Documentation Index
Fetch the complete documentation index at: https://glide-9da73dea.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
List the accounts this agent can operate on. Scoped strictly to the grant’s aud.vault_id — a sibling agent’s vault is never visible even if under the same principal.
| Field | Value |
|---|
| Name | accounts.list |
| Category | read |
| Required scope | accounts:read |
| Idempotency key required | no |
Annotations
| Annotation | Value |
|---|
| Title | List Accounts |
| Read-only | yes |
| Destructive | no |
| Idempotent | yes |
| Open-world | no |
| Requires human approval | no |
{
"$schema": "https://json-schema.org/draft/2020-12/schema",
"type": "object",
"properties": {},
"additionalProperties": false
}
Output schema
{
"$schema": "https://json-schema.org/draft/2020-12/schema",
"type": "object",
"properties": {
"accounts": {
"type": "array",
"items": {
"type": "object",
"properties": {
"vault_id": {
"type": "string",
"format": "uuid",
"pattern": "^([0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[1-8][0-9a-fA-F]{3}-[89abAB][0-9a-fA-F]{3}-[0-9a-fA-F]{12}|00000000-0000-0000-0000-000000000000|ffffffff-ffff-ffff-ffff-ffffffffffff)$"
},
"display_name": {
"type": "string"
},
"chain_ids": {
"type": "array",
"items": {
"type": "string",
"enum": [
"eth",
"base",
"arb",
"op",
"polygon",
"sol"
]
}
},
"policy_version": {
"type": "integer",
"minimum": 0,
"maximum": 9007199254740991
},
"status": {
"type": "string",
"enum": [
"active",
"throttled",
"frozen",
"sweep_to_parent",
"revoked"
]
}
},
"required": [
"vault_id",
"display_name",
"chain_ids",
"policy_version",
"status"
],
"additionalProperties": false
}
},
"fetched_at": {
"type": "string",
"format": "date-time",
"pattern": "^(?:(?:\\d\\d[2468][048]|\\d\\d[13579][26]|\\d\\d0[48]|[02468][048]00|[13579][26]00)-02-29|\\d{4}-(?:(?:0[13578]|1[02])-(?:0[1-9]|[12]\\d|3[01])|(?:0[469]|11)-(?:0[1-9]|[12]\\d|30)|(?:02)-(?:0[1-9]|1\\d|2[0-8])))T(?:(?:[01]\\d|2[0-3]):[0-5]\\d(?::[0-5]\\d(?:\\.\\d+)?)?(?:Z))$"
}
},
"required": [
"accounts",
"fetched_at"
],
"additionalProperties": false
}
Request examples
curl -X POST https://mcp.glide.co/mcp/read \
-H "Authorization: Bearer $GLIDE_GRANT_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"jsonrpc": "2.0",
"id": 1,
"method": "accounts.list",
"params": {}
}'
Response examples
Successful response:
{
"jsonrpc": "2.0",
"id": 1,
"result": {
"accounts": [
{
"vault_id": "a1b2c3d4-e5f6-7890-abcd-ef1234567890",
"display_name": "Acme Corp Treasury",
"chain_ids": ["eth", "base", "sol"],
"policy_version": 3,
"status": "active"
},
{
"vault_id": "b2c3d4e5-f6a7-8901-bcde-f12345678901",
"display_name": "Acme Corp Payroll",
"chain_ids": ["sol"],
"policy_version": 1,
"status": "active"
}
],
"fetched_at": "2026-05-04T12:00:00Z"
}
}
Error — missing or expired grant token:
{
"jsonrpc": "2.0",
"id": 1,
"error": {
"code": -32001,
"message": "grant token missing or expired",
"data": {
"reason_id": "token_expired"
}
}
}
Error — grant is missing the required scope:
{
"jsonrpc": "2.0",
"id": 1,
"error": {
"code": -32002,
"message": "grant does not include accounts:read scope",
"data": {
"reason_id": "insufficient_scope"
}
}
}
Errors
| Code | Name | Cause | Remediation |
|---|
-32600 | Invalid request | Malformed JSON-RPC envelope | Check method, jsonrpc, and id fields |
-32602 | Invalid params | Params don’t match input schema | Validate against schema before call |
-32000 | Unauthenticated | Missing Authorization header | Supply a valid Bearer token |
-32001 | Unauthorized | Grant token expired or revoked | Refresh token via agent.grant.refresh |
-32002 | Insufficient scope | Grant missing accounts:read scope | Issue new grant with accounts:read scope |
-32603 | Internal error | Server-side error | Retry with backoff; contact support |
Auth
Caller’s grant must include the accounts:read scope. Grants whose scope set is a superset of the required scope are accepted.