gateway --new-pairing # Clear paired tokens, fresh pairing code
FlagDescription
--host <HOST>Interface to bind (default: 127.0.0.1)
-p, --port <PORT>Port to bind (default: 8080)
--new-pairingClear all paired tokens and generate a fresh pairing code

Endpoints:

EndpointMethodDescription
/healthGETHealth check
/metricsGETPrometheus-style metrics
/pairPOSTPair a client (get bearer token)
/api/chatPOSTSend a chat message
/v1/chat/completionsPOSTOpenAI-compatible completions API
/v1/modelsGETList available models
/v1/pingPOSTConnectivity check
/v1/webhook/:channelPOSTChannel-specific webhook
/ws/chatGETWebSocket chat

Manage the background daemon process. The daemon runs the gateway server as a detached process with logging.

Start the daemon. By default spawns a background process and returns immediately. Logs to {data_dir}/daemon.log.

Terminal window
agentzero daemon start # Background, default 127.0.0.1:8080
agentzero daemon start --port 9000 # Custom port
agentzero daemon start --foreground # Foreground (for systemd/debugging)
FlagDescription
--host <HOST>Interface to bind (default: 127.0.0.1)
-p, --port <PORT>Port to bind (default: 8080)
--foregroundRun in foreground instead of daemonizing

Stop the running daemon process.

Terminal window
agentzero daemon stop

Show whether the daemon is running, its PID, bind address, and log file location.

Terminal window
agentzero daemon status
agentzero daemon status --json
FlagDescription
--jsonEmit JSON with running, host, port, pid, started_at_epoch_seconds

Install and manage AgentZero as an OS service for automatic startup on boot. Auto-detects systemd or OpenRC.

Terminal window
agentzero service install # Install service
agentzero service start # Start service
agentzero service stop # Stop service
agentzero service restart # Restart service
agentzero service status # Show install/running state
agentzero service uninstall # Remove service
agentzero service --service-init systemd install # Force systemd
FlagDescription
--service-init <INIT>Init system: auto (default), systemd, openrc

Launch an interactive terminal dashboard for real-time monitoring.

Terminal window
agentzero dashboard

Inspect and modify the agentzero.toml configuration file.

Print the effective configuration as JSON. Secrets are masked by default.

Terminal window
agentzero config show # Secrets masked
agentzero config show --raw # Secrets visible
FlagDescription
--rawEmit raw JSON without masking secrets

Query a single config value by dot-separated path.

Terminal window
agentzero config get provider.model
agentzero config get agent.max_tool_iterations

Set a config value in agentzero.toml. Type is auto-inferred (bool, int, float, string).

Terminal window
agentzero config set provider.model "gpt-4o"
agentzero config set agent.max_tool_iterations 20

Print the config template or JSON schema.

Terminal window
agentzero config schema # TOML template
agentzero config schema --json # JSON schema
FlagDescription
--jsonEmit JSON schema instead of TOML template

Manage provider authentication profiles. Supports OAuth (browser-based), API key paste, and multi-profile switching. Credentials are stored in an encrypted auth store at {data_dir}/auth/.

Start an interactive login flow. Opens a browser for OAuth providers (OpenAI Codex, Gemini) or prompts for an API key (Anthropic).

Terminal window
agentzero auth login # Interactive provider selection
agentzero auth login --provider openai-codex # OAuth browser flow
agentzero auth login --provider gemini # OAuth browser flow
agentzero auth login --provider anthropic # API key paste
FlagDescription
--provider <NAME>Provider: openai-codex, gemini, anthropic. Prompts if omitted
--profile <NAME>Profile name to save under (default: default)
--device-codeUse OAuth device-code flow (planned)

Save an API key or token for a provider. Prompts interactively if --token is omitted.

Terminal window
agentzero auth setup-token --provider openrouter
agentzero auth setup-token --provider anthropic --token sk-ant-...
agentzero auth setup-token --provider openai --token sk-... --profile work
FlagDescription
--provider <NAME>(Required) Provider id
--token <TOKEN>Token value. Prompts interactively if omitted
--profile <NAME>Profile name (default: default)
--activateSet as active profile after saving (default: true)

Alias for setup-token. Same flags and behavior.

Complete an OAuth flow by pasting the redirect URL or authorization code.

Terminal window
agentzero auth paste-redirect --provider openai-codex
agentzero auth paste-redirect --provider gemini --input "https://..."
FlagDescription
--provider <NAME>(Required) Provider id
--profile <NAME>Profile name (default: default)
--input <URL_OR_CODE>Redirect URL or raw auth code. Prompts if omitted

Refresh an expired OAuth access token using a stored refresh token.

Terminal window
agentzero auth refresh --provider openai-codex
agentzero auth refresh --provider gemini --profile work
FlagDescription
--provider <NAME>(Required) Provider id
--profile <NAME>Profile name to refresh

Set the active auth profile for a provider. The active profile is used when no --profile override is given.

Terminal window
agentzero auth use --provider anthropic --profile work
FlagDescription
--provider <NAME>(Required) Provider id
--profile <NAME>(Required) Profile name or full profile id

Show all configured auth profiles.

Terminal window
agentzero auth list
agentzero auth list --json
FlagDescription
--jsonJSON array with name, provider, active, has_refresh_token, timestamps

Show the active profile, token type, and expiry information for each provider.

Terminal window
agentzero auth status
agentzero auth status --json
FlagDescription
--jsonJSON with active_profile, active_provider, total_profiles, expiry info

Remove an authentication profile.

Terminal window
agentzero auth logout --provider openrouter
agentzero auth logout --provider anthropic --profile work
FlagDescription
--provider <NAME>(Required) Provider id
--profile <NAME>Profile name (default: default)

The agent has access to built-in tools that it calls automatically during the agent loop. Tools are gated by the [security] section in agentzero.toml. There is no CLI command to invoke tools directly — they are used by the agent when processing messages.

ToolDescription
read_fileRead files within the configured allowed_root
shellExecute shell commands (restricted to allowed_commands)
glob_searchFind files by glob pattern
content_searchSearch file contents by text or regex
memory_storePersist a key-value memory entry
memory_recallRetrieve stored memory entries
memory_forgetDelete memory entries
image_infoRead image metadata (dimensions, format, EXIF)
docx_readExtract text from Microsoft Word documents
pdf_readExtract text from PDF files
screenshotCapture a screenshot
task_planCreate and manage structured task plans
process_toolManage system processes
subagent_spawnStart a sub-agent with a specific task
subagent_listList active sub-agents
subagent_manageStop or manage sub-agent lifecycle
cli_discoveryCheck if shell commands exist on PATH, get runtime info
proxy_configConfigure proxy settings
delegate_coordination_statusTrack delegation status across agents
sop_listList available standard operating procedures
sop_statusShow status of an active SOP
sop_advanceAdvance to the next step in an SOP
sop_approveApprove the current SOP step
sop_executeExecute an SOP

These tools are disabled by default and must be enabled in agentzero.toml:

ToolConfig FlagDescription
write_filesecurity.write_file.enabled = trueWrite files within allowed root
apply_patchsecurity.write_file.enabled = trueApply unified diffs to files
file_editsecurity.write_file.enabled = trueMake targeted edits to files
git_operationssecurity.enable_git = trueRun git commands
cron_addsecurity.enable_cron = trueAdd a scheduled task
cron_listsecurity.enable_cron = trueList scheduled tasks
cron_removesecurity.enable_cron = trueRemove a scheduled task
cron_updatesecurity.enable_cron = trueUpdate a scheduled task
cron_pausesecurity.enable_cron = truePause a scheduled task
cron_resumesecurity.enable_cron = trueResume a paused task
web_searchweb_search.enabled = trueSearch the web (DuckDuckGo, Brave, Jina)
browserbrowser.enabled = trueBrowse web pages
browser_openbrowser.enabled = trueOpen a URL in the browser
mcp_toolsecurity.mcp.enabled = trueCall MCP (Model Context Protocol) servers
process_pluginsecurity.plugin.enabled = trueExecute process-based plugins
composiocomposio.enabled = trueUse Composio integrations
pushoversecurity.enable_pushover = trueSend push notifications via Pushover
model_routing_configAutomatically enabled when model router is configuredConfigure model routing rules
delegateAutomatically enabled when delegate agents are configured in [agents.*]Delegate tasks to other agents
[security]
allowed_root = "." # File access boundary
allowed_commands = ["ls", "pwd", "cat"] # Shell command allowlist
[security.read_file]
max_read_bytes = 262144 # 256 KiB default
allow_binary = false
[security.write_file]
enabled = false # Disabled by default
max_write_bytes = 65536 # 64 KiB limit
[security.shell]
max_args = 32
max_arg_length = 4096
max_output_bytes = 65536
forbidden_chars = ";&|><$`\n\r"
[security.mcp]
enabled = false
allowed_servers = []
[security.url_access]
block_private_ip = true
allow_loopback = false
[security.otp]
enabled = false
gated_actions = ["shell", "file_write", "browser_open", "browser", "memory_forget"]

Skills are composable agent behaviors written in TypeScript, Rust, Go, or Python. They are stored in an encrypted state file at {data_dir}/skills-state.json.

List all installed skills with their enabled status and source.

Terminal window
agentzero skill list
agentzero skill list --json
FlagDescription
--jsonEmit JSON array of skill records

Install a skill by name and source.

Terminal window
agentzero skill install --name research --source local
agentzero skill install --name code-review --source builtin
FlagDescription
--name <NAME>(Required) Skill name (alphanumeric, hyphens, underscores)
--source <SOURCE>Source of the skill (default: local)

Run a basic validation check on an installed skill. Shows source and enabled status.

Terminal window
agentzero skill test --name research
FlagDescription
--name <NAME>(Required) Skill name

Remove an installed skill.

Terminal window
agentzero skill remove --name research
FlagDescription
--name <NAME>(Required) Skill name

Scaffold a new skill project with a manifest and source file.

Terminal window
agentzero skill new my-skill # TypeScript (default)
agentzero skill new my-skill --template rust # Rust
agentzero skill new my-skill --template python --dir ./skills
FlagDescription
name(Required, positional) Name for the new skill
--template <LANG>Scaffold template: typescript/ts (default), rust/rs, go, python/py
--dir <PATH>Target directory (default: workspace root)

Generated files:

  • skill.json — manifest with name, version, template, entry point
  • src/main.{ts,rs,go,py} — scaffolded source file

Audit an installed skill for security and compatibility. Checks manifest validity, source trust, and permission scope.

Terminal window
agentzero skill audit --name research
agentzero skill audit --name research --json
FlagDescription
--name <NAME>(Required) Skill name
--jsonEmit JSON with checks: manifest_valid, source_trusted, permissions_scoped

List available scaffold templates with their entry points.

Terminal window
agentzero skill templates

Plugins are sandboxed WebAssembly modules that extend AgentZero’s capabilities. They run in an isolated WASM runtime (wasmtime) with configurable resource limits.

Scaffold a plugin manifest template.

Terminal window
agentzero plugin new --id my-plugin
agentzero plugin new --id my-plugin --version 1.0.0 --entrypoint main --force
FlagDescription
--id <ID>(Required) Plugin identifier
--version <VER>Plugin version (default: 0.1.0)
--entrypoint <NAME>WASM entrypoint function (default: run)
--wasm-file <PATH>WASM file reference (default: plugin.wasm)
--out-dir <DIR>Output directory (default: current directory)
--forceOverwrite existing manifest

Validate a plugin manifest for correctness. Checks id, version, entrypoint, WASM file extension, SHA256 format, and API version compatibility.

Terminal window
agentzero plugin validate --manifest manifest.json
FlagDescription
--manifest <PATH>(Required) Path to manifest.json

Run plugin preflight checks and optional execution in a sandboxed environment. Test isolation: 5s timeout, 5MB module limit, 64MB memory, no network, no filesystem writes.

Terminal window
agentzero plugin test --manifest manifest.json --wasm plugin.wasm
agentzero plugin test --manifest manifest.json --wasm plugin.wasm --execute
FlagDescription
--manifest <PATH>(Required) Path to manifest.json
--wasm <PATH>(Required) Path to compiled .wasm module
--executeExecute the entrypoint after preflight (default: preflight only)

Run a local development loop: validate, preflight, and optionally execute with deterministic fixtures.

Terminal window
agentzero plugin dev --manifest manifest.json --wasm plugin.wasm
agentzero plugin dev --manifest manifest.json --wasm plugin.wasm --iterations 5
FlagDescription
--manifest <PATH>(Required) Path to manifest.json
--wasm <PATH>(Required) Path to .wasm module
--iterations <N>Number of loop iterations (default: 1)
--executeExecute entrypoint in addition to preflight (default: true)

Package a plugin into an installable tar archive. Computes SHA256 checksum and embeds it in the manifest.

Terminal window
agentzero plugin package --manifest manifest.json --wasm plugin.wasm --out my-plugin.tar
FlagDescription
--manifest <PATH>(Required) Path to manifest.json
--wasm <PATH>(Required) Path to .wasm module
--out <PATH>(Required) Output archive path

Install a packaged plugin archive. Verifies checksum integrity, then installs to {data_dir}/plugins/{id}/{version}/.

Terminal window
agentzero plugin install --package my-plugin.tar
agentzero plugin install --package my-plugin.tar --install-dir ./plugins
FlagDescription
--package <PATH>(Required) Path to plugin archive (.tar)
--install-dir <DIR>Installation directory (default: {data_dir}/plugins)

List installed plugins with their version and install location.

Terminal window
agentzero plugin list
agentzero plugin list --json
FlagDescription
--jsonEmit JSON with install_root and plugins array
--install-dir <DIR>Installation directory (default: {data_dir}/plugins)

Remove an installed plugin. Can remove a specific version or all versions.

Terminal window
agentzero plugin remove --id my-plugin # All versions
agentzero plugin remove --id my-plugin --version 0.1.0 # Specific version
FlagDescription
--id <ID>(Required) Plugin identifier
--version <VER>Specific version to remove (default: all versions)
--install-dir <DIR>Installation directory (default: {data_dir}/plugins)
{
"id": "my-plugin",
"version": "0.1.0",
"entrypoint": "run",
"wasm_file": "plugin.wasm",
"wasm_sha256": "a1b2c3...",
"capabilities": ["tool.call"],
"hooks": ["before_tool_call"],
"min_runtime_api": 1,
"max_runtime_api": 1,
"allowed_host_calls": []
}
LimitDefaultTest/Dev
Max execution time30s5s
Max module size5 MB5 MB
Max memory256 MB64 MB
Network accessNoNo
Filesystem writesNoNo

Inspect registered tools, their descriptions, and JSON schemas. Useful for debugging which tools the agent has access to and verifying schema definitions.

List all registered tools.

Terminal window
agentzero tools list
agentzero tools list --with-schema
agentzero tools list --json
FlagDescription
--with-schemaOnly show tools that have a JSON input schema defined
--jsonOutput as JSON array

Show details for a specific tool.

Terminal window
agentzero tools info read_file
agentzero tools info shell
ArgumentDescription
<NAME>(Required) Tool name to inspect

Print the JSON input schema for a specific tool.

Terminal window
agentzero tools schema read_file
agentzero tools schema shell --pretty
Argument / FlagDescription
<NAME>(Required) Tool name
--prettyPretty-print the JSON schema

Inspect and manage the agent’s conversation memory store. Backend is configured in agentzero.toml (sqlite, lucid, markdown, or none).

List memory entries with pagination.

Terminal window
agentzero memory list
agentzero memory list --limit 100 --offset 50
agentzero memory list --json
FlagDescription
--limit <N>Maximum entries to return (default: 50)
--offset <N>Pagination offset (default: 0)
--category <CAT>Filter by category (reserved)
--session <SID>Filter by session (reserved)
--jsonEmit machine-readable JSON output

Retrieve a memory entry by key prefix. Returns the most recent match.

Terminal window
agentzero memory get --key "session-abc"
agentzero memory get --json # Most recent entry
FlagDescription
--key <KEY>Key or prefix to match (most recent if omitted)
--jsonEmit machine-readable JSON output

Show memory store statistics.

Terminal window
agentzero memory stats
agentzero memory stats --json
FlagDescription
--jsonEmit machine-readable JSON output

Delete memory entries. Can target specific keys or clear all.

Terminal window
agentzero memory clear --yes # Clear all (skip confirmation)
agentzero memory clear --key "old-session" # Delete by key prefix
FlagDescription
--key <KEY>Delete entries matching this key prefix
--category <CAT>Filter by category (reserved)
--yesSkip confirmation prompt
--jsonEmit machine-readable JSON output

Local retrieval-augmented generation index. Ingest documents and query them by semantic similarity. Requires the rag feature.

Add a document to the RAG index.

Terminal window
agentzero rag ingest --id doc1 --text "Important context about the project..."
agentzero rag ingest --id doc2 --file ./notes.md
FlagDescription
--id <ID>(Required) Document identifier
--text <TEXT>Inline text content
--file <PATH>File path to ingest (alternative to --text)
--jsonEmit machine-readable JSON output

Query the RAG index for relevant documents.

Terminal window
agentzero rag query --query "What was the decision?" --limit 5
FlagDescription
--query <TEXT>(Required) Query text
--limit <N>Maximum matches (default: 5)
--jsonEmit machine-readable JSON output

Emergency stop — immediately halt agent execution at various severity levels. Can require OTP to resume.

Terminal window
agentzero estop # Default: kill-all
agentzero estop --level kill-all --require-otp # Require OTP to resume
agentzero estop --level network-kill # Block all network access
agentzero estop --level domain-block --domain "*.example.com" --domain "evil.com"
agentzero estop --level tool-freeze --tool shell --tool write_file
FlagDescription
--level <LEVEL>Severity: KillAll, NetworkKill, DomainBlock, ToolFreeze
--domain <PATTERN>Domain pattern(s) for domain-block (repeatable)
--tool <NAME>Tool name(s) for tool-freeze (repeatable)
--require-otpRequire TOTP code to resume

Show current emergency stop state, level, blocked domains/tools, and timestamp.

Terminal window
agentzero estop status

Resume from emergency stop. Can resume partially (specific domains or tools) or fully.

Terminal window
agentzero estop resume # Resume all
agentzero estop resume --otp 123456 # Resume with OTP
agentzero estop resume --network # Resume network only
agentzero estop resume --domain "*.example.com" # Unblock specific domain
agentzero estop resume --tool shell # Unfreeze specific tool
FlagDescription
--networkResume only network kill
--domain <PATTERN>Unblock specific domain(s) (repeatable)
--tool <NAME>Unfreeze specific tool(s) (repeatable)
--otp <CODE>OTP code (prompted if required but omitted)

Evaluate approval requirements for high-risk actions using the approval policy engine.

Terminal window
agentzero approval evaluate --actor agent --action shell --risk high
agentzero approval evaluate --actor agent --action shell --risk high --decision allow --approver admin --reason "deployment"
FlagDescription
--actor <NAME>Actor requesting the action
--action <NAME>Action being evaluated
--risk <LEVEL>Risk level of the action
--approver <NAME>Who approved the action
--decision <DECISION>Decision: allow or deny
--reason <TEXT>Reason for the decision
--jsonEmit machine-readable JSON output

Manage provider model catalogs. Models are cached with a 12-hour TTL.

Fetch the latest model list from providers.

Terminal window
agentzero models refresh # Refresh configured provider
agentzero models refresh --all --force # Force refresh all providers
agentzero models refresh --provider anthropic
FlagDescription
--provider <NAME>Refresh specific provider (default: configured provider)
--allRefresh all providers that support live discovery
--forceForce live refresh, ignore fresh cache

List cached models for a provider.

Terminal window
agentzero models list
agentzero models list --provider ollama
FlagDescription
--provider <NAME>List models for this provider (default: configured provider)

Set the default model in your config file.

Terminal window
agentzero models set anthropic/claude-sonnet-4-6
agentzero models set gpt-4o-mini

Show current provider, default model, and cache freshness.

Terminal window
agentzero models status

Download a model from a local provider (Ollama and similar). Shows a progress bar.

Terminal window
agentzero models pull llama3.1:8b
agentzero models pull llama3.1:8b --provider ollama
FlagDescription
--provider <NAME>Provider to pull from (default: configured local provider)

Discover and manage local AI model services (Ollama, llama.cpp, LM Studio, vLLM, SGLang).

Scan default ports for running local AI services.

Terminal window
agentzero local discover
agentzero local discover --timeout-ms 5000 --json
agentzero local discover --retries 2 # Retry unreachable providers with backoff
FlagDescription
--timeout-ms <MS>Probe timeout in milliseconds (default: 2000)
--retries <N>Retry unreachable providers up to N times with backoff (default: 0)
--jsonEmit machine-readable JSON output

Show status of the configured local provider.

Terminal window
agentzero local status
agentzero local status --json
FlagDescription
--jsonEmit machine-readable JSON output

Run a health check against a specific local provider endpoint.

Terminal window
agentzero local health ollama
agentzero local health vllm --url http://gpu-server:8000
FlagDescription
provider(Required, positional) Provider name: ollama, llamacpp, lmstudio, vllm, sglang
--url <URL>Custom base URL (overrides default)

Manage scheduled tasks. Tasks are stored in {data_dir}/cron-tasks.json.

Terminal window
agentzero cron list
agentzero cron list --json

Add a scheduled task with a cron expression.

Terminal window
agentzero cron add --id backup --schedule "0 2 * * *" --command "agentzero agent -m 'run backup'"
FlagDescription
--id <ID>(Required) Task identifier
--schedule <EXPR>(Required) Cron expression
--command <CMD>(Required) Command to execute

Add a task scheduled at a specific time.

Terminal window
agentzero cron add-at --id deploy --schedule "2026-03-15T10:00:00" --command "deploy.sh"

Add a recurring task with a cadence expression.

Terminal window
agentzero cron add-every --id heartbeat --schedule "5m" --command "agentzero status"

Add a one-time scheduled task.

Terminal window
agentzero cron once --id migrate --schedule "2026-03-01T00:00:00" --command "migrate"

Update an existing task’s schedule or command.

Terminal window
agentzero cron update --id backup --schedule "0 3 * * *"
agentzero cron update --id backup --command "new-backup-script"
FlagDescription
--id <ID>(Required) Task identifier
--schedule <EXPR>New schedule (optional)
--command <CMD>New command (optional)
Terminal window
agentzero cron pause --id backup
agentzero cron resume --id backup
agentzero cron remove --id backup

Manage lifecycle hooks that run at specific points in the agent execution cycle.

Terminal window
agentzero hooks list
agentzero hooks list --json
Terminal window
agentzero hooks enable --name pre-tool
agentzero hooks disable --name pre-tool

Run a hook test to verify it executes correctly.

Terminal window
agentzero hooks test --name pre-tool

Manage messaging channels (Telegram, Discord, Slack, etc.). Channel credentials are stored in an encrypted state file.

Add a new channel. Prompts for channel-specific configuration (API keys, chat IDs, etc.).

Terminal window
agentzero channel add # Interactive prompt
agentzero channel add telegram # Add by name
agentzero channel add discord
Terminal window
agentzero channel list

Run channel diagnostics — checks configured channels and dispatch engine.

Terminal window
agentzero channel doctor

Launch configured channels and test connectivity.

Terminal window
agentzero channel start
Terminal window
agentzero channel remove # Interactive prompt
agentzero channel remove telegram # Remove by name

Browse and validate available third-party integrations.

Terminal window
agentzero integrations list
agentzero integrations list --category ai --status enabled
agentzero integrations search --query "slack"
agentzero integrations info
FlagDescription
--category <CAT>Filter by category
--status <STATUS>Filter by status
--query <TEXT>Search query

Manage template files that define agent behavior. Templates are Markdown files loaded at agent startup (e.g., AGENTS.md, IDENTITY.md, SOUL.md, TOOLS.md).

List all template files with their status and source location.

Terminal window
agentzero template list
agentzero template list --json
FlagDescription
--jsonJSON array with name, session, found, source

Available templates: AGENTS.md, BOOT.md, BOOTSTRAP.md, HEARTBEAT.md, IDENTITY.md, SOUL.md, TOOLS.md, USER.md

Display the content of a specific template.

Terminal window
agentzero template show IDENTITY
agentzero template show soul # Case-insensitive

Scaffold template files with default content.

Terminal window
agentzero template init # All templates
agentzero template init --name IDENTITY # Single template
agentzero template init --dir ./templates --force
FlagDescription
--name <NAME>Single template to scaffold (default: all)
--dir <DIR>Target directory (default: workspace root)
--forceOverwrite existing files

Check that template files exist and have content.

Terminal window
agentzero template validate

Manage actor identities and roles. Identities track who (human, agent, service) is performing actions.

Terminal window
agentzero identity upsert --id agent-1 --name "Primary Agent" --kind agent
agentzero identity get --id agent-1
agentzero identity get --id agent-1 --json
agentzero identity add-role --id agent-1 --role admin
SubcommandDescriptionKey Flags
upsertCreate or update an identity--id, --name, --kind (Human/Agent/Service), --json
getShow identity by id--id, --json
add-roleAdd a role to an identity--id, --role, --json

Inspect and update the multi-agent coordination runtime.

Terminal window
agentzero coordination status
agentzero coordination status --json
agentzero coordination set --active-workers 4 --queued-tasks 10
SubcommandDescriptionKey Flags
statusShow worker/task counts--json
setUpdate counts--active-workers, --queued-tasks

Track accumulated API usage cost.

Terminal window
agentzero cost status
agentzero cost status --json
agentzero cost record --tokens 1500 --usd 0.003
agentzero cost reset
SubcommandDescriptionKey Flags
statusShow cost summary--json
recordRecord token usage--tokens, --usd
resetReset cost summary

Manage runtime goals for tracking agent progress.

Terminal window
agentzero goals list
agentzero goals list --json
agentzero goals add --id ship-v1 --title "Ship v1.0"
agentzero goals complete --id ship-v1
SubcommandDescriptionKey Flags
listList goals--json
addAdd a goal--id, --title
completeMark goal complete--id

Manage secure tunnels for exposing local services.

Terminal window
agentzero tunnel start --protocol https --remote example.com:443 --local-port 8443
agentzero tunnel start --name my-tunnel --protocol http --remote api.example.com:80 --local-port 3000
agentzero tunnel status
agentzero tunnel status --json
agentzero tunnel stop
SubcommandKey Flags
start--name (default: default), --protocol (http/https/ssh), --remote (host:port), --local-port
stop--name
status--name, --json

Migrate data from external runtimes.

Terminal window
agentzero migrate openclaw --source /path/to/openclaw
agentzero migrate openclaw --source /path/to/openclaw --dry-run
FlagDescription
--source <PATH>Source directory to import from
--dry-runValidate and preview without writing

Self-update operations. Check for new versions, apply updates, or roll back.

Terminal window
agentzero update --check # Quick check
agentzero update check --channel stable --json # Detailed check
agentzero update apply --version 1.2.0 # Apply specific version
agentzero update rollback # Roll back to previous
agentzero update status # Show update state
SubcommandKey Flags
check--channel (default: stable), --json
apply--version, --json
rollback--json
status--json

Generate shell completion scripts. Pipe to your shell’s completion file.

Terminal window
agentzero completions --shell bash >> ~/.bashrc
agentzero completions --shell zsh >> ~/.zshrc
agentzero completions --shell fish > ~/.config/fish/completions/agentzero.fish
FlagDescription
--shell <SHELL>Shell: bash, zsh, fish, elvish, powershell

Discover hardware boards and inspect chip details. Requires the hardware feature.

Terminal window
agentzero hardware discover # Scan for boards
agentzero hardware info --chip STM32F401RETx # Chip details
agentzero hardware introspect # Board introspection

Manage peripheral devices. Requires the hardware feature.

Terminal window
agentzero peripheral list
agentzero peripheral list --json
agentzero peripheral add --id sensor-1 --kind temperature --connection /dev/ttyUSB0
agentzero peripheral flash --id sensor-1 --firmware firmware.bin
agentzero peripheral flash-nucleo
agentzero peripheral setup-uno-q --host 192.168.0.48
SubcommandDescriptionKey Flags
listList registered peripherals--json
addRegister a peripheral--id, --kind, --connection, --json
flashFlash firmware--id, --firmware, --json
flash-nucleoFlash Nucleo board profile--json
setup-uno-qSetup Uno Q--host, --json