OpenClaw · Skill
acpx
Use acpx as a headless ACP CLI for agent-to-agent communication, including prompt/exec/sessions workflows, session scoping, queueing, permissions, and output formats.
Install
Start with the primary install command. Alternate entrypoints are included below for ClawHub and OpenClaw CLI users.
Primary command
openclaw install openclaw/acpxClawHub installer
npx clawhub@latest install openclaw/acpxOpenClaw CLI
openclaw skills install openclaw/acpxWhat this skill does
Use acpx as a headless ACP CLI for agent-to-agent communication, including prompt/exec/sessions workflows, session scoping, queueing, permissions, and output formats.
Typical use cases
Install this skill when you want a reusable OpenClaw workflow with clearer instructions than a one-off prompt.
Source instructions
acpx
When to use this skill
Use this skill when you need to run coding agents through acpx, manage persistent ACP sessions, queue prompts, or consume structured agent output from scripts.
What acpx is
acpx is a headless, scriptable CLI client for the Agent Client Protocol (ACP). It is built for agent-to-agent communication over the command line and avoids PTY scraping.
Core capabilities:
- Persistent multi-turn sessions per repo/cwd
- One-shot execution mode (
exec) - Named parallel sessions (
-s/--session) - Queue-aware prompt submission with optional fire-and-forget (
--no-wait) - Cooperative cancel command (
cancel) for in-flight turns - Graceful cancellation via ACP
session/cancelon interrupt - Session control methods (
set-mode,set <key> <value>) - Agent reconnect/resume after dead subprocess detection
- Prompt input via stdin or
--file - Config files with global+project merge and
config show|init - Session metadata/history inspection (
sessions show,sessions history) - Local agent process checks via
status - Stable ACP client methods for filesystem and terminal requests
- Stable ACP
authenticatehandshake via env/config credentials - Structured streaming output (
text,json,quiet) with optional--suppress-reads - Built-in agent registry plus raw
--agentescape hatch
Install
npm i -g acpx
For normal session reuse, prefer a global install over npx.
Command model
prompt is the default verb.
acpx [global_options] [prompt_text...]
acpx [global_options] prompt [prompt_options] [prompt_text...]
acpx [global_options] exec [prompt_options] [prompt_text...]
acpx [global_options] cancel [-s <name>]
acpx [global_options] set-mode <mode> [-s <name>]
acpx [global_options] set <key> <value> [-s <name>]
acpx [global_options] status [-s <name>]
acpx [global_options] sessions [list | new [--name <name>] | close [name] | show [name] | history [name] [--limit <count>]]
acpx [global_options] config [show | init]
acpx [global_options] <agent> [prompt_options] [prompt_text...]
acpx [global_options] <agent> prompt [prompt_options] [prompt_text...]
acpx [global_options] <agent> exec [prompt_options] [prompt_text...]
acpx [global_options] <agent> cancel [-s <name>]
acpx [global_options] <agent> set-mode <mode> [-s <name>]
acpx [global_options] <agent> set <key> <value> [-s <name>]
acpx [global_options] <agent> status [-s <name>]
acpx [global_options] <agent> sessions [list | new [--name <name>] | close [name] | show [name] | history [name] [--limit <count>]]
If prompt text is omitted and stdin is piped, acpx reads prompt text from stdin.
Built-in agent registry
Friendly agent names resolve to commands:
pi->npx pi-acpopenclaw->openclaw acpcodex->npx @zed-industries/codex-acpclaude->npx -y @agentclientprotocol/claude-agent-acp(ACPX-owned package range)gemini->gemini --acpcursor->cursor-agent acpcopilot->copilot --acp --stdiodroid->droid exec --output-format acp(factory-droidandfactorydroidalso resolve todroid)iflow->iflow --experimental-acpkilocode->npx -y @kilocode/cli acpkimi->kimi acpkiro->kiro-cli-chat acpopencode->npx -y opencode-ai acpqoder->qodercli --acp
Forwards Qoder-native --allowed-tools and --max-turns startup flags from acpx session options.
qwen->qwen --acptrae->traecli acp serve
Rules:
- Default agent is
codexfor top-levelprompt,exec, andsessions. - Unknown positional agent tokens are treated as raw agent commands.
--agent <command>explicitly sets a raw ACP adapter command.- Do not combine a positional agent and
--agentin the same command.
Commands
Prompt (default, persistent session)
Implicit:
acpx codex 'fix flaky tests'
Explicit:
acpx codex prompt 'fix flaky tests'
acpx prompt 'fix flaky tests' # defaults to codex
Behavior:
- Uses a saved session for the session scope key
- Auto-resumes prior session when one exists for that scope
- If no session exists for the scope, exits with
NO_SESSIONand prompts forsessions new - Is queue-aware when another prompt is already running for the same session
- On interrupt during an active turn, sends ACP
session/cancelbefore force-kill fallback
Prompt options:
-s, --session <name>: use a named session within the same cwd--no-wait: enqueue and return immediately when session is already busy-f, --file <path>: read prompt text from file (-means stdin)
Exec (one-shot)
acpx exec 'summarize this repo'
acpx codex exec 'summarize this repo'
Behavior:
- Runs a single prompt in a temporary ACP session
- Does not reuse or save persistent session state
Cancel / Mode / Config / Model
acpx codex cancel
acpx codex set-mode auto
acpx codex set thought_level high
acpx codex set model gpt-5.4
Behavior:
cancel: sends cooperativesession/cancelthrough queue-owner IPC.set-mode: calls ACPsession/set_mode.set-modemode ids are adapter-defined; unsupported values are rejected by the adapter (oftenInvalid params).set: calls ACPsession/set_config_option.- For codex,
thought_levelis accepted as a compatibility alias for codex-acpreasoning_effort. --model <id>: Claude-compatible adapters may consume session creation metadata; other agents must advertise ACP models and supportsession/set_model, otherwiseacpxfails clearly instead of silently falling back.set model <id>: callssession/set_model. This is the generic ACP method for mid-session model switching.set-mode/setroute through queue-owner IPC when active, otherwise reconnect directly.
Sessions
acpx sessions
acpx sessions list
acpx sessions new
acpx sessions new --name backend
acpx sessions close
acpx sessions close backend
acpx sessions show
acpx sessions history --limit 20
acpx status
acpx codex sessions
acpx codex sessions new --name backend
acpx codex sessions close backend
acpx codex sessions show backend
acpx codex sessions history backend --limit 20
acpx codex status
Behavior:
sessionsandsessions listare equivalentnewcreates a fresh session for the current(agentCommand, cwd, optional name)scopenew --name <name>targets a named session scope- when
newreplaces an existing open session in that scope, the old one is soft-closed closetargets current cwd default sessionclose <name>targets current cwd named sessionshow [name]prints stored metadata for that scoped sessionhistory [name]prints stored turn history previews (default 20, use--limit)
Global options
--agent <command>: raw ACP agent command (escape hatch)--cwd <dir>: working directory for session scope (default: current directory)--approve-all: auto-approve all permission requests--approve-reads: auto-approve reads/searches, prompt for writes (default mode)--deny-all: deny all permission requests--format <fmt>: output format (text,json,quiet)--suppress-reads: suppress raw read-file contents while preserving the selected format--timeout <seconds>: max wait time (positive number)--ttl <seconds>: queue owner idle TTL before shutdown (default300,0disables TTL)--model <id>: request an agent model during session creation; non-Claude agents must advertise ACP models and supportsession/set_model--verbose: verbose ACP/debug logs to stderr
Permission flags are mutually exclusive.
Config files
Config files are merged in this order (later wins):
- global:
~/.acpx/config.json - project:
<cwd>/.acpxrc.json
Supported keys:
defaultAgentdefaultPermissions(approve-all,approve-reads,deny-all)ttl(seconds)timeout(seconds ornull)format(text,json,quiet)agentsmap (name -> { command, args? })authmap (authMethodId -> credential)
Use acpx config show to inspect the resolved config and acpx config init to create the global template.
For ACP authenticate handshakes, use either config auth entries or explicit ACPX_AUTH_<METHOD_ID> environment variables such as ACPX_AUTH_OPENAI_API_KEY. Ambient provider env vars such as OPENAI_API_KEY are still passed through to child agents, but they do not trigger ACP auth-method selection on their own.
Session behavior
Persistent prompt sessions are scoped by:
agentCommand- absolute
cwd - optional session
name
Persistence:
- Session records are stored in
~/.acpx/sessions/*.json. -s/--sessioncreates parallel named conversations in the same repo.- Changing
--cwdchanges scope and therefore session lookup. - closed sessions are retained on disk with
closed: trueandclosedAt. - auto-resume by scope skips closed sessions.
Resume behavior:
- Prompt mode attempts to reconnect to saved session.
- If adapter-side session is invalid/not found,
acpxcreates a fresh session and updates the saved record. - explicitly selected session records can still be resumed via
loadSessioneven if previously closed. - dead saved PIDs are detected and reconnected on the next prompt.
- each completed prompt stores lightweight turn history previews in the session record.
Prompt queueing and --no-wait
Queueing is per persistent session.
- The active
acpxprocess for a running prompt becomes the queue owner. - Other invocations submit prompts over local IPC.
- On Unix-like systems, queue IPC uses a Unix socket under
~/.acpx/queues/<hash>.sock. - Ownership is coordinated with a lock file under
~/.acpx/queues/<hash>.lock. - On Windows, named pipes are used instead of Unix sockets.
- after the queue drains, owner shutdown is governed by TTL (default 300s, configurable with
--ttl).
Submission behavior:
- Default: enqueue and wait for queued prompt completion, streaming updates back.
--no-wait: enqueue and return after queue acknowledgement.Ctrl+Cduring an active turn sends ACPsession/cancel, waits briefly, then force-kills only if cancellation does not finish in time.cancelsends the same cooperative cancellation without requiring terminal signals.
Output formats
Use --format <fmt>:
text(default): human-readable stream with updates/tool status and done linejson: NDJSON event stream (good for automation)quiet: final assistant text only--suppress-reads: replace raw read-file contents with[read output suppressed]intextandjsonoutput
Example automation:
acpx --format json codex exec 'review changed files' \
| jq -r 'select(.type=="tool_call") | [.status, .title] | @tsv'
Permission modes
--approve-all: no interactive permission prompts--approve-reads(default): approve reads/searches, prompt for writes--deny-all: deny all permission requests
If every permission request is denied/cancelled and none approved, acpx exits with permission-denied status.
Practical workflows
Persistent repo assistant:
acpx codex 'inspect failing tests and propose a fix plan'
acpx codex 'apply the smallest safe fix and run tests'
Parallel named streams:
acpx codex -s backend 'fix API pagination bug'
acpx codex -s docs 'draft changelog entry for release'
Queue follow-up without waiting:
acpx codex 'run full test suite and investigate failures'
acpx codex --no-wait 'after tests, summarize root causes and next steps'
One-shot script step:
acpx --format quiet exec 'summarize repo purpose in 3 lines'
Machine-readable output for orchestration:
acpx --format json codex 'review current branch changes' > events.ndjson
Raw custom adapter command:
acpx --agent './bin/custom-acp-server --profile ci' 'run validation checks'
Flow run:
acpx flow run ./my-flow.ts --input-file ./flow-input.json
acpx flow run examples/flows/branch.flow.ts --input-json '{"task":"FIX: add a regression test"}'
Repo-scoped review with permissive mode:
acpx --cwd ~/repos/shop --approve-all codex -s pr-842 \
'review PR #842 for regressions and propose minimal patch'