Skip to main content
Allowed domains control which external URLs your agents can fetch from when using the execute_code tool. This provides a security boundary that prevents agents from making requests to unauthorized endpoints.

How It Works

  1. Add domains at the organization level (e.g. api.example.com, data.internal.corp)
  2. Configure access — domains are available to all agents by default, or can be restricted to specific agents
  3. When an agent runs execute_code with await fetch(), only allowed domains are permitted

Managing Domains

Navigate to your organization’s Settings page to manage allowed domains.

Adding a Domain

Click Add Domain and enter the hostname. Accepted formats:
FormatExample
Standard hostnameapi.example.com
Subdomaindata.internal.example.com
Single-label hostnamelocalhost
IPv4 address192.168.1.100
IPv6 address::1
Domains are normalized to lowercase and stripped of whitespace.

Headers and Query Parameters

Each domain can have HTTP headers and query parameters that are automatically injected into all requests at runtime. This is useful for authentication. Use {{SECRET_NAME}} placeholders to reference encrypted secrets (created via Settings > Secrets) — they are resolved at runtime so plaintext values are never stored in domain config. Example: To authenticate with an API key header:
{
  "headers": {
    "Authorization": "Bearer {{API_KEY}}"
  }
}

Agent Access

By default, every agent in the organization can use a domain. If you need to restrict a domain to specific agents, you can set per-agent access via the API or MCP tools (set_collection_agents pattern).

Deleting a Domain

Deleting a domain removes it from the allowlist immediately. Agents will no longer be able to fetch from that domain.

Fallback Behavior

When no org-level domains are configured, agents fall back to the system-wide CUSTOM_SKILL_ALLOWED_DOMAINS environment variable (a comma-separated list of domains). Once your organization has at least one domain configured, the fallback is not used.

Permissions

ActionRequired Permission
View domainsorg:read
Add / update / delete domainsorg:update