Use the Lob CLI from KosmoKrator to call Lob tools headlessly, return JSON, inspect schemas, and automate workflows from coding agents, scripts, and CI.
Lob can be configured headlessly with `kosmokrator integrations:configure lob`.
# Install KosmoKrator first if it is not available on PATH.curl -fsSL https://raw.githubusercontent.com/OpenCompanyApp/kosmokrator/main/install.sh | bash# Configure and verify this integration.kosmokrator integrations:configure lob --set api_key="$LOB_API_KEY" --enable --read allow --write ask --jsonkosmokrator integrations:doctor lob --jsonkosmokrator integrations:status --json
Credentials
Authentication type: API keyapi_key. Configure credentials once, then use the same stored profile from
scripts, coding CLIs, Lua code mode, and the MCP gateway.
Key
Env var
Type
Required
Label
api_key
LOB_API_KEY
Secret secret
yes
API Key
url
LOB_URL
URL url
no
Base URL
Call Lob Headlessly
Use the generic call form when another coding CLI or script needs a stable universal interface.
Every function below can be called headlessly. The generic form is stable across all integrations;
the provider shortcut is shorter but specific to Lob.
lob.lob_list_letters
Read read
List letters with pagination. Returns a page of letter objects sorted by creation date (newest first).
Create and send a letter via Lob. Provide recipient and sender addresses (as address IDs or inline address objects), plus an HTML file or template ID for the letter content.
Create and send a postcard via Lob. Provide recipient and sender addresses (as address IDs or inline address objects), plus HTML or template IDs for the front and back.
Create and send a letter via Lob. Provide recipient and sender addresses (as address IDs or inline address objects), plus an HTML file or template ID for the letter content.
Create and send a postcard via Lob. Provide recipient and sender addresses (as address IDs or inline address objects), plus HTML or template IDs for the front and back.
Headless calls still follow the integration read/write permission policy. Configure read/write defaults
with integrations:configure. Add --force only for trusted automation that should bypass that policy.