Conversation
- Add JWT expiration check utility - Implement dynamic base URL resolution based on token environment - Add missing x-api-key and Authorization: Bearer headers - Add organizationId to ApiAuth schema - Add proactive token expiration warnings in CLI and model discovery
🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
|
This would have been nice to have, but kilo code blocked it. They only allow on their plugins or cli, so they might block you if you try. |
|
Would be cool if they add this! |
|
I saw somewhere that Kilo added support for Moltbot. So I think it's safe to say you can use their gateway :) |
00637c0 to
71e0ba2
Compare
f1ae801 to
08fa7f7
Compare
Why don't you try it and let us know? Just don't use your main account. |
|
I reached out to the Kilo team to clarify the Kilo Gateway TOS situation. Here's their response: Kilo has also migrated their cli to an OpenCode fork, which should significantly simplify integrating the Kilo Gateway into upstream OpenCode. See: https://github.com/kilo-Org/kilo Let me know if you need any help with the integration, @dzianisv! 👍 |
|
I used a different approach by directly integrating the package from Kilo: #13863 |
|
Thanks @micuintus! |
Summary

This PR adds support for Kilo Code as a new AI provider in opencode, complete with device authentication and dynamic model discovery.
Changes
Authentication (src/cli/cmd/auth.ts)
Model Discovery (src/provider/models.ts)
Provider Integration (src/provider/provider.ts)
Configuration (sst.config.ts)
Technical Details
Testing
The implementation includes proper error handling and fallback mechanisms. The device code flow supports the full OAuth2 standard with support for approval, denial, expiration, and timeout scenarios.
Breaking Changes
None. This is an additive feature that doesn't modify existing functionality.