Dynamo Software

Live

API KEY

ALTERNATIVE INVESTMENTS

Every deal, fund, and investor relationship your team manages lives in Dynamo. Dynamo Software MCP gives your agent authenticated access to deal flow and portfolio data scoped to the user who authorized it.

  • Acts as the user: Access and write actions stay tied to the Dynamo Software account that authorized the agent.
  • Credentials stay vaulted: AES-256, resolved at request time, never in LLM context.
  • Scoped before every call: User permissions enforced. 90-day audit trail.
Dynamo Software
agent · Acme Q3
Run
Which deals in our pipeline are past their next review date and need updates?
S
dynamo_deals_list
87ms
Investment management agent
6 deals overdue for review. Acme Fund III ($85M, 18d past), Globex Ventures ($42M, 12d), Initech Capital ($67M, 9d), Stark Growth ($23M, 21d), Umbrella PE ($105M, 7d), Wayne ($33M, 14d).
Sources: 6 deals, active pipeline, review overdue
dynamomcp
6 deals
18:29
Message Claude...

Tools your investment management agent reaches for on Dynamo Software, scoped per user.

CALL ANY TOOL
List deals and funds, retrieve financials, create notes, and track investor activities.
dynamo_deals_list
List deals
List Dynamo deals with stage, fund, and date filters.
Parameters
Name
Type
Required
Description
stage
string
Optional
Deal stage filter
fund_id
string
Optional
Fund ID filter
limit
integer
Optional
Max deals to return
dynamo_deal_get
Get deal
dynamo_funds_list
List funds
dynamo_contacts_list
List contacts
dynamo_notes_create
Create note
dynamo_activities_list
List activities
Build your Agent
Drop the toolkit in, point it at the user, and your investment management agent can use Dynamo Software from the first run.
import { ScalekitClient } from "@scalekit-sdk/node";
import { DynamicStructuredTool } from "@langchain/core/tools";
import { createReactAgent } from "@langchain/langgraph/prebuilt";
import { z } from "zod";

const sk = new ScalekitClient(envUrl, clientId, clientSecret);

const { tools } = await sk.tools.listScopedTools("user_123", {
filter: { connectionNames: ["dynamo"], toolNames: ["dynamo_deals_list", "dynamo_deal_get", "dynamo_funds_list"] },
pageSize: 100,
});

const lcTools = tools.map((t) => new DynamicStructuredTool({
name: t.tool.definition.name,
description: t.tool.definition.description,
schema: z.object({}).passthrough(),
func: async (args) => {
const { data } = await sk.tools.executeTool({
toolName: t.tool.definition.name,
identifier: "user_123",
params: args,
});
return JSON.stringify(data);
},
}));

const agent = createReactAgent({ llm, tools: lcTools });
import { ScalekitClient } from "@scalekit-sdk/node";
import OpenAI from "openai";

const sk = new ScalekitClient(envUrl, clientId, clientSecret);
const openai = new OpenAI();

const { tools } = await sk.tools.listScopedTools("user_123", {
filter: { connectionNames: ["dynamo"], toolNames: ["dynamo_deals_list", "dynamo_deal_get", "dynamo_funds_list"] },
pageSize: 100,
});

const llmTools = tools.map((t) => ({
type: "function",
function: {
name: t.tool.definition.name,
description: t.tool.definition.description,
parameters: t.tool.definition.input_schema,
},
}));

const resp = await openai.responses.create({
model: "gpt-4o", input: prompt, tools: llmTools,
});
import { ScalekitClient } from "@scalekit-sdk/node";
import Anthropic from "@anthropic-ai/sdk";

const sk = new ScalekitClient(envUrl, clientId, clientSecret);
const anthropic = new Anthropic();

const { tools } = await sk.tools.listScopedTools("user_123", {
filter: { connectionNames: ["dynamo"], toolNames: ["dynamo_deals_list", "dynamo_deal_get", "dynamo_funds_list"] },
pageSize: 100,
});

const llmTools = tools.map((t) => ({
name: t.tool.definition.name,
description: t.tool.definition.description,
input_schema: t.tool.definition.input_schema,
}));

const msg = await anthropic.messages.create({
model: "claude-sonnet-4-6", max_tokens: 1024,
tools: llmTools,
messages: [{ role: "user", content: prompt }],
});
import { Agent } from "@google/adk/agents";
import {
MCPToolset, StreamableHTTPConnectionParams,
} from "@google/adk/tools/mcp";

const toolset = new MCPToolset({
connectionParams: new StreamableHTTPConnectionParams({
url: "https://mcp.scalekit.com/dynamo",
headers: { Authorization: `Bearer ${userScopedToken}` },
}),
});

const agent = new Agent({
name: "agent", model: "gemini-2.0-flash",
tools: await toolset.getTools(),
});
Try these prompts
Paste any prompt into your agent to start using Dynamo Software.
Search & recall
Copy the prompt
Copied
List all deals in [stage] stage.
Copy the prompt
Copied
Show me deals for fund [fund name].
Copy the prompt
Copied
Find contacts at [company name].
Copy the prompt
Copied
Get deal details for [deal name].
Action & notes
Copy the prompt
Copied
Add a note to deal [id]: [content].
Copy the prompt
Copied
Log a call with [contact] on deal [id].
Copy the prompt
Copied
Create a meeting note for fund [name].
Copy the prompt
Copied
Update stage on deal [id] to [stage].
Portfolio & reporting
Copy the prompt
Copied
Which deals close this quarter?
Copy the prompt
Copied
List funds with AUM over $100M.
Copy the prompt
Copied
Show deals with no activity in 30+ days.
Copy the prompt
Copied
Total pipeline value by stage.
SEE HOW AUTH WORKS
Users authorize Dynamo Software once. Their credentials stay vaulted, every call is checked, and every action is logged.
1
Authorize
Your user connects
Dynamo Software
once. We tie it to their identity and the meetings they approved — no shared bot account, no org-wide access
Who:
user ‘A’
when:
Once per user
access:
Limited to user
2
Store
Their
Dynamo Software
token lives in a vault scoped to them. User A's meetings are never reachable by an agent acting for user B, even on the same connection
vault:
encrypted
scope:
per-user
tokens:
auto-refreshed
3
Resolve
When your agent calls a
Dynamo Software
tool, we fetch the right token server-side. It never touches your agent, never appears in the LLM context, never shows up in your logs
speed:
~40ms
check:
before every call
seen by:
nobody
4
Audit
Every
Dynamo Software
tool call is logged — who triggered it, which meeting was fetched, what came back. 90 days of history, tied to the user who authorized it
history:
90 days
export:
SIEM-ready
logged:
every call
Test other agents
Same per-user auth pattern across other investment management agents and MCP connectors. Working code, live demos, fork what fits.
GTM
CRM AI agent
Log calls, update opportunity stages, and surface stalled deals across HubSpot or Salesforce. No manual data entry.
SALES
Deal intelligence agent
Combine Gong, Attio, and Slack signals to surface deal risks and next-best actions. Updated after every call.
Why Scalekit
Secure your agent's access. Connectors ship in minutes
Other connector libraries treat auth as a demo afterthought. Scalekit starts with user identity, scope enforcement, and audit.
01.
Deal data surfaced without fund-level scope
A shared Dynamo API key looks fine in a demo. In production, every deal lookup and fund query is attributed to a service account. Fund-level visibility rules collapse. Scalekit resolves the user's key so deal access reflects the right analyst role.
// shared API key
key = "dynamo_shared_xxx"
audit → bot_service_account
fund_filter → broken

// scalekit · per-user
key = resolve(user_id)
audit → user_abc
scope → enforced ✓
02.
Authentication is not authorization
03.
Multi-tenancy is architectural
04.
Dynamo Software today. Others tomorrow.
“Our agents act across Salesforce, Gong, Google Drive, and more, on behalf of every customer. Scalekit behind the scenes meant we can keep adding tools without ever rebuilding how credentials or tool calling work.”
Venu Madhav Kattagoni
Head of Engineering / Von
Frequently Asked Questions
Does the agent access Dynamo Software as the user or as a shared key?
As the user. Each workspace member authorizes once and Scalekit resolves their credential at request time. Audit logs attribute every action to that user, not a shared service account.
Where is the Dynamo Software api key stored?
Can I limit what the agent is allowed to do in Dynamo Software?
What happens when a user revokes Dynamo Software access?
Does the agent respect deal-level visibility rules for junior analysts?
Start in your coding agent
Up and running in one command
Install the Scalekit skill in your editor of choice. Connector, auth, tools, prompt, all wired up
Claude Code REPL
/plugin marketplace add scalekit-inc/claude-code-authstack
/plugin install agentkit@scalekit-auth-stack
Cursor Code REPL
# ~/.cursor/mcp.json
{
""mcpServers"": {
""dynamo"": {
""url"": ""https://mcp.scalekit.com/dynamo"",
""headers"": { ""Authorization"": ""Bearer $SCALEKIT_TOKEN"" }
}
}
}
Codex Code REPL
# ~/.codex/config.toml
[mcp_servers.dynamo]
url = ""https://mcp.scalekit.com/dynamo""
auth_env = ""SCALEKIT_TOKEN""
Copilot Code REPL
# .vscode/mcp.json
{
""servers"": {
""dynamo"": {
""url"": ""https://mcp.scalekit.com/dynamo"",
""type"": ""http""
}
}
}