Setup: Connect Your Apps
Find the app
Scroll or search for the app you want to connect. Available connectors include Gmail, GitHub, Google Drive, Google Calendar, Google Contacts, Notion, Slack, Dropbox, Box, Linear, Supabase, Canva, and more.
Authorize OAuth
Your browser redirects to the app’s authorization page. Sign in and grant the requested permissions.Review the permission list carefully — this determines what Agent Mode can do with this app.
How Agent Mode Knows Which App to Use
When writing an Agent Mode prompt, mention the app explicitly:Permission Model
Agent Mode uses the OAuth scopes you granted when you connected each app. The agent inherits your authorization — it can only do what you explicitly permitted at connection time.| Connector type | What the agent can do |
|---|---|
| Read-only | Read data, retrieve information, search — but cannot create, modify, or delete |
| Read + Write | Full access within granted scopes: create, read, update, delete as permitted |
Connector Reference
| Connector | Agent can do |
|---|---|
| Gmail | Read emails, draft messages, send emails, search inbox |
| Google Drive | Create, read, and update docs; organize folders; move files |
| Google Calendar | Read events, check availability, create events, invite attendees |
| GitHub | Create issues, comment on PRs, search repos and code, create branches |
| Notion | Create and update pages, search workspace, manage databases |
| Slack | Send messages, read channels, post to specific channels |
| Supabase | Query tables, insert records (if write scope granted) |
| Linear | Create and update issues, list projects and team members |
| Dropbox | Read and upload files, create and manage folders |
| Box | Browse and read content, upload files (if write scope granted) |
| Google Contacts | Read contacts, create or update contact records |
Exact available permissions vary by connector. Some apps (e.g., GitHub) offer granular scope selection — choose which repositories to grant access to. Others grant access at the account level.
Minimal Permission Principle
Only grant the permissions Agent Mode actually needs for your intended use cases. Fewer permissions means a smaller impact if something goes wrong. Practical examples:- For a task that only reads your calendar → connect Google Calendar with read-only scope
- For a task that creates GitHub issues → connect GitHub with read + write issue permissions
- For a research task reading emails → connect Gmail read-only; no send access needed
Managing Connector Authorization
Refreshing a Connector
OAuth tokens expire over time. If Agent Mode reports it can’t access an app that was previously connected:- Go to Settings → Connectors
- Find the connector showing an error or “Reconnect needed”
- Click Disconnect → then Connect again
- Complete OAuth authorization — this issues a fresh token
Disconnecting a Connector
To remove an app’s access from ZeroTwo entirely:- Go to Settings → Connectors
- Click Disconnect next to the app
- ZeroTwo’s access is immediately revoked — Agent Mode can no longer use it
Safety Best Practices
- Start read-only — when first testing Agent Mode with a connector, grant read-only permissions. Confirm the agent reads data correctly before granting write access.
- Use minimal permissions — only grant the scopes the agent genuinely needs for your workflows.
- Review before approving — read every confirmation dialog before clicking Approve. The dialog shows exactly what will be done and to which resource.
- Revoke when not needed — disconnect connectors you’re not actively using with Agent Mode. You can always reconnect later.

