Z47, formerly Matrix Partners India, manages $3.5Bn across 100+ portfolio companies and 10 unicorns. They treat AI agents as production infrastructure, not pilots.
Every team member runs their own OpenClaw agent on their own data. The challenge wasn't adoption — it was the layer underneath: every agent had to act as a specific person, not a shared bot, with isolated credentials per account and every action attributable to the right human.


"Scalekit gave us the connectivity layer to ship our OpenClaw agents with confidence. Every agent now acts as its own user, calls each tool with the right scope, and we can see and control exactly what each one can do."

Every message stays scoped to the sender. The agent runs in their session, acts on their accounts, and every tool call is attributed to them.
Reads each user's Attio pipeline and drafts a tailored summary from their own deals. No shared data leakage.
Scans the user's Gmail or Outlook inbox and surfaces threads that need a response, ranked by urgency.
Pulls notes from Notion, relationship history from Affinity, and live web context via Brave, all under the user's own permissions.
Logs hours into Harvest under the right project, filed as the person who sent the message.
OpenClaw runs every agent inside its own per-user sandbox. Scalekit owns the identity layer, the credential vault, and every tool call leaving the agent. The sandbox never sees a real token.
Each agent authenticates with the user's own accounts via OAuth, never a shared service principal. Scalekit scopes tokens per user, per app, and refreshes them silently in the background.
When a new team member sends their first message, Scalekit generates per-service magic links. They tap once, complete OAuth, and the agent picks up where it left off. No admin intervention, no hardcoded tokens.
Team member sends their first message. OpenClaw spins up their sandbox and flags any tools the agent isn't authorized to use yet.
Scalekit generates a per-user, per-service magic link. The agent delivers it back over WhatsApp.
User taps the link and finishes OAuth in their browser. Scalekit captures the token, scoped to that account.
From here on, every call uses that user's credentials automatically. Zero maintenance, zero repeat steps.
The original deployment had a structural flaw: OpenClaw's config file held plaintext credential values any agent could read. A single compromised agent meant every other agent's keys were exposed.
Scalekit closes the gap. Each sandbox gets a unique client ID stored only in its own environment — no shared config, no cross-agent visibility. Suspend one ID, every other agent keeps running.
OpenClaw's central config holds only Scalekit identifiers, never raw tokens. No agent can read another agent's credentials by design.
Every sandbox gets a unique Scalekit client ID. Suspension is instant and surgical: revoke one ID, every other agent keeps running.
Every tool call is logged: which agent, which user, which action, which service. Total visibility into what happened, and on whose behalf.
Every team member gets their own agent, their own credentials, their own audit trail, without rebuilding the layer underneath. The agent framework runs the agent. Scalekit handles identity, scope, execution, and audit for every tool call leaving it.
Per-user session isolation across one shared runtime. OpenClaw delivers this out of the box: one process, N isolated agents, no cross-agent state.
Scalekit decouples secret storage from the agent runtime entirely. Sandboxes hold client IDs, not tokens. Scalekit resolves identity, fetches scoped tokens, and executes the tool call.
OAuth managed per user, per app. Every action taken as the person who triggered it. Never a shared bot with org-wide access.
Identity, scope, execution, audit. Handled across 20+ services. Ship production agents that act on behalf of every user, without rebuilding the layer underneath.



We use cookies, so things load fast, we learn what to fix, and you can always reach us on chat