Documentation Index
Fetch the complete documentation index at: https://glide-9da73dea.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Per-chain, per-token balance of the agent vault. Amounts returned in both cents (USD-normalized via current FX where applicable) and native units.
| Field | Value |
|---|
| Name | accounts.balance |
| Category | read |
| Required scope | accounts:read |
| Idempotency key required | no |
Annotations
| Annotation | Value |
|---|
| Title | Account Balance |
| Read-only | yes |
| Destructive | no |
| Idempotent | yes |
| Open-world | no |
| Requires human approval | no |
{
"$schema": "https://json-schema.org/draft/2020-12/schema",
"type": "object",
"properties": {
"vault_id": {
"type": "string",
"format": "uuid",
"pattern": "^([0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[1-8][0-9a-fA-F]{3}-[89abAB][0-9a-fA-F]{3}-[0-9a-fA-F]{12}|00000000-0000-0000-0000-000000000000|ffffffff-ffff-ffff-ffff-ffffffffffff)$"
},
"chain": {
"type": "string",
"enum": [
"eth",
"base",
"arb",
"op",
"polygon",
"sol"
]
},
"token": {
"type": "string",
"minLength": 1
}
},
"additionalProperties": false
}
Output schema
{
"$schema": "https://json-schema.org/draft/2020-12/schema",
"type": "object",
"properties": {
"balances": {
"type": "array",
"items": {
"type": "object",
"properties": {
"chain": {
"type": "string",
"enum": [
"eth",
"base",
"arb",
"op",
"polygon",
"sol"
]
},
"token": {
"type": "string"
},
"amount_cents": {
"type": "integer",
"minimum": 0,
"maximum": 9007199254740991
},
"native_unit_value": {
"type": "string"
},
"usd_equivalent_cents": {
"type": "integer",
"minimum": 0,
"maximum": 9007199254740991
}
},
"required": [
"chain",
"token",
"amount_cents",
"native_unit_value"
],
"additionalProperties": false
}
},
"fetched_at": {
"type": "string",
"format": "date-time",
"pattern": "^(?:(?:\\d\\d[2468][048]|\\d\\d[13579][26]|\\d\\d0[48]|[02468][048]00|[13579][26]00)-02-29|\\d{4}-(?:(?:0[13578]|1[02])-(?:0[1-9]|[12]\\d|3[01])|(?:0[469]|11)-(?:0[1-9]|[12]\\d|30)|(?:02)-(?:0[1-9]|1\\d|2[0-8])))T(?:(?:[01]\\d|2[0-3]):[0-5]\\d(?::[0-5]\\d(?:\\.\\d+)?)?(?:Z))$"
}
},
"required": [
"balances",
"fetched_at"
],
"additionalProperties": false
}
Request examples
curl -X POST https://mcp.glide.co/mcp/read \
-H "Authorization: Bearer $GLIDE_GRANT_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"jsonrpc": "2.0",
"id": 1,
"method": "accounts.balance",
"params": {
"vault_id": "a1b2c3d4-e5f6-7890-abcd-ef1234567890",
"chain": "base",
"token": "USDC"
}
}'
Response examples
Successful response — all chains when no filter applied:
{
"jsonrpc": "2.0",
"id": 1,
"result": {
"balances": [
{
"chain": "base",
"token": "USDC",
"amount_cents": 250000,
"native_unit_value": "2500.000000",
"usd_equivalent_cents": 250000
},
{
"chain": "sol",
"token": "USDC",
"amount_cents": 75000,
"native_unit_value": "750.000000",
"usd_equivalent_cents": 75000
},
{
"chain": "eth",
"token": "ETH",
"amount_cents": 312480,
"native_unit_value": "0.125000",
"usd_equivalent_cents": 312480
}
],
"fetched_at": "2026-05-04T12:00:00Z"
}
}
Error — vault ID not in grant audience:
{
"jsonrpc": "2.0",
"id": 1,
"error": {
"code": -32602,
"message": "vault_id not in grant audience",
"data": {
"reason_id": "vault_not_in_audience"
}
}
}
Error — missing or expired grant token:
{
"jsonrpc": "2.0",
"id": 1,
"error": {
"code": -32001,
"message": "grant token missing or expired",
"data": {
"reason_id": "token_expired"
}
}
}
Errors
| Code | Name | Cause | Remediation |
|---|
-32600 | Invalid request | Malformed JSON-RPC envelope | Check method, jsonrpc, and id fields |
-32602 | Invalid params | chain is not one of the allowed enum values, or vault_id is not a valid UUID | Validate against schema before call |
-32000 | Unauthenticated | Missing Authorization header | Supply a valid Bearer token |
-32001 | Unauthorized | Grant token expired or revoked | Refresh token via agent.grant.refresh |
-32002 | Insufficient scope | Grant missing accounts:read scope | Issue new grant with accounts:read scope |
-32603 | Internal error | Server-side error | Retry with backoff; contact support |
Auth
Caller’s grant must include the accounts:read scope. Grants whose scope set is a superset of the required scope are accepted.