Use the Vero CLI from KosmoKrator to call Vero tools headlessly, return JSON, inspect schemas, and automate workflows from coding agents, scripts, and CI.
Vero can be configured headlessly with `kosmokrator integrations:configure vero`.
# Install KosmoKrator first if it is not available on PATH.curl -fsSL https://raw.githubusercontent.com/OpenCompanyApp/kosmokrator/main/install.sh | bash# Configure and verify this integration.kosmokrator integrations:configure vero --set auth_token="$VERO_AUTH_TOKEN" --enable --read allow --write ask --jsonkosmokrator integrations:doctor vero --jsonkosmokrator integrations:status --json
Credentials
Authentication type: API tokenapi_token. Configure credentials once, then use the same stored profile from
scripts, coding CLIs, Lua code mode, and the MCP gateway.
Key
Env var
Type
Required
Label
auth_token
VERO_AUTH_TOKEN
Secret secret
yes
Auth Token
url
VERO_URL
URL url
no
API Base URL
Call Vero Headlessly
Use the generic call form when another coding CLI or script needs a stable universal interface.
Every function below can be called headlessly. The generic form is stable across all integrations;
the provider shortcut is shorter but specific to Vero.
vero.vero_get_current_user
Read read
Get the profile of the currently authenticated Vero user. Useful for verifying API connectivity and checking account details.
Identify (create or update) a user in Vero. Pass a unique user ID, email, optional name, and any custom attributes in the data object. This creates the user if they don't exist, or updates their profile if they do.
Track a behavioral event for a user in Vero. Events can trigger automated email campaigns. Pass a user identity (ID or email), event name, and optional event data.
Identify (create or update) a user in Vero. Pass a unique user ID, email, optional name, and any custom attributes in the data object. This creates the user if they don't exist, or updates their profile if they do.
Track a behavioral event for a user in Vero. Events can trigger automated email campaigns. Pass a user identity (ID or email), event name, and optional event data.
Attributes to update as key-value pairs (e.g., {"plan": "enterprise", "company": "Acme Inc"}).
Permissions
Headless calls still follow the integration read/write permission policy. Configure read/write defaults
with integrations:configure. Add --force only for trusted automation that should bypass that policy.