Use the TickTick CLI from KosmoKrator to call TickTick tools headlessly, return JSON, inspect schemas, and automate workflows from coding agents, scripts, and CI.
TickTick is discoverable, but headless credential setup is not fully supported yet.
Headless setup is limited for this integration. It remains documented because stored credentials or future proxy-backed execution can still make the runtime useful.
# Install KosmoKrator first if it is not available on PATH.curl -fsSL https://raw.githubusercontent.com/OpenCompanyApp/kosmokrator/main/install.sh | bash# Configure and verify this integration.kosmokrator integrations:configure ticktick --set access_token="$TICKTICK_ACCESS_TOKEN" --enable --read allow --write ask --jsonkosmokrator integrations:doctor ticktick --jsonkosmokrator integrations:status --json
Credentials
Authentication type: OAuth browser flowoauth2_authorization_code. Configure credentials once, then use the same stored profile from
scripts, coding CLIs, Lua code mode, and the MCP gateway.
Key
Env var
Type
Required
Label
access_token
TICKTICK_ACCESS_TOKEN
OAuth token oauth
yes
Access Token
Call TickTick Headlessly
Use the generic call form when another coding CLI or script needs a stable universal interface.
Every function below can be called headlessly. The generic form is stable across all integrations;
the provider shortcut is shorter but specific to TickTick.
ticktick.ticktick_list_projects
Read read
List all TickTick projects (task lists). Returns project names, IDs, and metadata. Use this first to discover available projects before working with tasks.
Use these parameter tables when building CLI payloads without calling integrations:schema first.
ticktick.ticktick_list_projects
List all TickTick projects (task lists). Returns project names, IDs, and metadata. Use this first to discover available projects before working with tasks.
Headless calls still follow the integration read/write permission policy. Configure read/write defaults
with integrations:configure. Add --force only for trusted automation that should bypass that policy.