Skip to main content

Documentation Index

Fetch the complete documentation index at: https://glide-9da73dea.mintlify.app/llms.txt

Use this file to discover all available pages before exploring further.

Propose adding a counterparty to the agent’s envelope allowlist. Per the multisig allowlist gate, allowlist mutations are multisig-proposal based — this tool enqueues the proposal; the principal approves via the web dashboard.

Metadata

FieldValue
Namebeneficiary.add
Categorywrite
Required scopebeneficiary:write
Idempotency key requiredyes

Annotations

AnnotationValue
TitlePropose Beneficiary
Read-onlyno
Destructiveno
Idempotentyes
Open-worldno
Requires human approvalyes (step-up)

Input schema

{
  "$schema": "https://json-schema.org/draft/2020-12/schema",
  "type": "object",
  "properties": {
    "counterparty": {
      "type": "object",
      "properties": {
        "address": {
          "type": "string",
          "minLength": 1
        },
        "chain": {
          "type": "string",
          "enum": [
            "eth",
            "base",
            "arb",
            "op",
            "polygon",
            "sol"
          ]
        },
        "token": {
          "type": "string",
          "minLength": 1
        }
      },
      "required": [
        "address",
        "chain",
        "token"
      ],
      "additionalProperties": false
    },
    "label": {
      "type": "string",
      "minLength": 1,
      "maxLength": 100
    },
    "justification": {
      "type": "string",
      "minLength": 1,
      "maxLength": 500
    },
    "idempotency_key": {
      "type": "string",
      "minLength": 8,
      "maxLength": 128
    }
  },
  "required": [
    "counterparty",
    "label",
    "justification",
    "idempotency_key"
  ],
  "additionalProperties": false
}

Output schema

{
  "$schema": "https://json-schema.org/draft/2020-12/schema",
  "type": "object",
  "properties": {
    "proposal_id": {
      "type": "string",
      "format": "uuid",
      "pattern": "^([0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[1-8][0-9a-fA-F]{3}-[89abAB][0-9a-fA-F]{3}-[0-9a-fA-F]{12}|00000000-0000-0000-0000-000000000000|ffffffff-ffff-ffff-ffff-ffffffffffff)$"
    },
    "status": {
      "type": "string",
      "enum": [
        "pending_principal_approval",
        "auto_approved"
      ]
    },
    "enqueued_at": {
      "type": "string",
      "format": "date-time",
      "pattern": "^(?:(?:\\d\\d[2468][048]|\\d\\d[13579][26]|\\d\\d0[48]|[02468][048]00|[13579][26]00)-02-29|\\d{4}-(?:(?:0[13578]|1[02])-(?:0[1-9]|[12]\\d|3[01])|(?:0[469]|11)-(?:0[1-9]|[12]\\d|30)|(?:02)-(?:0[1-9]|1\\d|2[0-8])))T(?:(?:[01]\\d|2[0-3]):[0-5]\\d(?::[0-5]\\d(?:\\.\\d+)?)?(?:Z))$"
    }
  },
  "required": [
    "proposal_id",
    "status",
    "enqueued_at"
  ],
  "additionalProperties": false
}

Auth

Caller’s grant must include the beneficiary:write scope. Grants whose scope set is a superset of the required scope are accepted.

Request examples

curl -X POST https://mcp.glide.co/mcp/write \
  -H "Authorization: Bearer $GLIDE_GRANT_TOKEN" \
  -H "Content-Type: application/json" \
  -d '{
    "jsonrpc": "2.0",
    "id": 1,
    "method": "beneficiary.add",
    "params": {
      "counterparty": {
        "address": "0xd8dA6BF26964aF9D7eEd9e03E53415D37aA96045",
        "chain": "base",
        "token": "USDC"
      },
      "label": "Acme Supplier — Base USDC",
      "justification": "Regular monthly SaaS invoice payments to Acme Corp per contract #2026-Q2-017",
      "idempotency_key": "acme-supplier-base-usdc-allowlist-20260504"
    }
  }'

Response examples

Success — proposal enqueued for principal approval:
{
  "jsonrpc": "2.0",
  "id": 1,
  "result": {
    "proposal_id": "c3d4e5f6-a7b8-9012-cdef-123456789012",
    "status": "pending_principal_approval",
    "enqueued_at": "2026-05-04T09:15:00Z"
  }
}
Auto-approved (policy permits the counterparty without human sign-off):
{
  "jsonrpc": "2.0",
  "id": 1,
  "result": {
    "proposal_id": "c3d4e5f6-a7b8-9012-cdef-123456789012",
    "status": "auto_approved",
    "enqueued_at": "2026-05-04T09:15:00Z"
  }
}
Missing scope:
{
  "jsonrpc": "2.0",
  "id": 1,
  "error": {
    "code": -32001,
    "message": "grant does not include scope beneficiary:write",
    "data": { "reason_id": "insufficient_scope" }
  }
}

Errors

CodeNameCauseRemediation
-32600Invalid requestMalformed JSON-RPC envelopeCheck method, jsonrpc, and id fields
-32602Invalid paramscounterparty.chain not in enum, address empty, or idempotency_key too shortValidate against the input schema before calling
-32001UnauthorizedMissing/expired grant tokenRefresh via agent.grant.refresh
-32002Policy deniedGrant missing beneficiary:write scopeIssue a new grant with the required scope
-32004Rate limitedToo many proposals in a short windowBack off by retry_after_seconds in the error data
-32603Internal errorProposal write failedRetry with the same idempotency_key; the response will be idempotent