The Meta-Tools

The meta-tools work. Eleven months of compiler infrastructure—context trees, schema processing, type generation, hygienic execution—converge into three tools that unlock every API without requiring tool registration per operation.

An unexpected benefit: presenting interfaces as TypeScript instead of JSON Schema dramatically improves LLM comprehension. Schema violations plummet to near zero. Token usage drops, leaving more context for actual work. Agents guess operation names and parameter structures correctly without even searching first—because TypeScript matches the code they were trained on in ways that JSON Schema never did.

find_api

Agents describe what they want to accomplish; the system searches across all indexed operations and returns matches ranked by semantic similarity. Top matches include full TypeScript function signatures with inline documentation—often enough for agents to call directly without further learning. Additional matches listed by name for broader discovery.

learn_api

When an operation has complex types or an agent needs to understand response structure, it requests expanded type declarations. The system tree-shakes the operation spec, generates TypeScript types through the optimization pipeline, and returns clean declarations that resolve all references. Request types by default; response types optional to minimize context usage.

call_api

Agents provide operation name and structured arguments organized by location (path, query, header, body). The system handles everything else: validate parameters against schemas, expand URI templates, encode the request body, resolve credentials from the user’s vault, apply authentication per security scheme, execute the HTTP request, decode the response, return structured results. Credentials never appear in the conversation.

Credential Bridge

Transforms between Auth’s storage format (with refresh tokens, expiration, scopes) and OpenAPI’s application format (just what’s needed for the request). OAuth credentials can satisfy either oauth2 schemes or http-bearer schemes—real-world APIs often declare bearer auth for endpoints that accept OAuth tokens.

Catalog Composition

Catalogs compose APIs into curated collections with visibility and override controls. Include operations from multiple APIs, exclude certain operations, override descriptions. Live updates: when source APIs change, changes propagate to catalogs via source/target messaging.