Skip to content

vonzio (platform) MCP server

The vonzio MCP server (URL: /mcp/platform) is how agents call back into the platform itself. Use cases:

  • A coordinator agent submits work to a worker profile
  • A playbook agent triggers another playbook on completion
  • An agent queries memory across profiles for cross-domain context

Always injected (when INTERNAL_SERVER_URL is set). Authorization is bound to the running user — these are “operate as me” capabilities, not “operate as someone else”.

Submit a new task to any profile owned by the running user. Useful for fan-out.

{
"profile_id": "prof_research_assistant",
"prompt": "Find me everything we have on quarterly revenue trends.",
"mode": "batch",
"max_turns": 50
}

Returns the new task_id. The submitting agent doesn’t block on completion — it’s fire-and-forget.

Pair with task_submit: block until a submitted task completes, then return its result text.

{ "task_id": "task_…", "timeout_seconds": 120 }

Returns either the assistant’s final text or an error if the task failed / timed out.

Manually fire a playbook owned by the running user.

{ "playbook_id": "pb_…" }

Returns the new run_id. Useful for chaining: “Run the cleanup playbook, then run the report playbook.”

List the user’s workspaces. Same shape as GET /v1/workspaces but available to the agent without the agent holding an API token.

{ "status": "active", "limit": 20 }

Archive a workspace (sets archived=true). Use for hygiene playbooks that clean up stale conversations.

{ "session_id": "sess_…" }

Query memory across all the user’s profiles (not just the running one). Useful for coordinator agents.

{ "query": "credit card payoff plan" }

The running agent still can’t write to other profiles’ memory — only the running profile’s. Use memory_write on the memory MCP for that.

Authorization: Bearer platform_<token>. The bearer carries { userId, profileId }. All operations respect user ownership — no cross-user reach.

  • Agents can’t escalate privilege via this server. They can only operate within their user’s existing permissions.
  • Cross-profile reach is limited to memory_query_global (read-only across profiles). Mutations remain per-profile.
  • playbook_run can fire any of the user’s playbooks. If you don’t want an agent to be able to trigger a sensitive playbook, scope it to a different profile (a profile the running agent isn’t on).