GitHub

Live

OAUTH 2.0

DEVELOPER TOOLS

Pull requests, issues, and your entire codebase live in GitHub. Your agent can read code, comment on PRs, and triage issues, scoped to the repos the user can access.

  • Acts as the user: Repository access and write actions stay tied to the GitHub account that authorized the agent.
  • Credentials stay vaulted: AES-256, resolved at request time, never in LLM context.
  • Scoped before every call: User permissions enforced. 90-day audit trail.
GitHub
agent · Acme Q3
Run
List all open PRs assigned to me that have been waiting for review more than 2 days.
S
github_pull_requests_list
69ms
GitHub agent
3 PRs awaiting your review: #412 (auth refactor, 3d), #408 (rate limit fix, 2d 4h), #401 (webhook handler, 4d).
Sources: 3 pull requests, 3 repos
githubmcp
3 PRs
18:29
Message Claude...

Tools your GitHub agent reaches for, scoped per user.

CALL ANY TOOL
Read repos, manage issues and PRs, search code, and trigger workflows. Same toolkit, every framework, no auth plumbing.
github_issues_list
List issues
List issues in a repository with optional filters for state, assignee, labels, and milestone.
Parameters
Name
Type
Required
Description
owner
string
Required
Repository owner (user or org)
repo
string
Required
Repository name
state
string
Optional
Issue state: open, closed, all
assignee
string
Optional
Filter by assignee username
labels
string
Optional
Comma-separated label names
github_issue_create
Create issue
github_pull_requests_list
List pull requests
github_code_search
Search code
github_repo_get
Get repository
github_workflow_run
Trigger workflow
Build your Agent
Drop the toolkit in, point it at the user, and your agent can manage GitHub issues, PRs, and code searches from the first run.
import { ScalekitClient } from "@scalekit-sdk/node";
import { DynamicStructuredTool } from "@langchain/core/tools";
import { createReactAgent } from "@langchain/langgraph/prebuilt";

const sk = new ScalekitClient(envUrl, clientId, clientSecret);

const { tools } = await sk.tools.listScopedTools("user_123", {
filter: { connectionNames: ["github"], toolNames: ["github_issues_list", "github_pull_requests_list", "github_code_search"] },
pageSize: 100,
});

const lcTools = tools.map((t) => new DynamicStructuredTool({
name: t.tool.definition.name,
description: t.tool.definition.description,
schema: t.tool.definition.input_schema,
func: async (args) => sk.tools.executeTool({
toolName: t.tool.definition.name, identifier: "user_123", toolInput: args,
}),
}));

const agent = createReactAgent({ llm, tools: lcTools });
import { ScalekitClient } from "@scalekit-sdk/node";
import OpenAI from "openai";

const sk = new ScalekitClient(envUrl, clientId, clientSecret);
const openai = new OpenAI();

const { tools } = await sk.tools.listScopedTools("user_123", {
filter: { connectionNames: ["github"], toolNames: ["github_issues_list", "github_pull_requests_list", "github_code_search"] },
pageSize: 100,
});

const llmTools = tools.map((t) => ({
type: "function",
function: {
name: t.tool.definition.name,
description: t.tool.definition.description,
parameters: t.tool.definition.input_schema,
},
}));

const resp = await openai.responses.create({
model: "gpt-4o", input: prompt, tools: llmTools,
});
import { ScalekitClient } from "@scalekit-sdk/node";
import Anthropic from "@anthropic-ai/sdk";

const sk = new ScalekitClient(envUrl, clientId, clientSecret);
const anthropic = new Anthropic();

const { tools } = await sk.tools.listScopedTools("user_123", {
filter: { connectionNames: ["github"], toolNames: ["github_issues_list", "github_pull_requests_list", "github_code_search"] },
pageSize: 100,
});

const llmTools = tools.map((t) => ({
name: t.tool.definition.name,
description: t.tool.definition.description,
input_schema: t.tool.definition.input_schema,
}));

const msg = await anthropic.messages.create({
model: "claude-sonnet-4-6", max_tokens: 1024,
tools: llmTools,
messages: [{ role: "user", content: prompt }],
});
import { Agent } from "@google/adk/agents";
import {
MCPToolset, StreamableHTTPConnectionParams,
} from "@google/adk/tools/mcp";

const toolset = new MCPToolset({
connectionParams: new StreamableHTTPConnectionParams({
url: "https://mcp.scalekit.com/github",
headers: { Authorization: `Bearer ${userScopedToken}` },
}),
});

const agent = new Agent({
name: "agent", model: "gemini-2.0-flash",
tools: await toolset.getTools(),
});
Try these prompts
Paste any prompt into your agent to start managing GitHub workflows.
Search & recall
Copy the prompt
Copied
List all open issues labeled [bug] in [repo].
Copy the prompt
Copied
Find all PRs assigned to me across my repos.
Copy the prompt
Copied
Search for [keyword] in the codebase of [repo].
Copy the prompt
Copied
Show me all closed issues from last sprint.
Action & creation
Copy the prompt
Copied
Create an issue in [repo]: [title] — [description].
Copy the prompt
Copied
Assign issue #[id] to [username].
Copy the prompt
Copied
Add label [bug] to issue #[id] in [repo].
Copy the prompt
Copied
Trigger the [workflow name] workflow on [branch].
Code & reviews
Copy the prompt
Copied
List all PRs waiting for review in [repo].
Copy the prompt
Copied
What issues are assigned to [username] in [repo]?
Copy the prompt
Copied
Show me all open issues with no assignee.
Copy the prompt
Copied
Find all PRs merged in the last 7 days.
SEE HOW AUTH WORKS
Users authorize GitHub once. Their account credentials stay vaulted, every call is checked, and every action is logged.
1
Authorize
Your user connects
GitHub
once. We tie it to their identity and the meetings they approved — no shared bot account, no org-wide access
Who:
user ‘A’
when:
Once per user
access:
A’s meetings only
2
Store
Their
GitHub
token lives in a vault scoped to them. User A's meetings are never reachable by an agent acting for user B, even on the same connection
vault:
encrypted
scope:
per-user
tokens:
auto-refreshed
3
Resolve
When your agent calls a
GitHub
tool, we fetch the right token server-side. It never touches your agent, never appears in the LLM context, never shows up in your logs
speed:
~40ms
check:
before every call
seen by:
nobody
4
Audit
Every
GitHub
tool call is logged — who triggered it, which meeting was fetched, what came back. 90 days of history, tied to the user who authorized it
history:
90 days
export:
SIEM-ready
logged:
every call
Test other agents
See the same per-user auth pattern across GitLab, Jira, and other developer tools connectors.
ENGINEERING
Auto-release notes agent
Group merged GitHub PRs by feature, fix, or chore and publish release notes per tag. No manual changelog grooming.
ENGINEERING
DevOps assistant agent
Triage GitHub incidents, open Linear tickets, and notify the on-call channel in Slack with context already attached.
ENGINEERING
Engineering standup agent
Aggregate GitHub and GitLab activity, link to Jira tickets, and post a daily standup digest to Slack. No async updates to chase.
Why Scalekit
Secure your agent's access. Connectors ship in minutes
Other connector libraries treat auth as a demo afterthought. Scalekit starts with user identity, scope enforcement, and audit.
01.
Shared tokens break per-user analytics
A shared token looks fine in a demo. In production every call looks like a service account. Scalekit resolves the real user credential so attribution, audit, and scope stay accurate.
// shared token
 audit → bot_service_account
 user_filter → broken

 // scalekit
 audit → user_abc
 scope → enforced ✓
02.
Authentication is not authorization
03.
Multi-tenancy is architectural
04.
GitHub today. Others tomorrow.
Capability
DIY
Scalekit AgentKit
Token storage
Build + maintain yourself
AES-256 vault, managed
Per-user isolation
Custom credential map
Per-tenant namespace, default
Scope enforcement
Manual checks or none
Per-request, pre-API call
Token refresh
Cron job you maintain
Automatic
Audit trail
Build your own logging
90-day, SIEM-exportable
New connector
New OAuth implementation
Same pattern, one config
Multi-framework
Per-framework adapter code
8 adapters included
“Our agents act across Salesforce, Gong, Google Drive, and more, on behalf of every customer. Scalekit behind the scenes meant we can keep adding tools without ever rebuilding how credentials or tool calling work.”
Venu Madhav Kattagoni
Head of Engineering / Von
Start in your coding agent
Up and running in one command
Install the Scalekit skill in your editor of choice. Connector, auth, tools, prompt, all wired up
Claude Code REPL
/plugin marketplace add scalekit-inc/claude-code-authstack
/plugin install agentkit@scalekit-auth-stack
Cursor Code REPL
# ~/.cursor/mcp.json
{
""mcpServers"": {
""github"": {
""url"": ""https://mcp.scalekit.com/github"",
""headers"": { ""Authorization"": ""Bearer $SCALEKIT_TOKEN"" }
}
}
}
Codex Code REPL
# ~/.codex/config.toml
[mcp_servers.github]
url = ""https://mcp.scalekit.com/github""
auth_env = ""SCALEKIT_TOKEN""
Copilot Code REPL
# .vscode/mcp.json
{
""servers"": {
""github"": {
""url"": ""https://mcp.scalekit.com/github"",
""type"": ""http""
}
}
}
Start in your coding agent
Up and running in one command
Install the Scalekit skill in your editor of choice. Connector, auth, tools, prompt, all wired up
Claude Code REPL
/plugin marketplace add scalekit-inc/claude-code-authstack
/plugin install agentkit@scalekit-auth-stack
Cursor Code REPL
# ~/.cursor/mcp.json
{
""mcpServers"": {
""github"": {
""url"": ""https://mcp.scalekit.com/github"",
""headers"": { ""Authorization"": ""Bearer $SCALEKIT_TOKEN"" }
}
}
}
Windsurf Code REPL
# ~/.cursor/mcp.json
{
""mcpServers"": {
""github"": {
""url"": ""https://mcp.scalekit.com/github"",
""headers"": { ""Authorization"": ""Bearer $SCALEKIT_TOKEN"" }
}
}
}
Codex Code REPL
# ~/.codex/config.toml
[mcp_servers.github]
url = ""https://mcp.scalekit.com/github""
auth_env = ""SCALEKIT_TOKEN""
Copilot Code REPL
# .vscode/mcp.json
{
""servers"": {
""github"": {
""url"": ""https://mcp.scalekit.com/github"",
""type"": ""http""
}
}
}