What Are Models, Rules, and Tools?
Continue agents are built from three main types of configuration:Models
Language models that power different capabilities like chat, autocomplete, and agent mode
Rules
Guidelines and instructions that shape how the AI behaves and responds
Tools
MCP tools that provide additional capabilities like database access, web search, or custom functions
Local
Custom configurations you create and manage in your workspace or globally
Hub
Pre-built models, rules, and tools from the Continue community that you can import and use immediately
Local
Local configurations let you create custom models, rules, and tools that automatically apply to multiple agents, reducing duplication and ensuring consistency across your setup.Global
Applied to all agents across all workspaces. Ideal for personal preferences, universal coding standards, or tools you use everywhere.
Workspace
Applied automatically to all agents when working in a specific project.Perfect for project-specific setups like TypeScript rules for web apps or the Playwright MCP tool.
Hub
Continue hub uses a slug in the format ofowner/item-name
to resolve blocks.
For example, to use the Claude 4 Sonnet model, you’d reference it as anthropic/claude-4-sonnet
.
Import from the hub using the uses
syntax alongside your custom configurations:
config.yaml
Organization
Organize your local configurations using these directories:Models
.continue/models
Rules
.continue/rules
Tools
.continue/mcpServers
Working with Secrets
Models, and many MCP servers, require a secret for things like API keys. On the hub, you can configure secrets when adding a model or MCP server. This will use mustache notation to pass the secret, eg${{ secrets.SECRET_NAME }}
When configuring a local model or MCP server, you can use the same mustache notation for secrets which read from:
Global
.env
file in ~/.continue/.env
Workspace
.env
file at your project rootOverriding Properties
You can directly override properties using theoverride
syntax:
config.yaml
Advanced
Inputs
Models and MCP server authors can configure inputs that require the user to provide a secret value by defining a${{ inputs.SECRET_NAME }}
value.
For example, here is how you could require that the user provide a value for the apiKey
property on a model:
config.yaml
${{ secrets.SECRET_NAME }}
value that maps to a property name which matches the required input, e.g. SECRET_NAME
.
config.yaml
Next Steps
Now that you understand how models, rules, and tools work, explore:- Config Reference: Detailed documentation of all available properties
- Continue Hub: Browse community models, rules, and tools
- Custom Context Providers: Create advanced context integrations
- Model Roles: Understanding how different models work together