Scalekit Auth Plugins for OpenAI Codex — the auth stack for agents.
-Add SSO, SCIM, MCP Auth, agent auth, and tool-calling to your Codex projects.
+
Scalekit Auth Stack for OpenAI Codex — AgentKit and SaaSKit plugins.
+Add agent auth, tool calling, SSO, SCIM, MCP auth, and session management to your Codex projects.
[](./LICENSE)
[](https://github.com/scalekit-inc/codex-authstack/pulls)
@@ -14,19 +14,16 @@ Add SSO, SCIM, MCP Auth, agent auth, and tool-calling to your Codex projects.
Connections`
-2. Create the connector
-3. Save the connection name
-4. Reuse that exact connection name in code
-
-## Working Checklist
-
-```text
-Agent Auth Integration:
-- [ ] Install the SDK and initialize the client
-- [ ] Create or fetch a connected account
-- [ ] Send the user through authorization if needed
-- [ ] Fetch the connected account again before API use
-- [ ] Use the access token against the third-party API
-```
-
-## Node.js Pattern
-
-```ts
-import { ScalekitClient } from '@scalekit-sdk/node';
-
-const client = new ScalekitClient(
- process.env.SCALEKIT_ENV_URL!,
- process.env.SCALEKIT_CLIENT_ID!,
- process.env.SCALEKIT_CLIENT_SECRET!
-);
-
-const response = await client.connectedAccounts.getOrCreateConnectedAccount({
- connector: 'gmail',
- identifier: 'user_123',
-});
-
-const connectedAccount = response.connectedAccount;
-
-if (connectedAccount?.status !== 'ACTIVE') {
- const linkResponse =
- await client.connectedAccounts.getMagicLinkForConnectedAccount({
- connector: 'gmail',
- identifier: 'user_123',
- });
-
- console.log(linkResponse.link);
-}
-```
-
-## Python Pattern
-
-```python
-import os
-import scalekit.client
-
-client = scalekit.client.ScalekitClient(
- client_id=os.getenv("SCALEKIT_CLIENT_ID"),
- client_secret=os.getenv("SCALEKIT_CLIENT_SECRET"),
- env_url=os.getenv("SCALEKIT_ENV_URL"),
-)
-
-response = client.actions.get_or_create_connected_account(
- connection_name="gmail",
- identifier="user_123",
-)
-connected_account = response.connected_account
-```
-
-## Token Usage Rule
-
-Always refresh your view of the connected account immediately before making the downstream API call. Scalekit can refresh tokens automatically, and stale cached account objects are a common source of confusion.
-
-## Practical Review Points
-
-- Make sure the dashboard connection name and the code-side connector identifier match.
-- In web apps, redirect users to the authorization link instead of only printing it.
-- For agent workflows, keep user identity stable so the same person maps to the same connected account record.
-- Review token handling separately from third-party API logic so auth failures are easy to isolate.
diff --git a/plugins/agentkit/.codex-plugin/plugin.json b/plugins/agentkit/.codex-plugin/plugin.json
new file mode 100644
index 0000000..62612d8
--- /dev/null
+++ b/plugins/agentkit/.codex-plugin/plugin.json
@@ -0,0 +1,33 @@
+{
+ "name": "agentkit",
+ "version": "2.0.0",
+ "description": "Authentication for AI agents. OAuth flows, token vault, 40+ connectors, tool discovery, and live testing.",
+ "author": {
+ "name": "Scalekit Inc",
+ "email": "support@scalekit.com",
+ "url": "https://scalekit.com"
+ },
+ "homepage": "https://docs.scalekit.com/agentkit/overview.md",
+ "repository": "https://github.com/scalekit-inc/codex-authstack",
+ "license": "MIT",
+ "keywords": ["scalekit", "agentkit", "agent-auth", "oauth", "connectors", "tool-calling"],
+ "skills": "./skills/",
+ "mcpServers": "./.mcp.json",
+ "interface": {
+ "displayName": "AgentKit",
+ "shortDescription": "Connect agents to third-party apps safely.",
+ "longDescription": "Authentication for AI agents. OAuth flows, token vault, 40+ connectors (Gmail, Slack, Salesforce, etc.), tool discovery, and live testing — so agents can act on behalf of users.",
+ "developerName": "Scalekit",
+ "category": "Agent Auth",
+ "capabilities": ["Interactive", "Write"],
+ "websiteURL": "https://docs.scalekit.com/agentkit/overview.md",
+ "privacyPolicyURL": "https://www.scalekit.com/privacy",
+ "termsOfServiceURL": "https://www.scalekit.com/terms",
+ "defaultPrompt": [
+ "Integrate AgentKit for Gmail or Slack.",
+ "Set up a connected account flow for this agent.",
+ "Discover available tools for a connector."
+ ],
+ "brandColor": "#1D4ED8"
+ }
+}
diff --git a/plugins/agent-auth/.mcp.json b/plugins/agentkit/.mcp.json
similarity index 100%
rename from plugins/agent-auth/.mcp.json
rename to plugins/agentkit/.mcp.json
diff --git a/plugins/agentkit/README.md b/plugins/agentkit/README.md
new file mode 100644
index 0000000..9ceef6e
--- /dev/null
+++ b/plugins/agentkit/README.md
@@ -0,0 +1,27 @@
+# AgentKit for Codex
+
+Authentication for AI agents. This plugin brings Scalekit AgentKit into Codex so agents can connect users to third-party apps, discover the right tools, and execute authenticated tool calls on their behalf.
+
+AgentKit handles the full OAuth lifecycle — authorization, token vault, and automatic refresh — across 40+ connectors (Gmail, Slack, Salesforce, Notion, and more).
+
+## Skills
+
+- `integrating-agentkit` — Core integration: SDK setup, connected accounts, OAuth flows, token fetching, downstream API calls, and agent framework examples.
+- `discovering-connector-tools` — Uses live AgentKit metadata to find tools, inspect schemas, and narrow the tool set.
+- `testing-agentkit-tools` — Generates authorization links, fetches live tool metadata, and executes tools.
+- `exposing-agentkit-via-mcp` — Exposes AgentKit tools through MCP for MCP-compatible runtimes.
+- `production-readiness-agentkit` — Structured production readiness checklist for AgentKit integrations.
+
+## Configuration
+
+Required environment variables:
+
+- `SCALEKIT_ENV_URL`
+- `SCALEKIT_CLIENT_ID`
+- `SCALEKIT_CLIENT_SECRET`
+
+## Links
+
+- [AgentKit overview](https://docs.scalekit.com/agentkit/overview.md)
+- [AgentKit quickstart](https://docs.scalekit.com/agentkit/quickstart.md)
+- [LLM docs map](https://docs.scalekit.com/llms.txt)
diff --git a/plugins/agent-auth/references/agent-connectors/README.md b/plugins/agentkit/references/agent-connectors/README.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/README.md
rename to plugins/agentkit/references/agent-connectors/README.md
diff --git a/plugins/agent-auth/references/agent-connectors/airtable.md b/plugins/agentkit/references/agent-connectors/airtable.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/airtable.md
rename to plugins/agentkit/references/agent-connectors/airtable.md
diff --git a/plugins/agent-auth/references/agent-connectors/asana.md b/plugins/agentkit/references/agent-connectors/asana.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/asana.md
rename to plugins/agentkit/references/agent-connectors/asana.md
diff --git a/plugins/agent-auth/references/agent-connectors/attention.md b/plugins/agentkit/references/agent-connectors/attention.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/attention.md
rename to plugins/agentkit/references/agent-connectors/attention.md
diff --git a/plugins/agent-auth/references/agent-connectors/bigquery.md b/plugins/agentkit/references/agent-connectors/bigquery.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/bigquery.md
rename to plugins/agentkit/references/agent-connectors/bigquery.md
diff --git a/plugins/agent-auth/references/agent-connectors/chorus.md b/plugins/agentkit/references/agent-connectors/chorus.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/chorus.md
rename to plugins/agentkit/references/agent-connectors/chorus.md
diff --git a/plugins/agent-auth/references/agent-connectors/clari_copilot.md b/plugins/agentkit/references/agent-connectors/clari_copilot.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/clari_copilot.md
rename to plugins/agentkit/references/agent-connectors/clari_copilot.md
diff --git a/plugins/agent-auth/references/agent-connectors/clickup.md b/plugins/agentkit/references/agent-connectors/clickup.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/clickup.md
rename to plugins/agentkit/references/agent-connectors/clickup.md
diff --git a/plugins/agent-auth/references/agent-connectors/confluence.md b/plugins/agentkit/references/agent-connectors/confluence.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/confluence.md
rename to plugins/agentkit/references/agent-connectors/confluence.md
diff --git a/plugins/agent-auth/references/agent-connectors/dropbox.md b/plugins/agentkit/references/agent-connectors/dropbox.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/dropbox.md
rename to plugins/agentkit/references/agent-connectors/dropbox.md
diff --git a/plugins/agent-auth/references/agent-connectors/fathom.md b/plugins/agentkit/references/agent-connectors/fathom.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/fathom.md
rename to plugins/agentkit/references/agent-connectors/fathom.md
diff --git a/plugins/agent-auth/references/agent-connectors/freshdesk.md b/plugins/agentkit/references/agent-connectors/freshdesk.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/freshdesk.md
rename to plugins/agentkit/references/agent-connectors/freshdesk.md
diff --git a/plugins/agent-auth/references/agent-connectors/github.md b/plugins/agentkit/references/agent-connectors/github.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/github.md
rename to plugins/agentkit/references/agent-connectors/github.md
diff --git a/plugins/agent-auth/references/agent-connectors/gmail.md b/plugins/agentkit/references/agent-connectors/gmail.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/gmail.md
rename to plugins/agentkit/references/agent-connectors/gmail.md
diff --git a/plugins/agent-auth/references/agent-connectors/gong.md b/plugins/agentkit/references/agent-connectors/gong.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/gong.md
rename to plugins/agentkit/references/agent-connectors/gong.md
diff --git a/plugins/agent-auth/references/agent-connectors/google_ads.md b/plugins/agentkit/references/agent-connectors/google_ads.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/google_ads.md
rename to plugins/agentkit/references/agent-connectors/google_ads.md
diff --git a/plugins/agent-auth/references/agent-connectors/google_docs.md b/plugins/agentkit/references/agent-connectors/google_docs.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/google_docs.md
rename to plugins/agentkit/references/agent-connectors/google_docs.md
diff --git a/plugins/agent-auth/references/agent-connectors/google_drive.md b/plugins/agentkit/references/agent-connectors/google_drive.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/google_drive.md
rename to plugins/agentkit/references/agent-connectors/google_drive.md
diff --git a/plugins/agent-auth/references/agent-connectors/google_forms.md b/plugins/agentkit/references/agent-connectors/google_forms.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/google_forms.md
rename to plugins/agentkit/references/agent-connectors/google_forms.md
diff --git a/plugins/agent-auth/references/agent-connectors/google_meets.md b/plugins/agentkit/references/agent-connectors/google_meets.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/google_meets.md
rename to plugins/agentkit/references/agent-connectors/google_meets.md
diff --git a/plugins/agent-auth/references/agent-connectors/google_sheets.md b/plugins/agentkit/references/agent-connectors/google_sheets.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/google_sheets.md
rename to plugins/agentkit/references/agent-connectors/google_sheets.md
diff --git a/plugins/agent-auth/references/agent-connectors/google_slides.md b/plugins/agentkit/references/agent-connectors/google_slides.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/google_slides.md
rename to plugins/agentkit/references/agent-connectors/google_slides.md
diff --git a/plugins/agent-auth/references/agent-connectors/googlecalendar.md b/plugins/agentkit/references/agent-connectors/googlecalendar.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/googlecalendar.md
rename to plugins/agentkit/references/agent-connectors/googlecalendar.md
diff --git a/plugins/agent-auth/references/agent-connectors/hubspot.md b/plugins/agentkit/references/agent-connectors/hubspot.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/hubspot.md
rename to plugins/agentkit/references/agent-connectors/hubspot.md
diff --git a/plugins/agent-auth/references/agent-connectors/intercom.md b/plugins/agentkit/references/agent-connectors/intercom.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/intercom.md
rename to plugins/agentkit/references/agent-connectors/intercom.md
diff --git a/plugins/agent-auth/references/agent-connectors/jira.md b/plugins/agentkit/references/agent-connectors/jira.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/jira.md
rename to plugins/agentkit/references/agent-connectors/jira.md
diff --git a/plugins/agent-auth/references/agent-connectors/linear.md b/plugins/agentkit/references/agent-connectors/linear.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/linear.md
rename to plugins/agentkit/references/agent-connectors/linear.md
diff --git a/plugins/agent-auth/references/agent-connectors/microsoft_excel.md b/plugins/agentkit/references/agent-connectors/microsoft_excel.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/microsoft_excel.md
rename to plugins/agentkit/references/agent-connectors/microsoft_excel.md
diff --git a/plugins/agent-auth/references/agent-connectors/microsoft_teams.md b/plugins/agentkit/references/agent-connectors/microsoft_teams.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/microsoft_teams.md
rename to plugins/agentkit/references/agent-connectors/microsoft_teams.md
diff --git a/plugins/agent-auth/references/agent-connectors/microsoft_word.md b/plugins/agentkit/references/agent-connectors/microsoft_word.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/microsoft_word.md
rename to plugins/agentkit/references/agent-connectors/microsoft_word.md
diff --git a/plugins/agent-auth/references/agent-connectors/monday.md b/plugins/agentkit/references/agent-connectors/monday.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/monday.md
rename to plugins/agentkit/references/agent-connectors/monday.md
diff --git a/plugins/agent-auth/references/agent-connectors/notion.md b/plugins/agentkit/references/agent-connectors/notion.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/notion.md
rename to plugins/agentkit/references/agent-connectors/notion.md
diff --git a/plugins/agent-auth/references/agent-connectors/onedrive.md b/plugins/agentkit/references/agent-connectors/onedrive.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/onedrive.md
rename to plugins/agentkit/references/agent-connectors/onedrive.md
diff --git a/plugins/agent-auth/references/agent-connectors/onenote.md b/plugins/agentkit/references/agent-connectors/onenote.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/onenote.md
rename to plugins/agentkit/references/agent-connectors/onenote.md
diff --git a/plugins/agent-auth/references/agent-connectors/outlook.md b/plugins/agentkit/references/agent-connectors/outlook.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/outlook.md
rename to plugins/agentkit/references/agent-connectors/outlook.md
diff --git a/plugins/agent-auth/references/agent-connectors/salesforce.md b/plugins/agentkit/references/agent-connectors/salesforce.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/salesforce.md
rename to plugins/agentkit/references/agent-connectors/salesforce.md
diff --git a/plugins/agent-auth/references/agent-connectors/servicenow.md b/plugins/agentkit/references/agent-connectors/servicenow.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/servicenow.md
rename to plugins/agentkit/references/agent-connectors/servicenow.md
diff --git a/plugins/agent-auth/references/agent-connectors/sharepoint.md b/plugins/agentkit/references/agent-connectors/sharepoint.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/sharepoint.md
rename to plugins/agentkit/references/agent-connectors/sharepoint.md
diff --git a/plugins/agent-auth/references/agent-connectors/slack.md b/plugins/agentkit/references/agent-connectors/slack.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/slack.md
rename to plugins/agentkit/references/agent-connectors/slack.md
diff --git a/plugins/agent-auth/references/agent-connectors/snowflake.md b/plugins/agentkit/references/agent-connectors/snowflake.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/snowflake.md
rename to plugins/agentkit/references/agent-connectors/snowflake.md
diff --git a/plugins/agent-auth/references/agent-connectors/trello.md b/plugins/agentkit/references/agent-connectors/trello.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/trello.md
rename to plugins/agentkit/references/agent-connectors/trello.md
diff --git a/plugins/agent-auth/references/agent-connectors/zendesk.md b/plugins/agentkit/references/agent-connectors/zendesk.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/zendesk.md
rename to plugins/agentkit/references/agent-connectors/zendesk.md
diff --git a/plugins/agent-auth/references/agent-connectors/zoom.md b/plugins/agentkit/references/agent-connectors/zoom.md
similarity index 100%
rename from plugins/agent-auth/references/agent-connectors/zoom.md
rename to plugins/agentkit/references/agent-connectors/zoom.md
diff --git a/plugins/agent-auth/references/byoc.md b/plugins/agentkit/references/byoc.md
similarity index 100%
rename from plugins/agent-auth/references/byoc.md
rename to plugins/agentkit/references/byoc.md
diff --git a/plugins/agent-auth/references/code-samples.md b/plugins/agentkit/references/code-samples.md
similarity index 100%
rename from plugins/agent-auth/references/code-samples.md
rename to plugins/agentkit/references/code-samples.md
diff --git a/plugins/agent-auth/references/connected-accounts.md b/plugins/agentkit/references/connected-accounts.md
similarity index 100%
rename from plugins/agent-auth/references/connected-accounts.md
rename to plugins/agentkit/references/connected-accounts.md
diff --git a/plugins/agent-auth/references/connections.md b/plugins/agentkit/references/connections.md
similarity index 100%
rename from plugins/agent-auth/references/connections.md
rename to plugins/agentkit/references/connections.md
diff --git a/plugins/agent-auth/references/providers.md b/plugins/agentkit/references/providers.md
similarity index 100%
rename from plugins/agent-auth/references/providers.md
rename to plugins/agentkit/references/providers.md
diff --git a/plugins/agent-auth/references/redirects.md b/plugins/agentkit/references/redirects.md
similarity index 100%
rename from plugins/agent-auth/references/redirects.md
rename to plugins/agentkit/references/redirects.md
diff --git a/plugins/agentkit/skills/discovering-connector-tools/SKILL.md b/plugins/agentkit/skills/discovering-connector-tools/SKILL.md
new file mode 100644
index 0000000..1796077
--- /dev/null
+++ b/plugins/agentkit/skills/discovering-connector-tools/SKILL.md
@@ -0,0 +1,55 @@
+---
+name: discovering-connector-tools
+description: Discovers live tools for a Scalekit AgentKit connector and explains their input and output schemas. Use when a user asks what tools are available for Gmail, Slack, Salesforce, or another connector, wants to inspect input_schema or output_schema, or needs help narrowing the tool set for an agent.
+---
+
+# Discovering Connector Tools
+
+Use live AgentKit metadata as the source of truth for tool names, required inputs, and output schemas.
+
+Do not rely on the static connector notes as a complete catalog. Those files are curated reference material and may lag the live platform.
+
+## When to use this skill
+
+Use this skill when the user asks:
+
+- what tools exist for a connector
+- which tool should the agent use
+- what inputs a tool requires
+- what output shape a tool returns
+- how to reduce the tool set before giving tools to an LLM
+
+## Discovery workflow
+
+1. Identify the target connector or exact tool name.
+2. Use the Scalekit MCP server or SDK to fetch live tool metadata.
+3. Summarize:
+ - tool name
+ - connector
+ - what the tool does
+ - required fields from `input_schema.required`
+ - optional fields from `input_schema.properties`
+ - important fields from `output_schema.properties`
+4. Recommend the smallest useful tool set for the workflow.
+5. If live credentials are unavailable, use the connector notes only as a fallback and say they may be stale.
+
+## Terminology
+
+- `connector`: Gmail, Slack, Salesforce, Notion, or a custom connector
+- `connection`: the exact dashboard configuration name used for authorization
+- `connected account`: the per-user authorized record
+- `tool`: the executable action exposed by a connector
+
+Use `connector` in explanations. Only use `provider` when the SDK or API filter field literally expects that name.
+
+## What to emphasize
+
+- `connection_name` is the exact dashboard value and may not equal the connector slug.
+- Tool metadata is the durable way to determine current inputs and outputs.
+- Restrict the tool set before handing it to an LLM. Fewer relevant tools improve tool selection and parameter filling.
+
+## Deep reference
+
+- Connector reference: [../../references/agent-connectors/README.md](../../references/agent-connectors/README.md)
+- Connected accounts lifecycle: [../../references/connected-accounts.md](../../references/connected-accounts.md)
+- Code samples: [../../references/code-samples.md](../../references/code-samples.md)
diff --git a/plugins/agent-auth/skills/building-agent-mcp-server/SKILL.md b/plugins/agentkit/skills/exposing-agentkit-via-mcp/SKILL.md
similarity index 99%
rename from plugins/agent-auth/skills/building-agent-mcp-server/SKILL.md
rename to plugins/agentkit/skills/exposing-agentkit-via-mcp/SKILL.md
index b8e85b7..20b19e6 100644
--- a/plugins/agent-auth/skills/building-agent-mcp-server/SKILL.md
+++ b/plugins/agentkit/skills/exposing-agentkit-via-mcp/SKILL.md
@@ -1,5 +1,5 @@
---
-name: building-agent-mcp-server
+name: exposing-agentkit-via-mcp
description: Guides developers through creating a Scalekit MCP server with authenticated tool access. Use when building an MCP server, exposing Scalekit tools over MCP, or connecting AI agents via LangChain/LangGraph MCP adapters.
---
diff --git a/plugins/agent-auth/skills/agent-auth/SKILL.md b/plugins/agentkit/skills/integrating-agentkit/SKILL.md
similarity index 94%
rename from plugins/agent-auth/skills/agent-auth/SKILL.md
rename to plugins/agentkit/skills/integrating-agentkit/SKILL.md
index 05bf999..d338e27 100644
--- a/plugins/agent-auth/skills/agent-auth/SKILL.md
+++ b/plugins/agentkit/skills/integrating-agentkit/SKILL.md
@@ -1,6 +1,6 @@
---
-name: integrating-agent-auth
-description: Integrates Scalekit Agent Auth into a project to handle OAuth flows, token storage, and automatic refresh for third-party services (Gmail, Slack, Notion, Calendar). Use when a user needs to connect to an external service, authorize OAuth access, fetch access or refresh tokens, or execute API calls on behalf of a user.
+name: integrating-agentkit
+description: Integrates Scalekit AgentKit into a project to handle OAuth flows, token storage, and automatic refresh for third-party connectors (Gmail, Slack, Notion, Calendar, and 40+ more). Use when a user needs to connect to an external service, authorize OAuth access, fetch access or refresh tokens, execute API calls on behalf of a user, or build agents with LangChain or Google ADK.
---
# Agent Auth Integration
@@ -39,7 +39,7 @@ actions = scalekit.actions
**Node.js**
```bash
-npm install @scalekit-sdk/node@2.2.0-beta.1
+npm install @scalekit-sdk/node
```
```typescript
import { ScalekitClient } from '@scalekit-sdk/node';
@@ -223,7 +223,7 @@ for (const msg of messages) {
Replace `"gmail"` with any supported connector name: `slack`, `notion`, `calendar`, etc.
The SDK workflow (Steps 1–3) is identical for all connectors. Only the downstream API call (Step 4) changes.
-For connector-specific API details, see [CONNECTORS.md](CONNECTORS.md).
+For connector-specific API details, see the [agent connectors reference](../../references/agent-connectors/README.md).
## Building agents
diff --git a/plugins/agent-auth/skills/production-readiness-scalekit/SKILL.md b/plugins/agentkit/skills/production-readiness-agentkit/SKILL.md
similarity index 80%
rename from plugins/agent-auth/skills/production-readiness-scalekit/SKILL.md
rename to plugins/agentkit/skills/production-readiness-agentkit/SKILL.md
index 152ffd3..4f9ea78 100644
--- a/plugins/agent-auth/skills/production-readiness-scalekit/SKILL.md
+++ b/plugins/agentkit/skills/production-readiness-agentkit/SKILL.md
@@ -1,9 +1,9 @@
---
-name: production-readiness-scalekit
-description: Walks through a structured production readiness checklist for Scalekit agent authentication implementations. Use when the user says they are going live, launching to production, doing a pre-launch review, or wants to verify their agent OAuth implementation is production-ready.
+name: production-readiness-agentkit
+description: Walks through a structured production readiness checklist for Scalekit AgentKit implementations. Use when the user says they are going live, launching to production, doing a pre-launch review, or wants to verify their AgentKit authorization and tool-calling setup is production-ready.
---
-# Scalekit Agent Auth Production Readiness
+# Scalekit AgentKit Production Readiness
Work through each section in order — earlier sections are blockers for later ones.
@@ -60,3 +60,9 @@ Work through each section in order — earlier sections are blockers for later o
- OAuth authorization completion rate (initiated vs completed)
- Per-service API error rates (distinguish auth errors from service errors)
- Token expiry distribution (are tokens being refreshed proactively?)
+
+## Deep reference
+
+- Connections: [../../references/connections.md](../../references/connections.md)
+- Connected accounts: [../../references/connected-accounts.md](../../references/connected-accounts.md)
+- BYOC: [../../references/byoc.md](../../references/byoc.md)
diff --git a/plugins/agentkit/skills/testing-agentkit-tools/SKILL.md b/plugins/agentkit/skills/testing-agentkit-tools/SKILL.md
new file mode 100644
index 0000000..4d55bc9
--- /dev/null
+++ b/plugins/agentkit/skills/testing-agentkit-tools/SKILL.md
@@ -0,0 +1,93 @@
+---
+name: testing-agentkit-tools
+description: Tests live Scalekit AgentKit flows by generating authorization links, fetching tool metadata, and executing a tool for a connected account. Use when a user wants to validate a connector, inspect the exact payload for execute_tool, or build a workflow step by step.
+---
+
+# Testing AgentKit Tools
+
+This skill is the live playground for AgentKit. Use it to:
+
+- generate an authorization link for a connection
+- fetch live tool metadata for a connector or tool name
+- execute a tool with real inputs
+- inspect the exact JSON payload sent to AgentKit
+
+## Prerequisites
+
+Confirm the environment variables are available:
+- `SCALEKIT_ENV_URL`
+- `SCALEKIT_CLIENT_ID`
+- `SCALEKIT_CLIENT_SECRET`
+
+## Operations
+
+### Generate authorization link
+
+Creates or fetches the connected account and prints an authorization link if the account is not yet `ACTIVE`.
+
+**Python**
+```python
+response = actions.get_or_create_connected_account(
+ connection_name="",
+ identifier=""
+)
+if response.connected_account.status != "ACTIVE":
+ link_response = actions.get_authorization_link(
+ connection_name="",
+ identifier=""
+ )
+ print("Authorize here:", link_response.link)
+```
+
+### Fetch tool metadata
+
+Fetches live tool metadata. Omitting `tool_name` returns all matching tools for the filter.
+
+**Python**
+```python
+tools = actions.get_tools(providers=["GMAIL"], page_size=100)
+for tool in tools:
+ print(tool.name, tool.input_schema)
+```
+
+**Node.js**
+```typescript
+const tools = await scalekitClient.connectedAccounts.getTools({
+ providers: ['GMAIL'],
+ pageSize: 100,
+});
+```
+
+### Execute a tool
+
+Creates or fetches the connected account, prints an authorization link if needed, and executes the tool.
+
+**Python**
+```python
+result = actions.execute_tool(
+ tool_name="gmail_fetch_mails",
+ connection_name="",
+ identifier="",
+ tool_input={"query": "is:unread", "max_results": 5}
+)
+```
+
+## Default workflow
+
+1. Discover the tool first when the schema is unknown.
+2. Generate an authorization link if the connected account is not `ACTIVE`.
+3. Execute the tool with the smallest valid `tool_input`.
+4. Show the exact command and payload used so the user can translate it into app code.
+
+## Guardrails
+
+- Treat live metadata as the source of truth for `input_schema` and `output_schema`.
+- Do not assume the dashboard `connection_name` matches the connector slug.
+- Ask for missing credentials instead of inventing placeholder values.
+- Keep the tool set constrained to the current workflow.
+
+## Deep reference
+
+- Integration workflow: [../integrating-agentkit/SKILL.md](../integrating-agentkit/SKILL.md)
+- Connector reference: [../../references/agent-connectors/README.md](../../references/agent-connectors/README.md)
+- Connected accounts: [../../references/connected-accounts.md](../../references/connected-accounts.md)
diff --git a/plugins/full-stack-auth/.codex-plugin/plugin.json b/plugins/full-stack-auth/.codex-plugin/plugin.json
deleted file mode 100644
index 31f3a15..0000000
--- a/plugins/full-stack-auth/.codex-plugin/plugin.json
+++ /dev/null
@@ -1,41 +0,0 @@
-{
- "name": "full-stack-auth",
- "version": "1.4.0",
- "description": "Production-ready authentication flows using Scalekit full-stack auth across common stacks.",
- "author": {
- "name": "Scalekit Inc",
- "email": "support@scalekit.com",
- "url": "https://scalekit.com"
- },
- "homepage": "https://docs.scalekit.com",
- "repository": "https://github.com/scalekit-inc/claude-code-authstack",
- "license": "MIT",
- "keywords": [
- "authentication",
- "oauth",
- "full-stack",
- "sessions"
- ],
- "skills": "./skills/",
- "mcpServers": "./.mcp.json",
- "interface": {
- "displayName": "Full-Stack Auth",
- "shortDescription": "Build complete app auth with Scalekit.",
- "longDescription": "Covers login, callback, cookie-backed sessions, token refresh, logout, protected routes, framework-specific implementations, migrations, and production-readiness for web applications using Scalekit.",
- "developerName": "Scalekit",
- "category": "Application Auth",
- "capabilities": [
- "Interactive",
- "Write"
- ],
- "websiteURL": "https://docs.scalekit.com",
- "privacyPolicyURL": "https://www.scalekit.com/privacy",
- "termsOfServiceURL": "https://www.scalekit.com/terms",
- "defaultPrompt": [
- "Add Scalekit full-stack auth to this app.",
- "Implement login, callback, and logout with Scalekit.",
- "Review my session refresh and logout flow."
- ],
- "brandColor": "#7C3AED"
- }
-}
diff --git a/plugins/full-stack-auth/README.md b/plugins/full-stack-auth/README.md
deleted file mode 100644
index 75db8f3..0000000
--- a/plugins/full-stack-auth/README.md
+++ /dev/null
@@ -1,61 +0,0 @@
-# Full-Stack Auth
-
-`full-stack-auth` is for complete application authentication with Scalekit: login, callback, session creation, refresh, logout, and protected routes. Use it when you want Codex to help wire auth end to end instead of only solving SSO or provisioning in isolation.
-
-## Use This Plugin When
-
-- you need full login and callback routes
-- you need session cookies or token refresh handling
-- you need logout flows and protected pages
-- you want a review of your auth lifecycle before going live
-
-## Primary Skill
-
-- `implementing-scalekit-fsa`
-
-## Additional Skills
-
-- `full-stack-auth`
-- `implementing-scalekit-nextjs-auth`
-- `implementing-scalekit-fastapi-auth`
-- `implementing-scalekit-flask-auth`
-- `implementing-scalekit-django-auth`
-- `implementing-scalekit-go-auth`
-- `implementing-scalekit-laravel-auth`
-- `implementing-scalekit-springboot-auth`
-- `implementing-access-control`
-- `manage-user-sessions`
-- `implement-logout`
-- `adding-oauth2-to-apis`
-- `adding-api-key-auth`
-- `implementing-admin-portal`
-- `migrating-to-scalekit-auth`
-- `production-readiness-scalekit`
-
-Try asking Codex:
-
-- `Add Scalekit full-stack auth to this app`
-- `Implement login, callback, and logout with Scalekit`
-- `Review my session refresh flow`
-
-## Configuration
-
-- `SCALEKIT_ENVIRONMENT_URL`
-- `SCALEKIT_CLIENT_ID`
-- `SCALEKIT_CLIENT_SECRET`
-
-The plugin also ships [`./.mcp.json`](/Users/saif/Projects/ai-first/codex-auth-stack/plugins/full-stack-auth/.mcp.json), which points at the remote Scalekit MCP server.
-
-## Reference Docs
-
-- Redirects: [`references/redirects.md`](/Users/saif/Projects/ai-first/codex-auth-stack/plugins/full-stack-auth/references/redirects.md)
-- Logs: [`references/scalekit-logs.md`](/Users/saif/Projects/ai-first/codex-auth-stack/plugins/full-stack-auth/references/scalekit-logs.md)
-- User profiles: [`references/scalekit-user-profiles.md`](/Users/saif/Projects/ai-first/codex-auth-stack/plugins/full-stack-auth/references/scalekit-user-profiles.md)
-- Migration checklist: [`skills/migrating-to-scalekit-auth/AUDIT-CHECKLIST.md`](/Users/saif/Projects/ai-first/codex-auth-stack/plugins/full-stack-auth/skills/migrating-to-scalekit-auth/AUDIT-CHECKLIST.md)
-- Migration import samples: [`skills/migrating-to-scalekit-auth/IMPORT-SAMPLES.md`](/Users/saif/Projects/ai-first/codex-auth-stack/plugins/full-stack-auth/skills/migrating-to-scalekit-auth/IMPORT-SAMPLES.md)
-
-## Troubleshooting
-
-- Callback URLs must exactly match the values registered in the Scalekit dashboard.
-- Use HttpOnly cookies for tokens or session state and keep refresh handling off the client when possible.
-- If login works but pages still act anonymous, inspect cookie scope, secure flags, and refresh fallback behavior.
diff --git a/plugins/full-stack-auth/skills/adding-oauth2-to-apis/SKILL.md b/plugins/full-stack-auth/skills/adding-oauth2-to-apis/SKILL.md
deleted file mode 100644
index 4ecedea..0000000
--- a/plugins/full-stack-auth/skills/adding-oauth2-to-apis/SKILL.md
+++ /dev/null
@@ -1,232 +0,0 @@
----
-name: adding-oauth2-to-apis
-description: >
- Implements OAuth 2.0 client-credentials authentication on API endpoints using
- Scalekit as the authorization server. Use when protecting APIs with
- machine-to-machine auth, registering API clients for organizations, issuing
- bearer tokens, validating JWTs via JWKS, or enforcing scopes in middleware.
----
-
-# Adding OAuth 2.0 to APIs (Scalekit)
-
-## Flow overview
-
-```
-Register client (your app) → Issue client_id + secret (Scalekit) →
-API client fetches bearer token → Your server validates JWT + scopes
-```
-
-Security-critical steps (token validation, scope enforcement) use **low freedom** — follow them exactly.
-
----
-
-## 1. Install
-
-```bash
-pip install scalekit-sdk-python
-# or
-npm install @scalekit-sdk/node
-```
-
-Initialize once and reuse:
-
-```python
-from scalekit import ScalekitClient
-import os
-
-scalekit_client = ScalekitClient(
- env_url=os.getenv("SCALEKIT_ENVIRONMENT_URL"),
- client_id=os.getenv("SCALEKIT_CLIENT_ID"),
- client_secret=os.getenv("SCALEKIT_CLIENT_SECRET")
-)
-```
-
-Required env vars: `SCALEKIT_ENVIRONMENT_URL`, `SCALEKIT_CLIENT_ID`, `SCALEKIT_CLIENT_SECRET`.
-
----
-
-## 2. Register an API client for an organization
-
-One organization can have multiple API clients. Registration returns `client_id` and `plain_secret` — **`plain_secret` is shown only once; never stored by Scalekit**.
-
-```python
-from scalekit.v1.clients.clients_pb2 import OrganizationClient
-
-response = scalekit_client.m2m_client.create_organization_client(
- organization_id="",
- m2m_client=OrganizationClient(
- name="GitHub Actions Deployment Service",
- description="Deploys to production via GitHub Actions",
- scopes=["deploy:applications", "read:deployments"], # resource:action pattern
- audience=["deployment-api.acmecorp.com"],
- custom_claims=[
- {"key": "github_repository", "value": "acmecorp/inventory-service"},
- {"key": "environment", "value": "production_us"}
- ],
- expiry=3600 # seconds; default 3600
- )
-)
-
-client_id = response.client.client_id
-plain_secret = response.plain_secret # store this securely; not retrievable again
-```
-
-**cURL equivalent** (if not using SDK):
-
-```bash
-curl -X POST "$SCALEKIT_ENVIRONMENT_URL/api/v1/organizations//clients" \
- -H "Content-Type: application/json" \
- -H "Authorization: Bearer " \
- -d '{
- "name": "GitHub Actions Deployment Service",
- "scopes": ["deploy:applications", "read:deployments"],
- "audience": ["deployment-api.acmecorp.com"],
- "expiry": 3600
- }'
-```
-
-> Scope naming convention: use `resource:action` (e.g. `deployments:read`, `applications:create`).
-
----
-
-## 3. API client fetches a bearer token
-
-This step runs inside the **API client's** code, not your server. Shown here for reference.
-
-```bash
-curl -X POST "$SCALEKIT_ENVIRONMENT_URL/oauth/token" \
- -H "Content-Type: application/x-www-form-urlencoded" \
- -d "grant_type=client_credentials" \
- -d "client_id=" \
- -d "client_secret="
-```
-
-Response:
-
-```json
-{
- "access_token": "",
- "token_type": "Bearer",
- "expires_in": 86399,
- "scope": "deploy:applications read:deployments"
-}
-```
-
-The client sends this JWT in `Authorization: Bearer ` on every API request.
-
----
-
-## 4. Validate the JWT on your API server
-
-**Do this on EVERY request. Never trust unverified tokens.**
-
-### Python (SDK handles JWKS automatically)
-
-```python
-token = request.headers.get("Authorization", "").removeprefix("Bearer ")
-
-try:
- claims = scalekit_client.validate_access_token_and_get_claims(token=token)
- # claims["scopes"] → list of granted scopes
-except Exception:
- return 401 # invalid or expired
-```
-
-### Node.js (manual JWKS + JWT verify)
-
-```js
-import jwksClient from 'jwks-rsa';
-import jwt from 'jsonwebtoken';
-
-const jwks = jwksClient({
- jwksUri: `${process.env.SCALEKIT_ENVIRONMENT_URL}/.well-known/jwks.json`,
- cache: true
-});
-
-async function verifyToken(token) {
- const decoded = jwt.decode(token, { complete: true });
- const key = await jwks.getSigningKey(decoded.header.kid);
- return jwt.verify(token, key.getPublicKey(), {
- algorithms: ['RS256'],
- complete: true
- }).payload; // contains scopes, sub, iss, exp, oid, etc.
-}
-```
-
-Decoded JWT payload structure:
-
-```json
-{
- "client_id": "m2morg_69038819013296423",
- "oid": "org_59615193906282635",
- "scopes": ["deploy:applications", "read:deployments"],
- "iss": "",
- "exp": 1745305340
-}
-```
-
----
-
-## 5. Enforce scopes in middleware
-
-### Flask (Python)
-
-```python
-import functools
-from flask import request, jsonify
-
-def require_scope(scope):
- def decorator(f):
- @functools.wraps(f)
- def wrapper(*args, **kwargs):
- token = request.headers.get("Authorization", "").removeprefix("Bearer ")
- if not token:
- return jsonify({"error": "Missing token"}), 401
- try:
- claims = scalekit_client.validate_access_token_and_get_claims(token=token)
- except Exception:
- return jsonify({"error": "Invalid token"}), 401
- if scope not in claims.get("scopes", []):
- return jsonify({"error": "Insufficient permissions"}), 403
- return f(*args, **kwargs)
- return wrapper
- return decorator
-
-# Usage:
-# @app.route('/deploy', methods=['POST'])
-# @require_scope('deploy:applications')
-# def deploy(): ...
-```
-
-### Express (Node.js)
-
-```js
-function requireScope(scope) {
- return async (req, res, next) => {
- const token = (req.headers.authorization || '').replace('Bearer ', '');
- if (!token) return res.status(401).send('Missing token');
- try {
- const payload = await verifyToken(token); // from step 4
- if (!payload.scopes?.includes(scope))
- return res.status(403).send('Insufficient permissions');
- req.tokenClaims = payload;
- next();
- } catch {
- res.status(401).send('Invalid token');
- }
- };
-}
-
-// Usage:
-// app.post('/deploy', requireScope('deploy:applications'), handler);
-```
-
----
-
-## Key rules
-
-- `plain_secret` is **returned once only** — instruct customers to store it immediately.
-- Always validate tokens **server-side** before trusting claims.
-- Cache JWKS keys (avoid fetching on every request); rotate on `kid` mismatch.
-- Use `resource:action` scope naming for clarity.
-- An `organization_id` maps to one customer; multiple API clients per org are supported.
diff --git a/plugins/full-stack-auth/skills/implement-logout/SKILL.md b/plugins/full-stack-auth/skills/implement-logout/SKILL.md
deleted file mode 100644
index 47e76ef..0000000
--- a/plugins/full-stack-auth/skills/implement-logout/SKILL.md
+++ /dev/null
@@ -1,187 +0,0 @@
----
-name: implementing-fsa-logout
-description: Implements a complete logout flow for Scalekit FSA integrations by clearing application session cookies and redirecting the browser to Scalekit’s /oidc/logout endpoint to invalidate the Scalekit session. Use when adding or fixing logout in Node.js, Python, Go, or Java web apps that use Scalekit OIDC.
----
-
-# Implementing logout (Scalekit FSA)
-
-## Goal
-Implement a single `/logout` endpoint that:
-- Clears the application session layer (your cookies/tokens).
-- Invalidates the Scalekit session layer by redirecting the browser to Scalekit’s OIDC logout endpoint.
-- Returns the user to a safe, allowlisted post-logout redirect URL.
-
-## Key constraints (must follow)
-- The Scalekit logout call MUST be a browser redirect (top-level navigation), not a `fetch`/XHR from frontend and not a server-to-server API call.
-- The ID token (often `idToken`) MUST be read BEFORE clearing cookies, because it is used as `id_token_hint`.
-- The `post_logout_redirect_uri` MUST be allowlisted in Scalekit Dashboard (Post Logout URLs).
-
-## Inputs to collect from the user/project
-Ask for (or infer from the codebase):
-- Tech stack: Express/Fastify/Next.js (Node), Flask/Django (Python), Gin/Fiber (Go), Spring Boot (Java), etc.
-- Where tokens are stored: cookie names (default examples: `accessToken`, `refreshToken`, `idToken`) and cookie attributes (Path, Domain, SameSite).
-- The post-logout landing URL (example: `http://localhost:3000/login` or your production login page).
-- Scalekit configuration: base URL / environment, and whether the project uses a Scalekit SDK helper like `getLogoutUrl(...)`.
-
-## Recommended implementation (workflow)
-1. Locate the current auth/session code:
-- Find where access/refresh/ID tokens are set.
-- Note cookie names, paths, domains, and SameSite settings (you must match these when clearing).
-
-2. Add a GET `/logout` route:
-- Extract `idToken` (or equivalent) from cookies/session storage.
-- Compute `postLogoutRedirectUri`.
-- Build the Scalekit logout URL pointing at `/oidc/logout`, preferably using the Scalekit SDK helper if present.
-- Clear session cookies (access/refresh/id), preserving the correct Path/Domain so deletion actually works.
-- Redirect (302) the browser to the Scalekit logout URL.
-
-3. Configure Scalekit Dashboard allowlist:
-- Register `postLogoutRedirectUri` under: Redirects → Post Logout URL.
-
-4. Verify and iterate:
-- In DevTools → Network, clicking logout should show a **document** navigation to Scalekit (not XHR/fetch).
-- Confirm the request includes the Scalekit session cookie automatically.
-- After redirecting back, logging in should not silently reuse the application cookies you intended to clear.
-
-## Reference behavior (pseudocode)
-- Read `id_token_hint` from cookie/session.
-- `logoutUrl = scalekit.getLogoutUrl(id_token_hint, post_logout_redirect_uri)`
-- Clear cookies (access/refresh/id).
-- `302 -> logoutUrl`
-
-## Implementation templates
-
-### Node.js (Express)
-```js
-app.get('/logout', (req, res) => {
- const idTokenHint = req.cookies?.idToken; // read BEFORE clearing
- const postLogoutRedirectUri = process.env.POST_LOGOUT_REDIRECT_URI ?? 'http://localhost:3000/login';
-
- // Prefer SDK helper if available in your project
- const logoutUrl = scalekit.getLogoutUrl(idTokenHint, postLogoutRedirectUri);
-
- // Clear cookies (match Path/Domain/SameSite used when setting them)
- res.clearCookie('accessToken', { path: '/' });
- res.clearCookie('refreshToken', { path: '/' });
- res.clearCookie('idToken', { path: '/' });
-
- return res.redirect(logoutUrl);
-});
-```
-
-### Python (Flask)
-```py
-from flask import request, redirect, make_response
-
-@app.get("/logout")
-def logout():
- id_token = request.cookies.get("idToken") # read BEFORE clearing
- post_logout_redirect_uri = os.getenv("POST_LOGOUT_REDIRECT_URI", "http://localhost:3000/login")
-
- logout_url = scalekit_client.get_logout_url(
- id_token_hint=id_token,
- post_logout_redirect_uri=post_logout_redirect_uri
- )
-
- resp = make_response(redirect(logout_url))
- resp.set_cookie("accessToken", "", max_age=0, path="/")
- resp.set_cookie("refreshToken", "", max_age=0, path="/")
- resp.set_cookie("idToken", "", max_age=0, path="/")
- return resp
-```
-
-### Go (Gin)
-```go
-func LogoutHandler(c *gin.Context) {
- idToken, _ := c.Cookie("idToken") // read BEFORE clearing
- postLogoutRedirectURI := os.Getenv("POST_LOGOUT_REDIRECT_URI")
- if postLogoutRedirectURI == "" {
- postLogoutRedirectURI = "http://localhost:3000/login"
- }
-
- logoutURL, err := scalekit.GetLogoutUrl(scalekit.LogoutUrlOptions{
- IdTokenHint: idToken,
- PostLogoutRedirectUri: postLogoutRedirectURI,
- })
- if err != nil {
- c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
- return
- }
-
- // Clear cookies (match original attributes)
- c.SetCookie("accessToken", "", -1, "/", "", true, true)
- c.SetCookie("refreshToken", "", -1, "/", "", true, true)
- c.SetCookie("idToken", "", -1, "/", "", true, true)
-
- c.Redirect(http.StatusFound, logoutURL.String())
-}
-```
-
-### Java (Spring Boot)
-```java
-@GetMapping("/logout")
-public void logout(HttpServletRequest request, HttpServletResponse response) throws IOException {
- String idToken = null;
- if (request.getCookies() != null) {
- for (Cookie c : request.getCookies()) {
- if ("idToken".equals(c.getName())) {
- idToken = c.getValue();
- break;
- }
- }
- }
-
- String postLogoutRedirectUri = System.getenv().getOrDefault(
- "POST_LOGOUT_REDIRECT_URI",
- "http://localhost:3000/login"
- );
-
- URL logoutUrl = scalekitClient.authentication().getLogoutUrl(
- idToken,
- postLogoutRedirectUri
- );
-
- // Clear cookies (ensure Path/Domain match your app cookies)
- Cookie access = new Cookie("accessToken", "");
- access.setMaxAge(0);
- access.setPath("/");
- access.setHttpOnly(true);
- access.setSecure(true);
- response.addCookie(access);
-
- Cookie refresh = new Cookie("refreshToken", "");
- refresh.setMaxAge(0);
- refresh.setPath("/");
- refresh.setHttpOnly(true);
- refresh.setSecure(true);
- response.addCookie(refresh);
-
- Cookie id = new Cookie("idToken", "");
- id.setMaxAge(0);
- id.setPath("/");
- id.setHttpOnly(true);
- id.setSecure(true);
- response.addCookie(id);
-
- response.sendRedirect(logoutUrl.toString());
-}
-```
-
-## Logout security checklist (copy/paste)
-- Extract ID token BEFORE clearing cookies.
-- Clear all application session cookies (access/refresh/id).
-- Redirect browser (302) to Scalekit `/oidc/logout` via the generated logout URL.
-- Ensure `post_logout_redirect_uri` is allowlisted in Scalekit dashboard.
-- Validate logout is a document navigation (not XHR/fetch) and cookies are actually removed.
-
-## Common failure modes (what to check)
-- “Logout doesn’t really log out”: cookie deletion mismatches Path/Domain/SameSite; clear cookies with the same attributes used when setting them.
-- “Login immediately succeeds after logout”: identity provider session may still be active; this is expected for SSO providers, but your app cookies should still be cleared.
-- “Scalekit logout doesn’t take effect”: logout was done via API call rather than browser redirect; use a redirect so the Scalekit session cookie is included automatically.
-- “Redirect rejected”: `post_logout_redirect_uri` is not allowlisted in Scalekit dashboard.
-
-## Output expectations when using this skill
-When asked to implement logout in a real repo, the assistant should:
-- Identify the correct cookie names and where they are set.
-- Implement `/logout` with the correct sequence (read id token → build logout URL → clear cookies → redirect).
-- Provide a brief test plan and the exact dashboard value to allowlist for post-logout redirect.
diff --git a/plugins/full-stack-auth/skills/implementing-admin-portal/SKILL.md b/plugins/full-stack-auth/skills/implementing-admin-portal/SKILL.md
deleted file mode 100644
index cf0d039..0000000
--- a/plugins/full-stack-auth/skills/implementing-admin-portal/SKILL.md
+++ /dev/null
@@ -1,152 +0,0 @@
----
-name: implementing-admin-portal
-description: Implements Scalekit's admin portal for customer self-serve SSO and SCIM configuration. Generates portal links server-side and embeds the portal as an iframe in the app's settings UI. Use when the user asks to add an admin portal, customer self-serve SSO setup, iframe embed for SSO config, shareable setup link, or let customers configure their own SSO or SCIM connection.
----
-
-# Admin Portal with Scalekit
-
-Adds a self-serve portal where customers configure their own SSO and SCIM settings — embedded inside your app's settings UI.
-
-If the user only needs a quick shareable link with no code (e.g., for a one-time onboarding call), skip to the **Shareable link** section at the bottom.
-
----
-
-## Implementation progress
-
-```
-Admin Portal Implementation Progress:
-- [ ] Step 1: Install SDK
-- [ ] Step 2: Set environment credentials
-- [ ] Step 3: Register app domain in dashboard
-- [ ] Step 4: Generate portal link (server-side)
-- [ ] Step 5: Render iframe (client-side)
-- [ ] Step 6: Handle session expiry events
-- [ ] Step 7: Verify portal loads and events fire correctly
-```
-
----
-
-## Step 1: Install SDK
-
-Detect the project's language/framework from existing files and install:
-
-| Stack | Install |
-|---------|---------|
-| Node.js | `npm install @scalekit-sdk/node` |
-| Python | `pip install scalekit-sdk` |
-| Go | `go get github.com/scalekit/scalekit-go` |
-| Java | Add `com.scalekit:scalekit-sdk` to `pom.xml` |
-
----
-
-## Step 2: Set environment credentials
-
-Add to `.env` (never hardcode):
-
-```shell
-SCALEKIT_ENVIRONMENT_URL='https://.scalekit.com'
-SCALEKIT_CLIENT_ID=''
-SCALEKIT_CLIENT_SECRET=''
-```
-
-Credentials are in **Dashboard > Developers > Settings > API Credentials**.
-
----
-
-## Step 3: Register app domain
-
-In **Dashboard > Developers > API Configuration > Redirect URIs**, add the domain where the portal will be embedded. The iframe will be blocked if this is missing.
-
----
-
-## Step 4: Generate the portal link (server-side)
-
-Generate a new link on every page load — links are single-use. Plug into the existing route or controller that serves the settings/admin page:
-
-**Node.js:**
-```javascript
-const { location } = await scalekit.organization.generatePortalLink(organizationId);
-// Pass `location` to the frontend as a template variable or API response
-```
-
-**Python:**
-```python
-portal = scalekit_client.organization.generate_portal_link(organization_id)
-location = portal.location
-# Pass `location` to your template or JSON response
-```
-
-**Never cache this value** — each link is single-use and will fail if reused.
-
----
-
-## Step 5: Render the iframe (client-side)
-
-In the frontend settings/admin template, inject `location` as the `src`:
-
-```html
-
-```
-
-Minimum recommended height: **600px**. Match the variable name to the project's existing templating convention.
-
----
-
-## Step 6: Handle portal UI events
-
-Listen for messages from the iframe to react to configuration changes and session expiry:
-
-```javascript
-window.addEventListener('message', (event) => {
- if (event.origin !== process.env.SCALEKIT_ENVIRONMENT_URL) return;
-
- const { type } = event.data;
- switch (type) {
- case 'SSO_CONFIGURED':
- // Refresh org status, show success banner, etc.
- break;
- case 'SESSION_EXPIRED':
- // Re-fetch a new portal link and reload the iframe src
- reloadPortalIframe();
- break;
- }
-});
-```
-
-`SESSION_EXPIRED` handling is required — without it the portal silently breaks for long-lived sessions.
-
----
-
-## Step 7: Verify
-
-- [ ] Open the settings page — confirm the iframe renders without console errors
-- [ ] Complete a test SSO configuration inside the portal — confirm `SSO_CONFIGURED` fires
-- [ ] Wait for session expiry (or simulate it) — confirm `SESSION_EXPIRED` triggers a link refresh
-- [ ] Confirm portal link is never the same across two page loads (single-use verification)
-
----
-
-## Branding (optional)
-
-Configure at **Dashboard > Settings > Branding**: logo, accent color, favicon. Custom domain support (e.g., `sso.yourapp.com`) is available in the Scalekit dashboard.
-
----
-
-## Guardrails
-
-- **Generate link server-side only** — never expose `CLIENT_SECRET` to the browser
-- **Re-generate on every page load** — caching will break the portal
-- **Register your domain** in Redirect URIs before testing or the iframe will be blocked
-- **Handle `SESSION_EXPIRED`** — re-generate and reload, don't let it fail silently
-
----
-
-## Shareable link (no-code alternative)
-
-For one-time onboarding calls or zero-engineering setup: go to **Dashboard > Organizations**, select the org, click **Generate link**, and share the URL directly. The link gives anyone who has it full access to configure that org's SSO/SCIM settings — use the iframe approach for production. Also share Scalekit's [SSO setup guides](https://docs.scalekit.com/guides/integrations/sso-integrations/) so the IT admin has provider-specific configuration steps alongside the portal link.
diff --git a/plugins/full-stack-auth/skills/implementing-scalekit-fsa/SKILL.md b/plugins/full-stack-auth/skills/implementing-scalekit-fsa/SKILL.md
deleted file mode 100644
index 1c531b9..0000000
--- a/plugins/full-stack-auth/skills/implementing-scalekit-fsa/SKILL.md
+++ /dev/null
@@ -1,79 +0,0 @@
----
-name: implementing-scalekit-fsa
-description: Implements Scalekit full-stack authentication including login, callback, logout, secure session storage, and refresh-token handling. Use when building end-to-end authentication for a web application with Scalekit.
----
-
-# Scalekit Full-Stack Authentication
-
-Use this skill when you want a complete application auth flow rather than a single enterprise SSO or provisioning feature.
-
-## Required Configuration
-
-```text
-SCALEKIT_ENVIRONMENT_URL=
-SCALEKIT_CLIENT_ID=
-SCALEKIT_CLIENT_SECRET=
-```
-
-## Core Flow
-
-1. Generate an authorization URL and redirect the user to Scalekit.
-2. Exchange the callback code for tokens.
-3. Store session state in secure server-controlled cookies.
-4. Refresh access tokens when needed.
-5. Clear local session state and redirect to the Scalekit logout URL.
-
-## Node.js Sketch
-
-```ts
-const authorizationUrl = scalekit.getAuthorizationUrl(redirectUri, {
- scopes: ['openid', 'profile', 'email', 'offline_access'],
-});
-
-res.redirect(authorizationUrl);
-```
-
-```ts
-const { user, idToken, accessToken, refreshToken } =
- await scalekit.authenticateWithCode(code, redirectUri);
-```
-
-```ts
-res.cookie('accessToken', accessToken, {
- httpOnly: true,
- secure: true,
- sameSite: 'strict',
- path: '/api',
-});
-```
-
-## Implementation Checklist
-
-```text
-Full-Stack Auth:
-- [ ] Generate login URL
-- [ ] Implement callback exchange
-- [ ] Create secure session storage
-- [ ] Add refresh-token fallback
-- [ ] Add logout route
-- [ ] Protect server-rendered and API routes
-```
-
-## Review Guidance
-
-- Callback URLs must exactly match the values configured in the dashboard.
-- Prefer HttpOnly cookies and server-side refresh logic over exposing tokens to the browser runtime.
-- Validate access tokens first, then fall back to refresh using the refresh token.
-- If refresh fails, clear local session state and require a new login.
-
-## Cross-Language Note
-
-Scalekit keeps the same auth lifecycle across SDKs even though method names vary slightly:
-
-- authorization URL generation
-- code exchange
-- token validation
-- token refresh
-- logout URL generation
-
-Use the framework and cookie abstractions already present in the target app rather than creating a parallel auth subsystem.
diff --git a/plugins/full-stack-auth/skills/production-readiness-scalekit/SKILL.md b/plugins/full-stack-auth/skills/production-readiness-scalekit/SKILL.md
deleted file mode 100644
index 8ab1a0a..0000000
--- a/plugins/full-stack-auth/skills/production-readiness-scalekit/SKILL.md
+++ /dev/null
@@ -1,159 +0,0 @@
----
-name: production-readiness-scalekit
-description: Walks through a structured production readiness checklist for Scalekit authentication implementations. Use when the user says they are going live, launching to production, doing a pre-launch review, hardening their auth setup, or wants to verify their Scalekit implementation is production-ready.
----
-
-# Scalekit Production Readiness
-
-Work through each section in order — earlier sections are blockers for later ones. Skip sections that don't apply to this implementation.
-
----
-
-## Quick checks (run first)
-
-- [ ] Production environment URL, client ID, and client secret are set (not dev/staging values)
-- [ ] HTTPS enforced on all auth endpoints
-- [ ] CORS restricted to your domains only
-- [ ] API credentials stored in environment variables — never committed to code
-- [ ] Only enabled auth methods are active in production
-
----
-
-## Customization
-
-- [ ] Login page branded with logo, colors, styling
-- [ ] Email templates customized (sign-up, password reset, invitations)
-- [ ] Custom domain configured for auth pages (if applicable)
-- [ ] Email provider configured in **Dashboard > Customization > Emails**
-- [ ] Email deliverability tested — check spam folders
-- [ ] Webhooks configured with signature validation
-
----
-
-## Core auth flows
-
-- [ ] Test login initiation with authorization URL
-- [ ] Validate redirect URLs match dashboard configuration exactly
-- [ ] Test authentication completion and code exchange
-- [ ] Validate `state` parameter in callbacks (CSRF protection)
-- [ ] Verify session token storage uses `httpOnly`, `secure`, and `sameSite` flags
-- [ ] Configure token lifetimes for your security requirements
-- [ ] Test session timeout and automatic token refresh
-- [ ] Verify logout clears sessions completely
-
-**Test each enabled auth method:**
-- [ ] Email/password: sign-up, login, password reset
-- [ ] Magic links: initiation, delivery, redemption, expiry
-- [ ] Social logins: each configured provider (Google, Microsoft, GitHub, etc.)
- → Provider setup guides: https://docs.scalekit.com/guides/integrations/social-connections/
-- [ ] Passkeys: registration, authentication, fallback
-- [ ] Auth method selection UI renders correctly
-- [ ] Fallback scenarios when an auth method fails
-
-**Error handling:**
-- [ ] Expired tokens handled gracefully
-- [ ] Invalid authorization codes rejected
-- [ ] Network failures show user-friendly messages
-- [ ] Complete end-to-end flow validated in staging before production
-
----
-
-## Enterprise auth (if enterprise customers at launch)
-
-**SSO:**
-- [ ] Test SSO with target IdPs: Okta, Azure AD, Google Workspace
- → IT admin setup guides per IdP: https://docs.scalekit.com/guides/integrations/sso-integrations/
-- [ ] Configure user attribute mapping (email, name, groups)
-- [ ] Test both SP-initiated and IdP-initiated SSO flows
-- [ ] Verify SSO error handling for misconfigured connections
-- [ ] Test SSO with: new users, existing users, deactivated users
-
-**JIT provisioning:**
-- [ ] Register all organization domains for JIT provisioning
-- [ ] Configure consistent user identifiers across SSO connections (email or userPrincipalName)
-- [ ] Set default roles for JIT-provisioned users
-- [ ] Enable "Sync user attributes during login"
-- [ ] Plan manual invitation process for contractors/external users with non-matching domains
-
-**SCIM provisioning:**
-- [ ] Configure webhook endpoints to receive SCIM events
- → IT admin setup guides per IdP: https://docs.scalekit.com/guides/integrations/scim-integrations/
-- [ ] Verify webhook security with signature validation
-- [ ] Test user provisioning (automatic creation)
-- [ ] Test user deprovisioning (deactivation/deletion)
-- [ ] Test user profile updates and role changes
-- [ ] Set up group-based role assignment and sync
-- [ ] Test error cases: duplicate users, invalid data
-
-**Admin portal:**
-- [ ] Configure admin portal access for enterprise customers
-- [ ] Test admin portal SSO configuration flows
-- [ ] Verify user management features in admin portal
-
-**Network/firewall — enterprise customers behind VPN must whitelist:**
-
-| Domain | Purpose |
-|---|---|
-| `.scalekit.com` | Auth + admin portal |
-| `cdn.scalekit.com` | Static assets |
-| `fonts.googleapis.com` | Font resources |
-
-- [ ] Customer firewalls allow Scalekit domains
-- [ ] SSO tested from customer's network environment
-
----
-
-## User and organization management (if implemented)
-
-**User flows:**
-- [ ] Configure profile fields collected at sign-up
-- [ ] Test invitation flow and email templates
-- [ ] Test user deletion flow
-
-**Organization flows:**
-- [ ] Test organization creation
-- [ ] Test adding and removing users from organizations
-- [ ] Set allowed email domains for org sign-ups (if applicable)
-- [ ] Verify organization switching for users in multiple orgs
-- [ ] Test organization deletion flow
-
-**RBAC (if implemented):**
-- [ ] Define and create roles and permissions
-- [ ] Set default roles for new users
-- [ ] Test role assignment to users and org members
-- [ ] Verify permission checks in application code
-- [ ] Test access control across all role levels
-- [ ] Validate permission enforcement at API endpoints
-
----
-
-## MCP authentication (if implemented)
-
-- [ ] Test MCP server authentication flow
-- [ ] Verify OAuth consent screen for MCP clients
-- [ ] Test token exchange for MCP connections
-- [ ] Verify custom auth handlers (if using)
-- [ ] Test MCP session management
-
----
-
-## Monitoring and incident readiness
-
-**Observability:**
-- [ ] Auth logs monitoring configured in **Dashboard > Auth Logs**
-- [ ] Alerts set for suspicious activity (multiple failed logins, unusual locations)
-- [ ] Webhook event monitoring and logging active
-- [ ] Error tracking configured for authentication failures
-
-**Key metrics to track from day one:**
-- Sign-up rate and conversion
-- Login success/failure rates
-- Session creation and duration
-- Token refresh frequency
-- Webhook delivery success rate
-
-**Reliability:**
-- [ ] Log retention policies configured
-- [ ] Webhook delivery and retry mechanism tested
-- [ ] Incident response runbook written (who to contact, how to roll back, escalation path)
-- [ ] Rollback plan ready (feature flag to disable new auth flows if needed)
diff --git a/plugins/mcp-auth/.codex-plugin/plugin.json b/plugins/mcp-auth/.codex-plugin/plugin.json
deleted file mode 100644
index 233ba3e..0000000
--- a/plugins/mcp-auth/.codex-plugin/plugin.json
+++ /dev/null
@@ -1,41 +0,0 @@
-{
- "name": "mcp-auth",
- "version": "1.3.0",
- "description": "Guides teams through adding OAuth 2.1 authorization to MCP servers with Scalekit.",
- "author": {
- "name": "Scalekit Inc",
- "email": "support@scalekit.com",
- "url": "https://scalekit.com"
- },
- "homepage": "https://docs.scalekit.com/authenticate/mcp/start-mcp-auth-coding-agents",
- "repository": "https://github.com/scalekit-inc/claude-code-authstack",
- "license": "MIT",
- "keywords": [
- "oauth",
- "mcp",
- "authentication",
- "scalekit"
- ],
- "skills": "./skills/",
- "mcpServers": "./.mcp.json",
- "interface": {
- "displayName": "MCP Auth",
- "shortDescription": "Add OAuth 2.1 protection to MCP servers.",
- "longDescription": "Production-oriented guidance for securing MCP servers with Scalekit, including protected-resource metadata, token validation, and host testing.",
- "developerName": "Scalekit",
- "category": "MCP Security",
- "capabilities": [
- "Interactive",
- "Write"
- ],
- "websiteURL": "https://docs.scalekit.com/authenticate/mcp/start-mcp-auth-coding-agents",
- "privacyPolicyURL": "https://www.scalekit.com/privacy",
- "termsOfServiceURL": "https://www.scalekit.com/terms",
- "defaultPrompt": [
- "Add Scalekit OAuth 2.1 auth to this MCP server.",
- "Review this MCP auth flow for missing security steps.",
- "Set up protected-resource metadata for my MCP server."
- ],
- "brandColor": "#0F766E"
- }
-}
diff --git a/plugins/mcp-auth/.mcp.json b/plugins/mcp-auth/.mcp.json
deleted file mode 100644
index ffaff7a..0000000
--- a/plugins/mcp-auth/.mcp.json
+++ /dev/null
@@ -1,12 +0,0 @@
-{
- "mcpServers": {
- "scalekit": {
- "command": "npx",
- "args": [
- "-y",
- "mcp-remote",
- "https://mcp.scalekit.com"
- ]
- }
- }
-}
diff --git a/plugins/mcp-auth/README.md b/plugins/mcp-auth/README.md
deleted file mode 100644
index 494fde3..0000000
--- a/plugins/mcp-auth/README.md
+++ /dev/null
@@ -1,48 +0,0 @@
-# MCP Auth
-
-`mcp-auth` helps Codex add OAuth 2.1 authorization to MCP servers using Scalekit. It is the plugin to use when you need protected tools for Claude Desktop, Cursor, VS Code, or any other MCP host that expects standards-based auth.
-
-## Use This Plugin When
-
-- your MCP server needs OAuth 2.1 protection
-- you need `/.well-known/oauth-protected-resource`
-- you need token validation middleware with Scalekit
-- you want a review of an existing MCP auth flow before launch
-
-## Primary Skill
-
-- `adding-mcp-oauth`
-
-## Additional Skills
-
-- `mcp-auth`
-- `mcp-oauth-fastmcp`
-- `express-mcp-server`
-- `fastapi-fastmcp`
-- `production-readiness-scalekit`
-
-Try asking Codex:
-
-- `Add Scalekit OAuth 2.1 auth to this MCP server`
-- `Implement protected-resource metadata for my MCP server`
-- `Review this MCP auth integration for missing security steps`
-
-## Configuration
-
-- `SCALEKIT_ENVIRONMENT_URL`
-- `SCALEKIT_CLIENT_ID`
-- `SCALEKIT_CLIENT_SECRET`
-
-The plugin also ships [`./.mcp.json`](/Users/saif/Projects/ai-first/codex-auth-stack/plugins/mcp-auth/.mcp.json), which points at the remote Scalekit MCP server.
-
-## Reference Docs
-
-- [`references/scalekit-mcp-server.md`](/Users/saif/Projects/ai-first/codex-auth-stack/plugins/mcp-auth/references/scalekit-mcp-server.md)
-- [`references/bring-your-own-auth.md`](/Users/saif/Projects/ai-first/codex-auth-stack/plugins/mcp-auth/references/bring-your-own-auth.md)
-- [`references/redirects.md`](/Users/saif/Projects/ai-first/codex-auth-stack/plugins/mcp-auth/references/redirects.md)
-
-## Troubleshooting
-
-- OAuth-capable MCP auth requires HTTP transport, not stdio transport.
-- Missing or invalid bearer tokens should return `401` plus a `WWW-Authenticate` header that points hosts at your protected-resource metadata.
-- Keep dashboard resource settings and your metadata endpoint aligned before debugging token validation.
diff --git a/plugins/mcp-auth/references/redirects.md b/plugins/mcp-auth/references/redirects.md
deleted file mode 100644
index dbe1977..0000000
--- a/plugins/mcp-auth/references/redirects.md
+++ /dev/null
@@ -1,76 +0,0 @@
-# Redirects
-
-Redirects are registered endpoints in Scalekit that control where users are directed during authentication flows. You must configure these endpoints in the Scalekit dashboard before they can be used.
-
-All redirect URIs must be registered under Authentication settings in your Scalekit dashboard. This is a security requirement to prevent unauthorized redirects.
-
-
-## Redirect endpoint types
-
-### Allowed callback URLs
-**Purpose**: Where users are sent after successful authentication to exchange authorization codes and retrieve profile information.
-
-**Example scenario**: A user completes sign-in and Scalekit redirects them to `https://yourapp.com/callback` where your application processes the authentication response.
-
-To add or remove an redirect URL, go to Dashboard > Authentication > Redirects > Allowed Callback URLs.
-
-### Initiate login URL
-**Purpose**: When authentication does not initiate from your application, Scalekit redirects users back to your application's login initiation endpoint. This endpoint should point to a route in your application that ultimately redirects users to Scalekit's `/authorize` endpoint.
-
-**Example scenarios**:
-
-- **Bookmarked login page**: A user bookmarks your login page and visits it directly. Your application detects they're not authenticated and redirects them to Scalekit's authorization endpoint.
-
-- **Organization invitation flow**: A user clicks an invitation link to join an organization. Your application receives the invitation token and redirects the user to Scalekit's authorization endpoint to complete the sign-up process.
-
-- **IdP-initiated SSO**: An administrator initiates single sign-on from their identity provider dashboard. The IdP redirects users to your application, which then redirects them to Scalekit's authorization endpoint to complete authentication.
-
-- **Session expiration**: When a user's session expires or they access a protected resource, they're redirected to `https://yourapp.com/login` which then redirects to Scalekit's authentication endpoint.
-
-### Post logout URL
-**Purpose**: Where users are sent after successfully signing out of your application.
-
-**Example scenario**: After logging out, users are redirected to `https://yourapp.com/goodbye` to confirm their session has ended.
-
-### Back channel logout URL
-**Purpose**: A secure endpoint that receives notifications whenever a user is logged out from Scalekit, regardless of how the logout was initiated — admin triggered, user initiated, or due to session policies like idle timeout.
-
-**Example scenario**: When a user logs out from any application (user-initiated, admin-initiated, or due to session policies like idle timeout), Scalekit sends a logout notification to `https://yourapp.com/logout` to suggest termination of the user's session across all connected applications, ensuring coordinated logout for enhanced security.
-
-### Custom URI schemes
-
-Custom URI schemes allow for redirects, enabling deep linking and native app integrations. Some applications include:
-- **Desktop applications**: Use schemes like `{scheme}://` for native app integration
-- **Mobile apps**: Use schemes like `myapp://` for mobile app deep linking
-
-**Example custom schemes**:
-- `{scheme}://auth/callback` - For custom scheme authentication
-- `myapp://login/callback` - For mobile app authentication
-
-
-## URI validation requirements
-
-Your redirect URIs must meet specific requirements that vary between development and production environments:
-
-| Requirement | Development | Production |
-| ----------- | ----------- | ---------- |
-| Supported schemes | `http`, `https`, `{scheme}` | `https`, `{scheme}` |
-| Localhost support | Allowed | Not allowed |
-| Wildcard domains | Allowed | Not allowed |
-| URI length limit | 256 characters | 256 characters |
-| Query parameters | Not allowed | Not allowed |
-| URL fragments | Not allowed | Not allowed |
-
-
-### Wildcard usage patterns
-
-Wildcards can simplify testing in development environments, but they must follow specific patterns:
-
-| Validation rule | Valid examples | Invalid examples |
-| --------------- | -------------- | ---------------- |
-| Wildcards cannot be used as root-level domains | `https://*.acmecorp.com`, `https://auth-*.acmecorp.com` | `https://*.com` |
-| Only one wildcard character is allowed per URI | `https://*.acmecorp.com` | `https://*.*.acmecorp.com` |
-| Wildcards must be in the hostname component only | `https://*.acmecorp.com` | `https://acmecorp.*.com` |
-| Wildcards must be in the outermost subdomain | `https://*.auth.acmecorp.com` | `https://auth.*.acmecorp.com` |
-
-> **Note**: According to the [OAuth 2.0 specification](https://tools.ietf.org/html/rfc6749#section-3.1.2), redirect URIs must be absolute URIs. For development convenience, Scalekit relaxes this restriction slightly by allowing wildcards in development environments.
diff --git a/plugins/mcp-auth/skills/adding-mcp-oauth/SKILL.md b/plugins/mcp-auth/skills/adding-mcp-oauth/SKILL.md
deleted file mode 100644
index f87a6a2..0000000
--- a/plugins/mcp-auth/skills/adding-mcp-oauth/SKILL.md
+++ /dev/null
@@ -1,118 +0,0 @@
----
-name: adding-mcp-oauth
-description: Guides users through adding OAuth 2.1 authorization to Model Context Protocol servers using Scalekit. Use when the user mentions MCP security, OAuth, protected-resource metadata, MCP hosts like Claude Desktop or Cursor, or a need to secure tools exposed over HTTP.
----
-
-# Adding OAuth 2.1 Authorization To MCP Servers
-
-Use this skill when an MCP server needs standards-based authorization for AI hosts.
-
-## Critical Prerequisite
-
-OAuth-capable MCP auth requires HTTP-based transport. A stdio-only MCP server cannot complete the browser and callback flows needed for OAuth 2.1.
-
-- Node.js: use `StreamableHTTPServerTransport`
-- Python: expose an ASGI app with streamable HTTP support
-- Keep your well-known metadata reachable over HTTPS
-
-## Required Configuration
-
-- `SCALEKIT_ENVIRONMENT_URL`
-- `SCALEKIT_CLIENT_ID`
-- `SCALEKIT_CLIENT_SECRET`
-
-Get these from the Scalekit dashboard after registering the MCP server.
-
-## Working Checklist
-
-```text
-MCP OAuth Setup:
-- [ ] Install Scalekit SDK
-- [ ] Register the MCP server in Scalekit
-- [ ] Publish /.well-known/oauth-protected-resource
-- [ ] Add token validation middleware
-- [ ] Test from an MCP host
-```
-
-## Recommended Flow
-
-1. Confirm the server is already using HTTP transport.
-2. Register the MCP server in Scalekit and enable the features needed for host registration.
-3. Add `/.well-known/oauth-protected-resource` with the authorization server metadata from Scalekit.
-4. Add bearer-token extraction and validation on MCP routes, while leaving well-known endpoints public.
-5. Return `401` with a `WWW-Authenticate` header that points to the protected-resource metadata whenever auth is missing or invalid.
-6. Test from the real host integration instead of only with raw curl requests.
-
-## Node.js Pattern
-
-```ts
-import { Scalekit } from '@scalekit-sdk/node';
-
-const scalekit = new Scalekit(
- process.env.SCALEKIT_ENVIRONMENT_URL!,
- process.env.SCALEKIT_CLIENT_ID!,
- process.env.SCALEKIT_CLIENT_SECRET!
-);
-
-const RESOURCE_ID = 'https://mcp.yourapp.com';
-const METADATA_ENDPOINT =
- 'https://mcp.yourapp.com/.well-known/oauth-protected-resource';
-
-export async function authMiddleware(req, res, next) {
- if (req.path.includes('.well-known')) return next();
-
- const authHeader = req.headers.authorization;
- const token = authHeader?.startsWith('Bearer ')
- ? authHeader.slice('Bearer '.length).trim()
- : null;
-
- if (!token) {
- return res
- .status(401)
- .set(
- 'WWW-Authenticate',
- `Bearer realm="OAuth", resource_metadata="${METADATA_ENDPOINT}"`
- )
- .end();
- }
-
- await scalekit.validateToken(token, { audience: [RESOURCE_ID] });
- next();
-}
-```
-
-## Python Pattern
-
-```python
-from scalekit import ScalekitClient
-import os
-
-client = ScalekitClient(
- env_url=os.getenv("SCALEKIT_ENVIRONMENT_URL"),
- client_id=os.getenv("SCALEKIT_CLIENT_ID"),
- client_secret=os.getenv("SCALEKIT_CLIENT_SECRET"),
-)
-
-RESOURCE_ID = "https://mcp.yourapp.com"
-
-async def verify_token(token: str):
- return client.validate_access_token(token, {"audience": [RESOURCE_ID]})
-```
-
-## Protected-Resource Metadata
-
-Your metadata endpoint should include:
-
-- `authorization_servers`
-- `bearer_methods_supported`
-- `resource`
-- `resource_documentation`
-- `scopes_supported`
-
-Source these values from the Scalekit dashboard for the registered MCP resource instead of inventing them manually.
-
-## Guardrails
-
-- Never implement OAuth on top of stdio transport and expect hosts to make it work.
-- Keep the resource identifier used in token validation aligned with the resource metadata you publish.
-- Treat missing tokens, expired tokens, and wrong audiences as host-facing auth errors with actionable responses.
diff --git a/plugins/mcp-auth/skills/production-readiness-scalekit/SKILL.md b/plugins/mcp-auth/skills/production-readiness-scalekit/SKILL.md
deleted file mode 100644
index c3e4583..0000000
--- a/plugins/mcp-auth/skills/production-readiness-scalekit/SKILL.md
+++ /dev/null
@@ -1,62 +0,0 @@
----
-name: production-readiness-scalekit
-description: Walks through a structured production readiness checklist for Scalekit MCP authentication implementations. Use when the user says they are going live, launching to production, doing a pre-launch review, or wants to verify their MCP server authentication is production-ready.
----
-
-# Scalekit MCP Auth Production Readiness
-
-Work through each section in order — earlier sections are blockers for later ones.
-
----
-
-## Quick checks (run first)
-
-- [ ] Production environment URL, client ID, and client secret are set (not dev/staging values)
-- [ ] HTTPS enforced on all auth endpoints
-- [ ] CORS restricted to your domains only
-- [ ] API credentials stored in environment variables — never committed to code
-
----
-
-## Core auth flows
-
-- [ ] Test login initiation with authorization URL
-- [ ] Validate redirect URLs match dashboard configuration exactly
-- [ ] Test authentication completion and code exchange
-- [ ] Validate `state` parameter in callbacks (CSRF protection)
-- [ ] Verify session token storage uses `httpOnly`, `secure`, and `sameSite` flags
-- [ ] Configure token lifetimes for your security requirements
-- [ ] Test session timeout and automatic token refresh
-- [ ] Verify logout clears sessions completely
-- [ ] Expired tokens handled gracefully
-- [ ] Network failures show user-friendly messages
-
----
-
-## MCP authentication
-
-- [ ] Test MCP server authentication flow end-to-end
-- [ ] Verify OAuth consent screen displays correctly for MCP clients
-- [ ] Test token exchange for MCP connections
-- [ ] Verify resource metadata published at `/.well-known/oauth-protected-resource`
-- [ ] Test MCP session management (session creation, expiry, refresh)
-- [ ] Verify custom auth handlers behave correctly (if using)
-- [ ] Test MCP client reconnection after token expiry
-- [ ] Verify scopes are correctly enforced per MCP tool/resource
-
----
-
-## Monitoring and incident readiness
-
-- [ ] Auth logs monitoring configured in **Dashboard > Auth Logs**
-- [ ] Alerts set for suspicious activity (repeated auth failures, unusual access patterns)
-- [ ] Error tracking configured for authentication failures
-- [ ] Log retention policies configured
-- [ ] Incident response runbook written (who to contact, how to roll back)
-- [ ] Rollback plan ready (disable MCP auth without breaking existing sessions)
-
-**Key metrics:**
-- MCP auth success/failure rates
-- Token exchange latency
-- Session creation and duration
-- Token refresh frequency
diff --git a/plugins/modular-scim/.codex-plugin/plugin.json b/plugins/modular-scim/.codex-plugin/plugin.json
deleted file mode 100644
index 98b5e32..0000000
--- a/plugins/modular-scim/.codex-plugin/plugin.json
+++ /dev/null
@@ -1,42 +0,0 @@
-{
- "name": "modular-scim",
- "version": "1.2.0",
- "description": "Guides teams through SCIM provisioning with Scalekit using the Directory API and webhooks.",
- "author": {
- "name": "Scalekit Inc",
- "email": "support@scalekit.com",
- "url": "https://scalekit.com"
- },
- "homepage": "https://docs.scalekit.com",
- "repository": "https://github.com/scalekit-inc/claude-code-authstack",
- "license": "MIT",
- "keywords": [
- "scim",
- "provisioning",
- "webhooks",
- "users",
- "groups"
- ],
- "skills": "./skills/",
- "mcpServers": "./.mcp.json",
- "interface": {
- "displayName": "Modular SCIM",
- "shortDescription": "Add provisioning and lifecycle sync with Scalekit.",
- "longDescription": "Covers SCIM-style provisioning workflows with Scalekit Directory API sync, webhook handling, admin portal setup, production-readiness checks, event mapping, and operational guardrails.",
- "developerName": "Scalekit",
- "category": "Provisioning",
- "capabilities": [
- "Interactive",
- "Write"
- ],
- "websiteURL": "https://docs.scalekit.com",
- "privacyPolicyURL": "https://www.scalekit.com/privacy",
- "termsOfServiceURL": "https://www.scalekit.com/terms",
- "defaultPrompt": [
- "Add Scalekit SCIM provisioning to this app.",
- "Implement a Scalekit webhook endpoint for directory sync.",
- "Review my user provisioning and deprovisioning flow."
- ],
- "brandColor": "#BE123C"
- }
-}
diff --git a/plugins/modular-scim/.mcp.json b/plugins/modular-scim/.mcp.json
deleted file mode 100644
index 36dbbf4..0000000
--- a/plugins/modular-scim/.mcp.json
+++ /dev/null
@@ -1,8 +0,0 @@
-{
- "mcpServers": {
- "scalekit": {
- "command": "npx",
- "args": ["-y", "mcp-remote", "https://mcp.scalekit.com"]
- }
- }
-}
diff --git a/plugins/modular-scim/README.md b/plugins/modular-scim/README.md
deleted file mode 100644
index a83a7fc..0000000
--- a/plugins/modular-scim/README.md
+++ /dev/null
@@ -1,45 +0,0 @@
-# Modular SCIM
-
-`modular-scim` helps Codex add provisioning and deprovisioning with Scalekit Directory APIs and webhooks. It is for products that want user lifecycle sync without rewriting their existing application user model.
-
-## Use This Plugin When
-
-- you need SCIM-style user provisioning
-- you need directory user and group sync
-- you need a webhook endpoint for lifecycle events
-- you want to review event mapping and idempotency
-
-## Primary Skill
-
-- `implementing-scim-provisioning`
-
-## Additional Skills
-
-- `modular-scim`
-- `implementing-admin-portal`
-- `production-readiness-scalekit`
-
-Try asking Codex:
-
-- `Add Scalekit SCIM provisioning to this app`
-- `Implement a Scalekit webhook endpoint for directory sync`
-- `Review my user deprovisioning flow`
-
-## Configuration
-
-- `SCALEKIT_ENVIRONMENT_URL`
-- `SCALEKIT_CLIENT_ID`
-- `SCALEKIT_CLIENT_SECRET`
-- `SCALEKIT_WEBHOOK_SECRET`
-
-The plugin also ships [`./.mcp.json`](/Users/saif/Projects/ai-first/codex-auth-stack/plugins/modular-scim/.mcp.json), which points at the remote Scalekit MCP server.
-
-## Reference Docs
-
-- [`references/redirects.md`](/Users/saif/Projects/ai-first/codex-auth-stack/plugins/modular-scim/references/redirects.md)
-
-## Troubleshooting
-
-- Always verify webhook signatures before processing payloads.
-- Prefer idempotent upsert and deactivate operations to avoid duplicate-event surprises.
-- Keep webhook processing lightweight and move slow work to background jobs if delivery retries start piling up.
diff --git a/plugins/modular-scim/references/redirects.md b/plugins/modular-scim/references/redirects.md
deleted file mode 100644
index dbe1977..0000000
--- a/plugins/modular-scim/references/redirects.md
+++ /dev/null
@@ -1,76 +0,0 @@
-# Redirects
-
-Redirects are registered endpoints in Scalekit that control where users are directed during authentication flows. You must configure these endpoints in the Scalekit dashboard before they can be used.
-
-All redirect URIs must be registered under Authentication settings in your Scalekit dashboard. This is a security requirement to prevent unauthorized redirects.
-
-
-## Redirect endpoint types
-
-### Allowed callback URLs
-**Purpose**: Where users are sent after successful authentication to exchange authorization codes and retrieve profile information.
-
-**Example scenario**: A user completes sign-in and Scalekit redirects them to `https://yourapp.com/callback` where your application processes the authentication response.
-
-To add or remove an redirect URL, go to Dashboard > Authentication > Redirects > Allowed Callback URLs.
-
-### Initiate login URL
-**Purpose**: When authentication does not initiate from your application, Scalekit redirects users back to your application's login initiation endpoint. This endpoint should point to a route in your application that ultimately redirects users to Scalekit's `/authorize` endpoint.
-
-**Example scenarios**:
-
-- **Bookmarked login page**: A user bookmarks your login page and visits it directly. Your application detects they're not authenticated and redirects them to Scalekit's authorization endpoint.
-
-- **Organization invitation flow**: A user clicks an invitation link to join an organization. Your application receives the invitation token and redirects the user to Scalekit's authorization endpoint to complete the sign-up process.
-
-- **IdP-initiated SSO**: An administrator initiates single sign-on from their identity provider dashboard. The IdP redirects users to your application, which then redirects them to Scalekit's authorization endpoint to complete authentication.
-
-- **Session expiration**: When a user's session expires or they access a protected resource, they're redirected to `https://yourapp.com/login` which then redirects to Scalekit's authentication endpoint.
-
-### Post logout URL
-**Purpose**: Where users are sent after successfully signing out of your application.
-
-**Example scenario**: After logging out, users are redirected to `https://yourapp.com/goodbye` to confirm their session has ended.
-
-### Back channel logout URL
-**Purpose**: A secure endpoint that receives notifications whenever a user is logged out from Scalekit, regardless of how the logout was initiated — admin triggered, user initiated, or due to session policies like idle timeout.
-
-**Example scenario**: When a user logs out from any application (user-initiated, admin-initiated, or due to session policies like idle timeout), Scalekit sends a logout notification to `https://yourapp.com/logout` to suggest termination of the user's session across all connected applications, ensuring coordinated logout for enhanced security.
-
-### Custom URI schemes
-
-Custom URI schemes allow for redirects, enabling deep linking and native app integrations. Some applications include:
-- **Desktop applications**: Use schemes like `{scheme}://` for native app integration
-- **Mobile apps**: Use schemes like `myapp://` for mobile app deep linking
-
-**Example custom schemes**:
-- `{scheme}://auth/callback` - For custom scheme authentication
-- `myapp://login/callback` - For mobile app authentication
-
-
-## URI validation requirements
-
-Your redirect URIs must meet specific requirements that vary between development and production environments:
-
-| Requirement | Development | Production |
-| ----------- | ----------- | ---------- |
-| Supported schemes | `http`, `https`, `{scheme}` | `https`, `{scheme}` |
-| Localhost support | Allowed | Not allowed |
-| Wildcard domains | Allowed | Not allowed |
-| URI length limit | 256 characters | 256 characters |
-| Query parameters | Not allowed | Not allowed |
-| URL fragments | Not allowed | Not allowed |
-
-
-### Wildcard usage patterns
-
-Wildcards can simplify testing in development environments, but they must follow specific patterns:
-
-| Validation rule | Valid examples | Invalid examples |
-| --------------- | -------------- | ---------------- |
-| Wildcards cannot be used as root-level domains | `https://*.acmecorp.com`, `https://auth-*.acmecorp.com` | `https://*.com` |
-| Only one wildcard character is allowed per URI | `https://*.acmecorp.com` | `https://*.*.acmecorp.com` |
-| Wildcards must be in the hostname component only | `https://*.acmecorp.com` | `https://acmecorp.*.com` |
-| Wildcards must be in the outermost subdomain | `https://*.auth.acmecorp.com` | `https://auth.*.acmecorp.com` |
-
-> **Note**: According to the [OAuth 2.0 specification](https://tools.ietf.org/html/rfc6749#section-3.1.2), redirect URIs must be absolute URIs. For development convenience, Scalekit relaxes this restriction slightly by allowing wildcards in development environments.
diff --git a/plugins/modular-scim/skills/implementing-admin-portal/SKILL.md b/plugins/modular-scim/skills/implementing-admin-portal/SKILL.md
deleted file mode 100644
index a12fb3a..0000000
--- a/plugins/modular-scim/skills/implementing-admin-portal/SKILL.md
+++ /dev/null
@@ -1,155 +0,0 @@
----
-name: implementing-admin-portal
-description: Implements Scalekit's admin portal for customer self-serve SSO and SCIM configuration. Generates portal links server-side and embeds the portal as an iframe in the app's settings UI. Use when the user asks to add an admin portal, customer self-serve SCIM setup, iframe embed for directory sync config, shareable setup link, or let customers configure their own SSO or SCIM connection.
----
-
-# Admin Portal with Scalekit
-
-Adds a self-serve portal where customers configure their own SSO and SCIM settings — embedded inside your app's settings UI.
-
-If the user only needs a quick shareable link with no code (e.g., for a one-time onboarding call), skip to the **Shareable link** section at the bottom.
-
----
-
-## Implementation progress
-
-```
-Admin Portal Implementation Progress:
-- [ ] Step 1: Install SDK
-- [ ] Step 2: Set environment credentials
-- [ ] Step 3: Register app domain in dashboard
-- [ ] Step 4: Generate portal link (server-side)
-- [ ] Step 5: Render iframe (client-side)
-- [ ] Step 6: Handle session expiry events
-- [ ] Step 7: Verify portal loads and events fire correctly
-```
-
----
-
-## Step 1: Install SDK
-
-Detect the project's language/framework from existing files and install:
-
-| Stack | Install |
-|---------|---------|
-| Node.js | `npm install @scalekit-sdk/node` |
-| Python | `pip install scalekit-sdk` |
-| Go | `go get github.com/scalekit/scalekit-go` |
-| Java | Add `com.scalekit:scalekit-sdk` to `pom.xml` |
-
----
-
-## Step 2: Set environment credentials
-
-Add to `.env` (never hardcode):
-
-```shell
-SCALEKIT_ENVIRONMENT_URL='https://.scalekit.com'
-SCALEKIT_CLIENT_ID=''
-SCALEKIT_CLIENT_SECRET=''
-```
-
-Credentials are in **Dashboard > Developers > Settings > API Credentials**.
-
----
-
-## Step 3: Register app domain
-
-In **Dashboard > Developers > API Configuration > Redirect URIs**, add the domain where the portal will be embedded. The iframe will be blocked if this is missing.
-
----
-
-## Step 4: Generate the portal link (server-side)
-
-Generate a new link on every page load — links are single-use. Plug into the existing route or controller that serves the settings/admin page:
-
-**Node.js:**
-```javascript
-const { location } = await scalekit.organization.generatePortalLink(organizationId);
-// Pass `location` to the frontend as a template variable or API response
-```
-
-**Python:**
-```python
-portal = scalekit_client.organization.generate_portal_link(organization_id)
-location = portal.location
-# Pass `location` to your template or JSON response
-```
-
-**Never cache this value** — each link is single-use and will fail if reused.
-
----
-
-## Step 5: Render the iframe (client-side)
-
-In the frontend settings/admin template, inject `location` as the `src`:
-
-```html
-
-```
-
-Minimum recommended height: **600px**. Match the variable name to the project's existing templating convention.
-
----
-
-## Step 6: Handle portal UI events
-
-Listen for messages from the iframe to react to configuration changes and session expiry:
-
-```javascript
-window.addEventListener('message', (event) => {
- if (event.origin !== process.env.SCALEKIT_ENVIRONMENT_URL) return;
-
- const { type } = event.data;
- switch (type) {
- case 'SCIM_CONFIGURED':
- // Refresh org SCIM status, show success banner, etc.
- break;
- case 'SSO_CONFIGURED':
- // Refresh org SSO status if SSO is also in scope
- break;
- case 'SESSION_EXPIRED':
- // Re-fetch a new portal link and reload the iframe src
- reloadPortalIframe();
- break;
- }
-});
-```
-
-`SESSION_EXPIRED` handling is required — without it the portal silently breaks for long-lived sessions.
-
----
-
-## Step 7: Verify
-
-- [ ] Open the settings page — confirm the iframe renders without console errors
-- [ ] Complete a test SCIM configuration inside the portal — confirm `SCIM_CONFIGURED` fires
-- [ ] Wait for session expiry (or simulate it) — confirm `SESSION_EXPIRED` triggers a link refresh
-- [ ] Confirm portal link is never the same across two page loads (single-use verification)
-
----
-
-## Branding (optional)
-
-Configure at **Dashboard > Settings > Branding**: logo, accent color, favicon. Custom domain support (e.g., `scim.yourapp.com`) is available in the Scalekit dashboard.
-
----
-
-## Guardrails
-
-- **Generate link server-side only** — never expose `CLIENT_SECRET` to the browser
-- **Re-generate on every page load** — caching will break the portal
-- **Register your domain** in Redirect URIs before testing or the iframe will be blocked
-- **Handle `SESSION_EXPIRED`** — re-generate and reload, don't let it fail silently
-
----
-
-## Shareable link (no-code alternative)
-
-For one-time onboarding calls or zero-engineering setup: go to **Dashboard > Organizations**, select the org, click **Generate link**, and share the URL directly. The link gives anyone who has it full access to configure that org's SSO/SCIM settings — use the iframe approach for production. Also share Scalekit's [SCIM setup guides](https://docs.scalekit.com/guides/integrations/scim-integrations/) so the IT admin has provider-specific directory sync steps alongside the portal link.
diff --git a/plugins/modular-scim/skills/implementing-scim-provisioning/SKILL.md b/plugins/modular-scim/skills/implementing-scim-provisioning/SKILL.md
deleted file mode 100644
index 12bb50a..0000000
--- a/plugins/modular-scim/skills/implementing-scim-provisioning/SKILL.md
+++ /dev/null
@@ -1,73 +0,0 @@
----
-name: implementing-scim-provisioning
-description: Implements Scalekit provisioning using the Directory API and webhook events. Use when the user needs user lifecycle sync, SCIM-style provisioning, deprovisioning, or directory-backed group management.
----
-
-# SCIM Provisioning With Scalekit
-
-Use this skill when the application needs automated user lifecycle management without replacing its local data model.
-
-## Required Configuration
-
-- `SCALEKIT_ENVIRONMENT_URL`
-- `SCALEKIT_CLIENT_ID`
-- `SCALEKIT_CLIENT_SECRET`
-- `SCALEKIT_WEBHOOK_SECRET`
-
-## Working Checklist
-
-```text
-SCIM Provisioning:
-- [ ] Install and initialize the Scalekit SDK
-- [ ] Add Directory API sync
-- [ ] Add a webhook endpoint
-- [ ] Verify webhook signatures
-- [ ] Map directory events to local user operations
-- [ ] Test create, update, and deactivate flows
-```
-
-## Node.js Sketch
-
-```ts
-const directory = await scalekit.directory.getPrimaryDirectoryByOrganizationId(
- orgId
-);
-const { users } = await scalekit.directory.listDirectoryUsers(orgId, directory.id);
-
-for (const user of users) {
- await upsertUser({ email: user.email, name: user.name, orgId });
-}
-```
-
-```ts
-app.post('/webhooks/scalekit', async (req, res) => {
- try {
- await scalekit.verifyWebhookPayload(
- process.env.SCALEKIT_WEBHOOK_SECRET,
- req.headers,
- req.body
- );
- } catch {
- return res.status(400).json({ error: 'Invalid signature' });
- }
-
- await handleDirectoryEvent(req.body.type, req.body.data);
- res.status(201).json({ status: 'processed' });
-});
-```
-
-## Event Mapping Guidance
-
-Map incoming events to the app's existing user and group operations:
-
-- `organization.directory.user_created` -> create or upsert the user
-- `organization.directory.user_updated` -> update the local record
-- `organization.directory.user_deleted` -> prefer deactivation over hard deletion
-- group events -> sync roles, memberships, or permissions
-
-## Operational Guardrails
-
-- Verify webhook signatures before touching application state.
-- Keep handlers idempotent because webhook retries happen.
-- Return success quickly and move slow downstream work to a queue if needed.
-- Reuse the application's existing user-management functions instead of creating a parallel lifecycle path.
diff --git a/plugins/modular-scim/skills/production-readiness-scalekit/SKILL.md b/plugins/modular-scim/skills/production-readiness-scalekit/SKILL.md
deleted file mode 100644
index dca5b5f..0000000
--- a/plugins/modular-scim/skills/production-readiness-scalekit/SKILL.md
+++ /dev/null
@@ -1,86 +0,0 @@
----
-name: production-readiness-scalekit
-description: Walks through a structured production readiness checklist for Scalekit SCIM provisioning implementations. Use when the user says they are going live, launching to production, doing a pre-launch review, or wants to verify their SCIM directory sync implementation is production-ready.
----
-
-# Scalekit SCIM Production Readiness
-
-Work through each section in order — earlier sections are blockers for later ones.
-
----
-
-## Quick checks (run first)
-
-- [ ] Production environment URL, client ID, and client secret are set (not dev/staging values)
-- [ ] HTTPS enforced on all endpoints
-- [ ] API credentials stored in environment variables — never committed to code
-- [ ] Webhook secret stored in environment variables — never committed to code
-
----
-
-## SCIM provisioning
-
-- [ ] Configure webhook endpoints to receive SCIM events
- → IT admin setup guides per IdP: https://docs.scalekit.com/guides/integrations/scim-integrations/
-- [ ] Verify webhook security with signature validation on every request
-- [ ] Test user provisioning (automatic creation from IdP)
-- [ ] Test user deprovisioning (deactivation/deletion when removed in IdP)
-- [ ] Test user profile updates (name, email, attributes synced correctly)
-- [ ] Test role changes propagated via group membership
-- [ ] Set up group-based role assignment and sync
-- [ ] Test error cases: duplicate users, invalid data, missing required fields
-- [ ] Verify idempotent handling — duplicate events must not create duplicate records
-- [ ] Deactivation preferred over hard deletion for `user_deleted` events
-
-**Webhook reliability:**
-- [ ] Webhook endpoint returns 2xx quickly — offload heavy processing to a queue if needed
-- [ ] Scalekit retries on non-2xx with exponential backoff (up to 8 attempts over ~10 hours)
-- [ ] Tested webhook delivery end-to-end with a real IdP or Scalekit's test tool
-
----
-
-## User and organization management
-
-- [ ] Test organization creation and domain assignment
-- [ ] Test adding and removing users from organizations
-- [ ] Set allowed email domains for org provisioning (if applicable)
-- [ ] Set default roles for auto-provisioned users
-- [ ] Test user deletion flow
-
-**RBAC (if implemented):**
-- [ ] Define roles and permissions that map to IdP groups
-- [ ] Test role assignment via group membership sync
-- [ ] Verify permission enforcement at API endpoints
-- [ ] Test access control across all role levels
-
----
-
-## Network and firewall
-
-Enterprise customers behind VPN or corporate firewall must whitelist:
-
-| Domain | Purpose |
-|---|---|
-| `.scalekit.com` | Directory API + webhook delivery |
-| `cdn.scalekit.com` | Static assets |
-
-- [ ] Customer firewalls allow Scalekit domains
-- [ ] SCIM provisioning tested from customer's network environment
-
----
-
-## Monitoring and incident readiness
-
-- [ ] Webhook event monitoring and logging active
-- [ ] Error tracking configured for provisioning failures
-- [ ] Alerts configured for failed webhook deliveries
-- [ ] Log retention policies configured
-- [ ] Webhook delivery and retry mechanism tested
-- [ ] Incident response runbook written (who to contact, how to roll back)
-- [ ] Rollback plan ready (disable SCIM sync without breaking existing users)
-
-**Key metrics:**
-- Webhook delivery success rate
-- User provisioning/deprovisioning latency
-- Failed sync events (by type and error)
-- Group-to-role mapping accuracy
diff --git a/plugins/modular-sso/.codex-plugin/plugin.json b/plugins/modular-sso/.codex-plugin/plugin.json
deleted file mode 100644
index 8c6e2e3..0000000
--- a/plugins/modular-sso/.codex-plugin/plugin.json
+++ /dev/null
@@ -1,42 +0,0 @@
-{
- "name": "modular-sso",
- "version": "1.2.0",
- "description": "Guides teams through Modular SSO with Scalekit when the app already manages users and sessions.",
- "author": {
- "name": "Scalekit Inc",
- "email": "support@scalekit.com",
- "url": "https://scalekit.com"
- },
- "homepage": "https://docs.scalekit.com",
- "repository": "https://github.com/scalekit-inc/claude-code-authstack",
- "license": "MIT",
- "keywords": [
- "sso",
- "saml",
- "oidc",
- "authentication",
- "enterprise"
- ],
- "skills": "./skills/",
- "mcpServers": "./.mcp.json",
- "interface": {
- "displayName": "Modular SSO",
- "shortDescription": "Add enterprise SSO without replacing your app stack.",
- "longDescription": "Helps implement connection-based SSO, IdP-initiated login handling, enterprise onboarding, admin portal setup, and production-readiness while preserving existing user and session management.",
- "developerName": "Scalekit",
- "category": "Enterprise SSO",
- "capabilities": [
- "Interactive",
- "Write"
- ],
- "websiteURL": "https://docs.scalekit.com",
- "privacyPolicyURL": "https://www.scalekit.com/privacy",
- "termsOfServiceURL": "https://www.scalekit.com/terms",
- "defaultPrompt": [
- "Add modular enterprise SSO with Scalekit to this app.",
- "Implement IdP-initiated login handling with Scalekit.",
- "Review my SSO onboarding and callback flow."
- ],
- "brandColor": "#B45309"
- }
-}
diff --git a/plugins/modular-sso/.mcp.json b/plugins/modular-sso/.mcp.json
deleted file mode 100644
index 36dbbf4..0000000
--- a/plugins/modular-sso/.mcp.json
+++ /dev/null
@@ -1,8 +0,0 @@
-{
- "mcpServers": {
- "scalekit": {
- "command": "npx",
- "args": ["-y", "mcp-remote", "https://mcp.scalekit.com"]
- }
- }
-}
diff --git a/plugins/modular-sso/README.md b/plugins/modular-sso/README.md
deleted file mode 100644
index 9e1bce0..0000000
--- a/plugins/modular-sso/README.md
+++ /dev/null
@@ -1,43 +0,0 @@
-# Modular SSO
-
-`modular-sso` helps Codex implement enterprise SSO with Scalekit for applications that already manage their own users and sessions. It focuses on connection selection, callback handling, IdP-initiated login, and enterprise onboarding.
-
-## Use This Plugin When
-
-- your app already has user/session management
-- you need SAML or OIDC enterprise SSO
-- you need IdP-initiated login support
-- you want guidance on onboarding customers to the right SSO connection
-
-## Primary Skill
-
-- `modular-sso`
-
-## Additional Skills
-
-- `implementing-admin-portal`
-- `production-readiness-scalekit`
-
-Try asking Codex:
-
-- `Add enterprise SSO with Scalekit to this app`
-- `Implement IdP-initiated login handling`
-- `Review my modular SSO callback flow`
-
-## Configuration
-
-- `SCALEKIT_ENVIRONMENT_URL`
-- `SCALEKIT_CLIENT_ID`
-- `SCALEKIT_CLIENT_SECRET`
-
-The plugin also ships [`./.mcp.json`](/Users/saif/Projects/ai-first/codex-auth-stack/plugins/modular-sso/.mcp.json), which points at the remote Scalekit MCP server.
-
-## Reference Docs
-
-- [`references/redirects.md`](/Users/saif/Projects/ai-first/codex-auth-stack/plugins/modular-sso/references/redirects.md)
-
-## Troubleshooting
-
-- Disable Full-Stack Auth in the dashboard before implementing Modular SSO flows.
-- Decide whether you route users by `connectionId`, `organizationId`, or `loginHint` and keep that choice consistent.
-- IdP-initiated login usually fails when the initiate-login endpoint or relay-state handling is incomplete.
diff --git a/plugins/modular-sso/references/redirects.md b/plugins/modular-sso/references/redirects.md
deleted file mode 100644
index dbe1977..0000000
--- a/plugins/modular-sso/references/redirects.md
+++ /dev/null
@@ -1,76 +0,0 @@
-# Redirects
-
-Redirects are registered endpoints in Scalekit that control where users are directed during authentication flows. You must configure these endpoints in the Scalekit dashboard before they can be used.
-
-All redirect URIs must be registered under Authentication settings in your Scalekit dashboard. This is a security requirement to prevent unauthorized redirects.
-
-
-## Redirect endpoint types
-
-### Allowed callback URLs
-**Purpose**: Where users are sent after successful authentication to exchange authorization codes and retrieve profile information.
-
-**Example scenario**: A user completes sign-in and Scalekit redirects them to `https://yourapp.com/callback` where your application processes the authentication response.
-
-To add or remove an redirect URL, go to Dashboard > Authentication > Redirects > Allowed Callback URLs.
-
-### Initiate login URL
-**Purpose**: When authentication does not initiate from your application, Scalekit redirects users back to your application's login initiation endpoint. This endpoint should point to a route in your application that ultimately redirects users to Scalekit's `/authorize` endpoint.
-
-**Example scenarios**:
-
-- **Bookmarked login page**: A user bookmarks your login page and visits it directly. Your application detects they're not authenticated and redirects them to Scalekit's authorization endpoint.
-
-- **Organization invitation flow**: A user clicks an invitation link to join an organization. Your application receives the invitation token and redirects the user to Scalekit's authorization endpoint to complete the sign-up process.
-
-- **IdP-initiated SSO**: An administrator initiates single sign-on from their identity provider dashboard. The IdP redirects users to your application, which then redirects them to Scalekit's authorization endpoint to complete authentication.
-
-- **Session expiration**: When a user's session expires or they access a protected resource, they're redirected to `https://yourapp.com/login` which then redirects to Scalekit's authentication endpoint.
-
-### Post logout URL
-**Purpose**: Where users are sent after successfully signing out of your application.
-
-**Example scenario**: After logging out, users are redirected to `https://yourapp.com/goodbye` to confirm their session has ended.
-
-### Back channel logout URL
-**Purpose**: A secure endpoint that receives notifications whenever a user is logged out from Scalekit, regardless of how the logout was initiated — admin triggered, user initiated, or due to session policies like idle timeout.
-
-**Example scenario**: When a user logs out from any application (user-initiated, admin-initiated, or due to session policies like idle timeout), Scalekit sends a logout notification to `https://yourapp.com/logout` to suggest termination of the user's session across all connected applications, ensuring coordinated logout for enhanced security.
-
-### Custom URI schemes
-
-Custom URI schemes allow for redirects, enabling deep linking and native app integrations. Some applications include:
-- **Desktop applications**: Use schemes like `{scheme}://` for native app integration
-- **Mobile apps**: Use schemes like `myapp://` for mobile app deep linking
-
-**Example custom schemes**:
-- `{scheme}://auth/callback` - For custom scheme authentication
-- `myapp://login/callback` - For mobile app authentication
-
-
-## URI validation requirements
-
-Your redirect URIs must meet specific requirements that vary between development and production environments:
-
-| Requirement | Development | Production |
-| ----------- | ----------- | ---------- |
-| Supported schemes | `http`, `https`, `{scheme}` | `https`, `{scheme}` |
-| Localhost support | Allowed | Not allowed |
-| Wildcard domains | Allowed | Not allowed |
-| URI length limit | 256 characters | 256 characters |
-| Query parameters | Not allowed | Not allowed |
-| URL fragments | Not allowed | Not allowed |
-
-
-### Wildcard usage patterns
-
-Wildcards can simplify testing in development environments, but they must follow specific patterns:
-
-| Validation rule | Valid examples | Invalid examples |
-| --------------- | -------------- | ---------------- |
-| Wildcards cannot be used as root-level domains | `https://*.acmecorp.com`, `https://auth-*.acmecorp.com` | `https://*.com` |
-| Only one wildcard character is allowed per URI | `https://*.acmecorp.com` | `https://*.*.acmecorp.com` |
-| Wildcards must be in the hostname component only | `https://*.acmecorp.com` | `https://acmecorp.*.com` |
-| Wildcards must be in the outermost subdomain | `https://*.auth.acmecorp.com` | `https://auth.*.acmecorp.com` |
-
-> **Note**: According to the [OAuth 2.0 specification](https://tools.ietf.org/html/rfc6749#section-3.1.2), redirect URIs must be absolute URIs. For development convenience, Scalekit relaxes this restriction slightly by allowing wildcards in development environments.
diff --git a/plugins/modular-sso/skills/implementing-admin-portal/SKILL.md b/plugins/modular-sso/skills/implementing-admin-portal/SKILL.md
deleted file mode 100644
index 7bbfd19..0000000
--- a/plugins/modular-sso/skills/implementing-admin-portal/SKILL.md
+++ /dev/null
@@ -1,153 +0,0 @@
----
-name: implementing-admin-portal
-description: Implements Scalekit's admin portal for customer self-serve SSO and SCIM configuration. Generates portal links server-side and embeds the portal as an iframe in the app's settings UI. Use when the user asks to add an admin portal, customer self-serve SSO setup, iframe embed for SSO config, shareable setup link, or let customers configure their own SSO or SCIM connection.
----
-
-# Admin Portal with Scalekit
-
-Adds a self-serve portal where customers configure their own SSO and SCIM settings — embedded inside your app's settings UI.
-
-If the user only needs a quick shareable link with no code (e.g., for a one-time onboarding call), skip to the **Shareable link** section at the bottom.
-
----
-
-## Implementation progress
-
-```
-Admin Portal Implementation Progress:
-- [ ] Step 1: Install SDK
-- [ ] Step 2: Set environment credentials
-- [ ] Step 3: Register app domain in dashboard
-- [ ] Step 4: Generate portal link (server-side)
-- [ ] Step 5: Render iframe (client-side)
-- [ ] Step 6: Handle session expiry events
-- [ ] Step 7: Verify portal loads and events fire correctly
-```
-
----
-
-## Step 1: Install SDK
-
-Detect the project's language/framework from existing files and install:
-
-| Stack | Install |
-|---------|---------|
-| Node.js | `npm install @scalekit-sdk/node` |
-| Python | `pip install scalekit-sdk` |
-| Go | `go get github.com/scalekit/scalekit-go` |
-| Java | Add `com.scalekit:scalekit-sdk` to `pom.xml` |
-
----
-
-## Step 2: Set environment credentials
-
-Add to `.env` (never hardcode):
-
-```shell
-SCALEKIT_ENVIRONMENT_URL='https://.scalekit.com'
-SCALEKIT_CLIENT_ID=''
-SCALEKIT_CLIENT_SECRET=''
-```
-
-Credentials are in **Dashboard > Developers > Settings > API Credentials**.
-
----
-
-## Step 3: Register app domain
-
-In **Dashboard > Developers > API Configuration > Redirect URIs**, add the domain where the portal will be embedded. The iframe will be blocked if this is missing.
-
----
-
-## Step 4: Generate the portal link (server-side)
-
-Generate a new link on every page load — links are single-use. Plug into the existing route or controller that serves the settings/admin page:
-
-**Node.js:**
-```javascript
-const { location } = await scalekit.organization.generatePortalLink(organizationId);
-// Pass `location` to the frontend as a template variable or API response
-```
-
-**Python:**
-```python
-portal = scalekit_client.organization.generate_portal_link(organization_id)
-location = portal.location
-# Pass `location` to your template or JSON response
-```
-
-**Never cache this value** — each link is single-use and will fail if reused.
-
----
-
-## Step 5: Render the iframe (client-side)
-
-In the frontend settings/admin template, inject `location` as the `src`:
-
-```html
-
-```
-
-Minimum recommended height: **600px**. Match the variable name to the project's existing templating convention.
-
----
-
-## Step 6: Handle portal UI events
-
-Listen for messages from the iframe to react to configuration changes and session expiry:
-
-```javascript
-window.addEventListener('message', (event) => {
- if (event.origin !== process.env.SCALEKIT_ENVIRONMENT_URL) return;
-
- const { type } = event.data;
- switch (type) {
- case 'SSO_CONFIGURED':
- // Refresh org SSO status, show success banner, etc.
- break;
- case 'SESSION_EXPIRED':
- // Re-fetch a new portal link and reload the iframe src
- reloadPortalIframe();
- break;
- }
-});
-```
-
-`SESSION_EXPIRED` handling is required — without it the portal silently breaks for long-lived sessions.
-
----
-
-## Step 7: Verify
-
-- [ ] Open the settings page — confirm the iframe renders without console errors
-- [ ] Complete a test SSO configuration inside the portal — confirm `SSO_CONFIGURED` fires
-- [ ] Wait for session expiry (or simulate it) — confirm `SESSION_EXPIRED` triggers a link refresh
-- [ ] Confirm portal link is never the same across two page loads (single-use verification)
-
----
-
-## Branding (optional)
-
-Configure at **Dashboard > Settings > Branding**: logo, accent color, favicon. Custom domain support (e.g., `sso.yourapp.com`) is available in the Scalekit dashboard.
-
----
-
-## Guardrails
-
-- **Generate link server-side only** — never expose `CLIENT_SECRET` to the browser
-- **Re-generate on every page load** — caching will break the portal
-- **Register your domain** in Redirect URIs before testing or the iframe will be blocked
-- **Handle `SESSION_EXPIRED`** — re-generate and reload, don't let it fail silently
-
----
-
-## Shareable link (no-code alternative)
-
-For one-time onboarding calls or zero-engineering setup: go to **Dashboard > Organizations**, select the org, click **Generate link**, and share the URL directly. The link gives anyone who has it full access to configure that org's SSO/SCIM settings — use the iframe approach for production. Also share Scalekit's [SSO setup guides](https://docs.scalekit.com/guides/integrations/sso-integrations/) so the IT admin has provider-specific configuration steps alongside the portal link.
-
diff --git a/plugins/modular-sso/skills/production-readiness-scalekit/SKILL.md b/plugins/modular-sso/skills/production-readiness-scalekit/SKILL.md
deleted file mode 100644
index b24ffab..0000000
--- a/plugins/modular-sso/skills/production-readiness-scalekit/SKILL.md
+++ /dev/null
@@ -1,110 +0,0 @@
----
-name: production-readiness-scalekit
-description: Walks through a structured production readiness checklist for Scalekit SSO implementations. Use when the user says they are going live, launching to production, doing a pre-launch review, hardening their SSO setup, or wants to verify their Scalekit implementation is production-ready.
----
-
-# Scalekit SSO Production Readiness
-
-Work through each section in order — earlier sections are blockers for later ones.
-
----
-
-## Quick checks (run first)
-
-- [ ] Production environment URL, client ID, and client secret are set (not dev/staging values)
-- [ ] HTTPS enforced on all auth endpoints
-- [ ] CORS restricted to your domains only
-- [ ] API credentials stored in environment variables — never committed to code
-
----
-
-## Customization
-
-- [ ] Login page branded with logo, colors, styling
-- [ ] Email templates customized (sign-up, password reset, invitations)
-- [ ] Custom domain configured for auth pages (if applicable)
-- [ ] Email provider configured in **Dashboard > Customization > Emails**
-- [ ] Email deliverability tested — check spam folders
-- [ ] Webhooks configured with signature validation
-
----
-
-## Core auth flows
-
-- [ ] Test login initiation with authorization URL
-- [ ] Validate redirect URLs match dashboard configuration exactly
-- [ ] Test authentication completion and code exchange
-- [ ] Validate `state` parameter in callbacks (CSRF protection)
-- [ ] Verify session token storage uses `httpOnly`, `secure`, and `sameSite` flags
-- [ ] Test session timeout and automatic token refresh
-- [ ] Verify logout clears sessions completely
-- [ ] Expired tokens handled gracefully
-- [ ] Network failures show user-friendly messages
-
----
-
-## SSO flows
-
-- [ ] Test SSO with target IdPs: Okta, Azure AD, Google Workspace
- → IT admin setup guides per IdP: https://docs.scalekit.com/guides/integrations/sso-integrations/
-- [ ] Configure user attribute mapping (email, name, groups)
-- [ ] Test both SP-initiated and IdP-initiated SSO flows
-- [ ] Verify SSO error handling for misconfigured connections
-- [ ] Test SSO with: new users, existing users, deactivated users
-
-**JIT provisioning:**
-- [ ] Register all organization domains for JIT provisioning
-- [ ] Configure consistent user identifiers across SSO connections (email or userPrincipalName)
-- [ ] Set default roles for JIT-provisioned users
-- [ ] Enable "Sync user attributes during login"
-- [ ] Plan manual invitation process for contractors/external users with non-matching domains
-- [ ] Set up review process for automatically provisioned users
-
-**Admin portal:**
-- [ ] Configure admin portal access for enterprise customers
-- [ ] Test admin portal SSO configuration flows
-- [ ] Verify user management features in admin portal
-
----
-
-## Organization management
-
-- [ ] Test organization creation
-- [ ] Test adding and removing users from organizations
-- [ ] Set allowed email domains for org sign-ups (if applicable)
-- [ ] Verify organization switching for users in multiple orgs
-- [ ] Test invitation flow and email templates
-
----
-
-## Network and firewall
-
-Enterprise customers behind VPN or corporate firewall must whitelist:
-
-| Domain | Purpose |
-|---|---|
-| `.scalekit.com` | Auth + admin portal |
-| `cdn.scalekit.com` | Static assets |
-| `fonts.googleapis.com` | Font resources |
-
-- [ ] Customer firewalls allow Scalekit domains
-- [ ] SSO tested from customer's network environment
-
----
-
-## Monitoring and incident readiness
-
-- [ ] Auth logs monitoring configured in **Dashboard > Auth Logs**
-- [ ] Alerts set for suspicious activity (multiple failed logins, unusual locations)
-- [ ] Webhook event monitoring and logging active
-- [ ] Error tracking configured for authentication failures
-- [ ] Log retention policies configured
-- [ ] Webhook delivery and retry mechanism tested
-- [ ] Incident response runbook written (who to contact, how to roll back, escalation path)
-- [ ] Rollback plan ready (feature flag to disable SSO flows if needed)
-
-**Key metrics:**
-- Login success/failure rates
-- SSO initiation vs completion rate
-- Session creation and duration
-- Webhook delivery success rate
diff --git a/plugins/saaskit/.codex-plugin/plugin.json b/plugins/saaskit/.codex-plugin/plugin.json
new file mode 100644
index 0000000..8bd3432
--- /dev/null
+++ b/plugins/saaskit/.codex-plugin/plugin.json
@@ -0,0 +1,33 @@
+{
+ "name": "saaskit",
+ "version": "2.0.0",
+ "description": "Production-ready auth for B2B SaaS apps. Login, sessions, SSO, SCIM, MCP server auth, and API key management.",
+ "author": {
+ "name": "Scalekit Inc",
+ "email": "support@scalekit.com",
+ "url": "https://scalekit.com"
+ },
+ "homepage": "https://docs.scalekit.com",
+ "repository": "https://github.com/scalekit-inc/codex-authstack",
+ "license": "MIT",
+ "keywords": ["scalekit", "saaskit", "authentication", "sso", "scim", "mcp-auth", "sessions"],
+ "skills": "./skills/",
+ "mcpServers": "./.mcp.json",
+ "interface": {
+ "displayName": "SaaSKit",
+ "shortDescription": "Production-ready B2B SaaS authentication.",
+ "longDescription": "Production-ready auth for B2B SaaS apps. Login, sessions, SSO (Okta, Azure AD, Google), SCIM provisioning, RBAC, MCP server auth, and API key management.",
+ "developerName": "Scalekit",
+ "category": "Application Auth",
+ "capabilities": ["Interactive", "Write"],
+ "websiteURL": "https://docs.scalekit.com",
+ "privacyPolicyURL": "https://www.scalekit.com/privacy",
+ "termsOfServiceURL": "https://www.scalekit.com/terms",
+ "defaultPrompt": [
+ "Add login and sessions to my app with Scalekit.",
+ "Implement enterprise SSO for my B2B app.",
+ "Add SCIM provisioning to my application."
+ ],
+ "brandColor": "#1D4ED8"
+ }
+}
diff --git a/plugins/full-stack-auth/.mcp.json b/plugins/saaskit/.mcp.json
similarity index 100%
rename from plugins/full-stack-auth/.mcp.json
rename to plugins/saaskit/.mcp.json
diff --git a/plugins/saaskit/README.md b/plugins/saaskit/README.md
new file mode 100644
index 0000000..bddc8c8
--- /dev/null
+++ b/plugins/saaskit/README.md
@@ -0,0 +1,32 @@
+# SaaSKit for Codex
+
+Production-ready auth for B2B SaaS apps. This plugin brings Scalekit SaaSKit into Codex to build production-ready B2B authentication. It covers login, sessions, SSO, SCIM provisioning, MCP server auth, API keys, and more.
+
+## Skills
+
+- `implementing-saaskit` — Core auth flow: login, signup, callback, token exchange, session management, logout. Framework references for Go, Spring Boot, Laravel.
+- `implementing-saaskit-nextjs` — Auth for Next.js App Router.
+- `implementing-saaskit-python` — Auth for Django, FastAPI, or Flask. Framework references included.
+- `implementing-modular-sso` — Enterprise SSO (SAML/OIDC) with 20+ IdPs, admin portal, JIT provisioning.
+- `implementing-scim-provisioning` — SCIM 2.0 webhooks, user/group lifecycle, directory API.
+- `adding-mcp-oauth` — OAuth 2.1 for MCP servers (FastMCP, Express, FastAPI).
+- `implementing-access-control` — RBAC and permission checks.
+- `managing-saaskit-sessions` — Secure session storage, token refresh, session revocation.
+- `migrating-to-saaskit` — Migration planning from Auth0, Firebase, Cognito, or custom auth.
+- `adding-api-auth` — API keys (org/user scoped) and OAuth 2.0 client credentials.
+- `production-readiness-saaskit` — Unified production checklist across all SaaSKit domains.
+
+## Configuration
+
+Required environment variables:
+
+- `SCALEKIT_ENVIRONMENT_URL`
+- `SCALEKIT_CLIENT_ID`
+- `SCALEKIT_CLIENT_SECRET`
+
+## Links
+
+- [Full-stack auth quickstart](https://docs.scalekit.com/authenticate/fsa/quickstart/)
+- [Modular SSO guide](https://docs.scalekit.com/authenticate/sso/add-modular-sso/)
+- [SCIM directory sync](https://docs.scalekit.com/directory/scim/quickstart/)
+- [MCP Auth quickstart](https://docs.scalekit.com/authenticate/mcp/quickstart/)
diff --git a/plugins/mcp-auth/references/bring-your-own-auth.md b/plugins/saaskit/references/bring-your-own-auth.md
similarity index 100%
rename from plugins/mcp-auth/references/bring-your-own-auth.md
rename to plugins/saaskit/references/bring-your-own-auth.md
diff --git a/plugins/full-stack-auth/references/redirects.md b/plugins/saaskit/references/redirects.md
similarity index 100%
rename from plugins/full-stack-auth/references/redirects.md
rename to plugins/saaskit/references/redirects.md
diff --git a/plugins/full-stack-auth/references/scalekit-logs.md b/plugins/saaskit/references/scalekit-logs.md
similarity index 100%
rename from plugins/full-stack-auth/references/scalekit-logs.md
rename to plugins/saaskit/references/scalekit-logs.md
diff --git a/plugins/mcp-auth/references/scalekit-mcp-server.md b/plugins/saaskit/references/scalekit-mcp-server.md
similarity index 100%
rename from plugins/mcp-auth/references/scalekit-mcp-server.md
rename to plugins/saaskit/references/scalekit-mcp-server.md
diff --git a/plugins/full-stack-auth/references/scalekit-user-profiles.md b/plugins/saaskit/references/scalekit-user-profiles.md
similarity index 100%
rename from plugins/full-stack-auth/references/scalekit-user-profiles.md
rename to plugins/saaskit/references/scalekit-user-profiles.md
diff --git a/plugins/full-stack-auth/skills/adding-api-key-auth/SKILL.md b/plugins/saaskit/skills/adding-api-auth/SKILL.md
similarity index 99%
rename from plugins/full-stack-auth/skills/adding-api-key-auth/SKILL.md
rename to plugins/saaskit/skills/adding-api-auth/SKILL.md
index 8b9cfe5..feb8c9a 100644
--- a/plugins/full-stack-auth/skills/adding-api-key-auth/SKILL.md
+++ b/plugins/saaskit/skills/adding-api-auth/SKILL.md
@@ -1,5 +1,5 @@
---
-name: adding-api-key-auth
+name: adding-api-auth
description: >
Creates, validates, lists, and revokes long-lived opaque API keys using
Scalekit for organization-scoped or user-scoped bearer authentication.
diff --git a/plugins/mcp-auth/skills/mcp-auth/SKILL.md b/plugins/saaskit/skills/adding-mcp-oauth/SKILL.md
similarity index 100%
rename from plugins/mcp-auth/skills/mcp-auth/SKILL.md
rename to plugins/saaskit/skills/adding-mcp-oauth/SKILL.md
diff --git a/plugins/mcp-auth/skills/express-mcp-server/SKILL.md b/plugins/saaskit/skills/adding-mcp-oauth/express-reference.md
similarity index 100%
rename from plugins/mcp-auth/skills/express-mcp-server/SKILL.md
rename to plugins/saaskit/skills/adding-mcp-oauth/express-reference.md
diff --git a/plugins/mcp-auth/skills/fastapi-fastmcp/SKILL.md b/plugins/saaskit/skills/adding-mcp-oauth/fastapi-reference.md
similarity index 100%
rename from plugins/mcp-auth/skills/fastapi-fastmcp/SKILL.md
rename to plugins/saaskit/skills/adding-mcp-oauth/fastapi-reference.md
diff --git a/plugins/mcp-auth/skills/add-auth-fastmcp/SKILL.md b/plugins/saaskit/skills/adding-mcp-oauth/fastmcp-reference.md
similarity index 100%
rename from plugins/mcp-auth/skills/add-auth-fastmcp/SKILL.md
rename to plugins/saaskit/skills/adding-mcp-oauth/fastmcp-reference.md
diff --git a/plugins/full-stack-auth/skills/implementing-access-control/SKILL.md b/plugins/saaskit/skills/implementing-access-control/SKILL.md
similarity index 100%
rename from plugins/full-stack-auth/skills/implementing-access-control/SKILL.md
rename to plugins/saaskit/skills/implementing-access-control/SKILL.md
diff --git a/plugins/modular-sso/skills/modular-sso/SKILL.md b/plugins/saaskit/skills/implementing-modular-sso/SKILL.md
similarity index 98%
rename from plugins/modular-sso/skills/modular-sso/SKILL.md
rename to plugins/saaskit/skills/implementing-modular-sso/SKILL.md
index 1775d2e..82a186f 100644
--- a/plugins/modular-sso/skills/modular-sso/SKILL.md
+++ b/plugins/saaskit/skills/implementing-modular-sso/SKILL.md
@@ -1,5 +1,5 @@
---
-name: modular-sso
+name: implementing-modular-sso
description: Implements Modular SSO with Scalekit for applications that already manage their own users and sessions. Use when adding enterprise SSO, SAML, OIDC, IdP-initiated login, or customer onboarding flows.
---
diff --git a/plugins/full-stack-auth/skills/implementing-scalekit-nextjs-auth/SKILL.md b/plugins/saaskit/skills/implementing-saaskit-nextjs/SKILL.md
similarity index 99%
rename from plugins/full-stack-auth/skills/implementing-scalekit-nextjs-auth/SKILL.md
rename to plugins/saaskit/skills/implementing-saaskit-nextjs/SKILL.md
index 3d4ba84..137ee9e 100644
--- a/plugins/full-stack-auth/skills/implementing-scalekit-nextjs-auth/SKILL.md
+++ b/plugins/saaskit/skills/implementing-saaskit-nextjs/SKILL.md
@@ -1,5 +1,5 @@
---
-name: implementing-scalekit-nextjs-auth
+name: implementing-saaskit-nextjs
description: Implements Scalekit authentication in a Next.js App Router project using the patterns from scalekit-inc/scalekit-nextjs-auth-example. Handles login, OAuth callback, session management, token refresh, logout, and permission-based access control using @scalekit-sdk/node. Use when adding auth routes, protecting pages, managing sessions, or checking permissions in a Next.js + Scalekit codebase.
---
diff --git a/plugins/full-stack-auth/skills/implementing-scalekit-django-auth/SKILL.md b/plugins/saaskit/skills/implementing-saaskit-python/SKILL.md
similarity index 99%
rename from plugins/full-stack-auth/skills/implementing-scalekit-django-auth/SKILL.md
rename to plugins/saaskit/skills/implementing-saaskit-python/SKILL.md
index 7fffb09..bad9eea 100644
--- a/plugins/full-stack-auth/skills/implementing-scalekit-django-auth/SKILL.md
+++ b/plugins/saaskit/skills/implementing-saaskit-python/SKILL.md
@@ -1,5 +1,5 @@
---
-name: implementing-scalekit-django-auth
+name: implementing-saaskit-python
description: Implements Scalekit authentication in a Django project using the patterns from scalekit-inc/scalekit-django-auth-example. Handles login, OAuth callback, Django session storage, automatic token refresh via middleware, logout, and permission-based route protection using decorators. Use when adding auth views, protecting URLs, managing sessions, or checking permissions in a Django + Scalekit codebase.
---
diff --git a/plugins/full-stack-auth/skills/implementing-scalekit-fastapi-auth/SKILL.md b/plugins/saaskit/skills/implementing-saaskit-python/fastapi-reference.md
similarity index 100%
rename from plugins/full-stack-auth/skills/implementing-scalekit-fastapi-auth/SKILL.md
rename to plugins/saaskit/skills/implementing-saaskit-python/fastapi-reference.md
diff --git a/plugins/full-stack-auth/skills/implementing-scalekit-flask-auth/SKILL.md b/plugins/saaskit/skills/implementing-saaskit-python/flask-reference.md
similarity index 100%
rename from plugins/full-stack-auth/skills/implementing-scalekit-flask-auth/SKILL.md
rename to plugins/saaskit/skills/implementing-saaskit-python/flask-reference.md
diff --git a/plugins/full-stack-auth/skills/full-stack-auth/SKILL.md b/plugins/saaskit/skills/implementing-saaskit/SKILL.md
similarity index 99%
rename from plugins/full-stack-auth/skills/full-stack-auth/SKILL.md
rename to plugins/saaskit/skills/implementing-saaskit/SKILL.md
index 389d2f1..c57df34 100644
--- a/plugins/full-stack-auth/skills/full-stack-auth/SKILL.md
+++ b/plugins/saaskit/skills/implementing-saaskit/SKILL.md
@@ -1,5 +1,5 @@
---
-name: implementing-scalekit-fsa
+name: implementing-saaskit
description: Implements Scalekit full-stack authentication (FSA) including sign-up, login, logout, and secure session management using JWT tokens. Use when building or integrating user authentication with the Scalekit SDK across Node.js, Python, Go, or Java — or when the user asks about auth flows, OAuth callbacks, token refresh, or session handling with Scalekit.
---
diff --git a/plugins/full-stack-auth/skills/implementing-scalekit-go-auth/SKILL.md b/plugins/saaskit/skills/implementing-saaskit/go-reference.md
similarity index 100%
rename from plugins/full-stack-auth/skills/implementing-scalekit-go-auth/SKILL.md
rename to plugins/saaskit/skills/implementing-saaskit/go-reference.md
diff --git a/plugins/full-stack-auth/skills/implementing-scalekit-laravel-auth/SKILL.md b/plugins/saaskit/skills/implementing-saaskit/laravel-reference.md
similarity index 100%
rename from plugins/full-stack-auth/skills/implementing-scalekit-laravel-auth/SKILL.md
rename to plugins/saaskit/skills/implementing-saaskit/laravel-reference.md
diff --git a/plugins/full-stack-auth/skills/implementing-scalekit-springboot-auth/SKILL.md b/plugins/saaskit/skills/implementing-saaskit/springboot-reference.md
similarity index 100%
rename from plugins/full-stack-auth/skills/implementing-scalekit-springboot-auth/SKILL.md
rename to plugins/saaskit/skills/implementing-saaskit/springboot-reference.md
diff --git a/plugins/modular-scim/skills/modular-scim/SKILL.md b/plugins/saaskit/skills/implementing-scim-provisioning/SKILL.md
similarity index 100%
rename from plugins/modular-scim/skills/modular-scim/SKILL.md
rename to plugins/saaskit/skills/implementing-scim-provisioning/SKILL.md
diff --git a/plugins/full-stack-auth/skills/manage-user-sessions/SKILL.md b/plugins/saaskit/skills/managing-saaskit-sessions/SKILL.md
similarity index 99%
rename from plugins/full-stack-auth/skills/manage-user-sessions/SKILL.md
rename to plugins/saaskit/skills/managing-saaskit-sessions/SKILL.md
index ea94dc5..e6fb8fc 100644
--- a/plugins/full-stack-auth/skills/manage-user-sessions/SKILL.md
+++ b/plugins/saaskit/skills/managing-saaskit-sessions/SKILL.md
@@ -1,5 +1,5 @@
---
-name: managing-user-sessions
+name: managing-saaskit-sessions
description: Manages Scalekit-backed user sessions by securely storing access/refresh/ID tokens (with encryption and correct cookie attributes), validating access tokens on every request, transparently refreshing tokens in middleware, and optionally revoking sessions remotely via Scalekit session APIs. Use when building session persistence for only for web apps. For SPAs this is NOT the skill.
---
diff --git a/plugins/full-stack-auth/skills/migrating-to-scalekit-auth/AUDIT-CHECKLIST.md b/plugins/saaskit/skills/migrating-to-saaskit/AUDIT-CHECKLIST.md
similarity index 100%
rename from plugins/full-stack-auth/skills/migrating-to-scalekit-auth/AUDIT-CHECKLIST.md
rename to plugins/saaskit/skills/migrating-to-saaskit/AUDIT-CHECKLIST.md
diff --git a/plugins/full-stack-auth/skills/migrating-to-scalekit-auth/IMPORT-SAMPLES.md b/plugins/saaskit/skills/migrating-to-saaskit/IMPORT-SAMPLES.md
similarity index 100%
rename from plugins/full-stack-auth/skills/migrating-to-scalekit-auth/IMPORT-SAMPLES.md
rename to plugins/saaskit/skills/migrating-to-saaskit/IMPORT-SAMPLES.md
diff --git a/plugins/full-stack-auth/skills/migrating-to-scalekit-auth/SKILL.md b/plugins/saaskit/skills/migrating-to-saaskit/SKILL.md
similarity index 99%
rename from plugins/full-stack-auth/skills/migrating-to-scalekit-auth/SKILL.md
rename to plugins/saaskit/skills/migrating-to-saaskit/SKILL.md
index 66f84e5..9c670f5 100644
--- a/plugins/full-stack-auth/skills/migrating-to-scalekit-auth/SKILL.md
+++ b/plugins/saaskit/skills/migrating-to-saaskit/SKILL.md
@@ -1,5 +1,5 @@
---
-name: migrating-to-scalekit-auth
+name: migrating-to-saaskit
description: Plans and executes a safe, incremental migration from any existing auth system to Scalekit's full-stack auth platform. Use when the user asks to migrate authentication, replace session middleware, import users/organizations to Scalekit, configure SSO, or set up SCIM provisioning with Scalekit.
---
diff --git a/plugins/saaskit/skills/production-readiness-saaskit/SKILL.md b/plugins/saaskit/skills/production-readiness-saaskit/SKILL.md
new file mode 100644
index 0000000..5a52753
--- /dev/null
+++ b/plugins/saaskit/skills/production-readiness-saaskit/SKILL.md
@@ -0,0 +1,64 @@
+---
+name: production-readiness-saaskit
+description: Walks through a structured production readiness checklist for Scalekit SaaSKit implementations covering authentication, SSO, SCIM, MCP server auth, and API security. Use when going live, launching to production, or doing a pre-launch review.
+---
+
+# SaaSKit Production Readiness
+
+Unified checklist for all SaaSKit domains. Work through in order — skip sections that don't apply.
+
+## Quick checks (run first)
+
+- [ ] Production env URL, client ID, and client secret set (not dev/staging)
+- [ ] HTTPS enforced; CORS restricted to your domains only
+- [ ] All credentials in environment variables — never committed to code
+- [ ] Only enabled auth methods active in production
+
+## Customization
+
+- [ ] Login page branded; email templates customized
+- [ ] Custom domain configured (if applicable); email deliverability tested
+- [ ] Webhooks configured with signature validation
+
+## Core auth flows
+
+- [ ] Login initiation, code exchange, and redirect URLs match dashboard exactly
+- [ ] `state` parameter validated in callbacks (CSRF); tokens stored with `httpOnly`, `secure`, `sameSite`
+- [ ] Token refresh and session timeout working; logout calls Scalekit end-session
+- [ ] Each enabled auth method tested; errors handled gracefully
+
+## SSO (if applicable)
+
+- [ ] SSO tested with target IdPs (Okta, Azure AD, Google Workspace)
+- [ ] SP-initiated and IdP-initiated flows both working
+- [ ] Admin portal configured for self-serve SSO setup
+- [ ] JIT provisioning: domains registered, default roles set, attribute sync enabled
+
+## SCIM provisioning (if applicable)
+
+- [ ] Webhook endpoints receiving events with signature validation
+- [ ] User provisioning, deprovisioning, and profile updates tested
+- [ ] Group-based role sync working; idempotent handling verified
+
+## MCP authentication (if applicable)
+
+- [ ] MCP auth flow tested end-to-end; resource metadata published
+- [ ] Scopes enforced per tool; client reconnection after token expiry working
+
+## Network / firewall
+
+Enterprise VPN customers must whitelist: `.scalekit.com`, `cdn.scalekit.com`, `fonts.googleapis.com`.
+
+## Monitoring
+
+- [ ] Auth logs monitoring active; alerts for suspicious activity configured
+- [ ] Webhook monitoring active; error tracking for auth and provisioning failures
+- [ ] Incident response runbook written; rollback plan ready (feature flag)
+- **Key metrics:** login success/failure rates, session duration, webhook delivery, SSO completion rate
+
+## Deep reference
+
+- [Scalekit Documentation](https://docs.scalekit.com)
+- [Modular SSO guide](https://docs.scalekit.com/authenticate/sso/add-modular-sso/)
+- [SCIM directory sync](https://docs.scalekit.com/directory/scim/quickstart/)
+- [MCP Auth quickstart](https://docs.scalekit.com/authenticate/mcp/quickstart/)
From 0fb2b60d5b1287f94ffbad3ba14d971b0be7b8ee Mon Sep 17 00:00:00 2001
From: Saif Shines
Date: Wed, 13 May 2026 14:20:01 +0530
Subject: [PATCH 02/19] =?UTF-8?q?remove=20testing-agentkit-tools=20skill?=
=?UTF-8?q?=20=E2=80=94=20redundant=20with=20MCP=20server?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
---
plugins/agentkit/README.md | 1 -
.../skills/testing-agentkit-tools/SKILL.md | 93 -------------------
2 files changed, 94 deletions(-)
delete mode 100644 plugins/agentkit/skills/testing-agentkit-tools/SKILL.md
diff --git a/plugins/agentkit/README.md b/plugins/agentkit/README.md
index 9ceef6e..20b9d63 100644
--- a/plugins/agentkit/README.md
+++ b/plugins/agentkit/README.md
@@ -8,7 +8,6 @@ AgentKit handles the full OAuth lifecycle — authorization, token vault, and au
- `integrating-agentkit` — Core integration: SDK setup, connected accounts, OAuth flows, token fetching, downstream API calls, and agent framework examples.
- `discovering-connector-tools` — Uses live AgentKit metadata to find tools, inspect schemas, and narrow the tool set.
-- `testing-agentkit-tools` — Generates authorization links, fetches live tool metadata, and executes tools.
- `exposing-agentkit-via-mcp` — Exposes AgentKit tools through MCP for MCP-compatible runtimes.
- `production-readiness-agentkit` — Structured production readiness checklist for AgentKit integrations.
diff --git a/plugins/agentkit/skills/testing-agentkit-tools/SKILL.md b/plugins/agentkit/skills/testing-agentkit-tools/SKILL.md
deleted file mode 100644
index 4d55bc9..0000000
--- a/plugins/agentkit/skills/testing-agentkit-tools/SKILL.md
+++ /dev/null
@@ -1,93 +0,0 @@
----
-name: testing-agentkit-tools
-description: Tests live Scalekit AgentKit flows by generating authorization links, fetching tool metadata, and executing a tool for a connected account. Use when a user wants to validate a connector, inspect the exact payload for execute_tool, or build a workflow step by step.
----
-
-# Testing AgentKit Tools
-
-This skill is the live playground for AgentKit. Use it to:
-
-- generate an authorization link for a connection
-- fetch live tool metadata for a connector or tool name
-- execute a tool with real inputs
-- inspect the exact JSON payload sent to AgentKit
-
-## Prerequisites
-
-Confirm the environment variables are available:
-- `SCALEKIT_ENV_URL`
-- `SCALEKIT_CLIENT_ID`
-- `SCALEKIT_CLIENT_SECRET`
-
-## Operations
-
-### Generate authorization link
-
-Creates or fetches the connected account and prints an authorization link if the account is not yet `ACTIVE`.
-
-**Python**
-```python
-response = actions.get_or_create_connected_account(
- connection_name="",
- identifier=""
-)
-if response.connected_account.status != "ACTIVE":
- link_response = actions.get_authorization_link(
- connection_name="",
- identifier=""
- )
- print("Authorize here:", link_response.link)
-```
-
-### Fetch tool metadata
-
-Fetches live tool metadata. Omitting `tool_name` returns all matching tools for the filter.
-
-**Python**
-```python
-tools = actions.get_tools(providers=["GMAIL"], page_size=100)
-for tool in tools:
- print(tool.name, tool.input_schema)
-```
-
-**Node.js**
-```typescript
-const tools = await scalekitClient.connectedAccounts.getTools({
- providers: ['GMAIL'],
- pageSize: 100,
-});
-```
-
-### Execute a tool
-
-Creates or fetches the connected account, prints an authorization link if needed, and executes the tool.
-
-**Python**
-```python
-result = actions.execute_tool(
- tool_name="gmail_fetch_mails",
- connection_name="",
- identifier="",
- tool_input={"query": "is:unread", "max_results": 5}
-)
-```
-
-## Default workflow
-
-1. Discover the tool first when the schema is unknown.
-2. Generate an authorization link if the connected account is not `ACTIVE`.
-3. Execute the tool with the smallest valid `tool_input`.
-4. Show the exact command and payload used so the user can translate it into app code.
-
-## Guardrails
-
-- Treat live metadata as the source of truth for `input_schema` and `output_schema`.
-- Do not assume the dashboard `connection_name` matches the connector slug.
-- Ask for missing credentials instead of inventing placeholder values.
-- Keep the tool set constrained to the current workflow.
-
-## Deep reference
-
-- Integration workflow: [../integrating-agentkit/SKILL.md](../integrating-agentkit/SKILL.md)
-- Connector reference: [../../references/agent-connectors/README.md](../../references/agent-connectors/README.md)
-- Connected accounts: [../../references/connected-accounts.md](../../references/connected-accounts.md)
From d0034c5948e6d4d4e8eeb005f9b5042a7d3ee448 Mon Sep 17 00:00:00 2001
From: Saif Shines
Date: Wed, 13 May 2026 14:37:32 +0530
Subject: [PATCH 03/19] add AGENTS.md with Codex-specific plugin conventions
---
AGENTS.md | 121 ++++++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 121 insertions(+)
create mode 100644 AGENTS.md
diff --git a/AGENTS.md b/AGENTS.md
new file mode 100644
index 0000000..c9bf547
--- /dev/null
+++ b/AGENTS.md
@@ -0,0 +1,121 @@
+# AGENTS.md
+
+This repository is a monorepo of Codex plugins intended for marketplace distribution.
+Any agent changing this repo must follow this document.
+
+## What this repo contains
+
+Everything under `plugins/` is a Codex plugin. A plugin includes skills and reference files that teach the agent how to integrate Scalekit authentication.
+
+Codex does not have a public plugin marketplace. This repo ships with a bootstrap installer (`install.sh`) and a local install script (`scripts/install_codex_marketplace.sh`) that copy plugins into `~/.codex/marketplaces/scalekit-auth-stack`.
+
+## Monorepo layout
+
+```
+codex-authstack/
+├── plugins/
+│ ├── agentkit/ # AI agent authentication
+│ │ ├── README.md
+│ │ ├── skills/ # Skill entrypoints
+│ │ └── references/ # Deep docs and connector notes
+│ └── saaskit/ # B2B SaaS authentication
+│ ├── README.md
+│ ├── skills/
+│ └── references/
+├── scripts/
+│ ├── install_codex_marketplace.sh
+│ └── validate_marketplace.py
+├── install.sh # One-command bootstrap installer
+├── AGENTS.md # This file
+└── README.md
+```
+
+## Plugins
+
+### agentkit
+
+Authentication for AI agents. OAuth flows, token vault, 40+ connectors, tool discovery.
+
+Skills:
+- `integrating-agentkit` — core integration: SDK setup, connected accounts, OAuth flows, token fetching, agent frameworks
+- `discovering-connector-tools` — live tool metadata discovery, schema inspection, tool set narrowing
+- `exposing-agentkit-via-mcp` — expose AgentKit tools through MCP for compatible runtimes
+- `production-readiness-agentkit` — production readiness checklist for AgentKit integrations
+
+References: `agent-connectors/` (connector docs), `connected-accounts.md`, `code-samples.md`, `providers.md`, `connections.md`, `byoc.md`, `redirects.md`
+
+### saaskit
+
+Production-ready auth for B2B SaaS apps. Login, sessions, SSO, SCIM, MCP server auth.
+
+Skills:
+- `implementing-saaskit` — core auth flow (+ Go, Spring Boot, Laravel reference files)
+- `implementing-saaskit-nextjs` — Next.js App Router auth
+- `implementing-saaskit-python` — Django, FastAPI, Flask (+ framework reference files)
+- `implementing-modular-sso` — enterprise SSO (SAML/OIDC) with 20+ IdPs, admin portal
+- `implementing-scim-provisioning` — SCIM 2.0 webhooks, user/group lifecycle
+- `implementing-access-control` — server-side RBAC
+- `managing-saaskit-sessions` — token storage, validation, refresh, revocation
+- `adding-mcp-oauth` — OAuth 2.1 for MCP servers (+ Express, FastAPI, FastMCP reference files)
+- `adding-api-auth` — API keys and client credentials for M2M auth
+- `migrating-to-saaskit` — incremental migration from existing auth systems
+- `production-readiness-saaskit` — unified production checklist
+
+References: `bring-your-own-auth.md`, `redirects.md`, `scalekit-logs.md`, `scalekit-mcp-server.md`, `scalekit-user-profiles.md`
+
+## Non-negotiable rules
+
+- Work on one plugin at a time unless the user explicitly asks for cross-plugin changes.
+- Never add secrets, tokens, credentials, or private endpoints to any file.
+- Prefer minimal changes that improve correctness, security, and user clarity.
+- Keep instructions stable, avoid time-dependent guidance.
+- Use forward slashes in all paths.
+
+## Codex-specific conventions
+
+Codex plugins differ from Claude Code and Cursor plugins:
+
+- **No `.claude-plugin/` or `.cursor-plugin/` directory.** Codex uses `~/.agents/plugins/marketplace.json` to discover marketplaces.
+- **No rules (`.mdc` files).** Codex does not support Cursor-style rules. Use skill content and references instead.
+- **No agents.** Codex does not support sub-agent definitions. Guidance that would be an agent in other auth stacks should be a skill or reference doc here.
+- **No hooks.** Codex does not support lifecycle hooks.
+- **No commands.** Codex does not support slash commands. Skills are the only entrypoint.
+
+## Skill authoring rules
+
+Each skill is a folder with `SKILL.md` as its entrypoint.
+
+Frontmatter requirements:
+- `name` must be lowercase, hyphenated, max 64 chars.
+- `description` must be third person and include both what it does and when to use it.
+
+Context budget:
+- Keep `SKILL.md` short and practical.
+- Put deep docs in reference files linked from `SKILL.md`.
+- Do not create multi-hop reference chains.
+
+## Validation
+
+Run the validation script before committing:
+
+```bash
+python3 scripts/validate_marketplace.py
+```
+
+This checks marketplace manifest structure, plugin manifests, skill files, frontmatter, and reference file depth.
+
+## Local testing
+
+1. Run `./scripts/install_codex_marketplace.sh` to copy plugins to `~/.codex/marketplaces/scalekit-auth-stack`
+2. Restart Codex
+3. Open Plugin Directory and select `Scalekit Auth Stack`
+4. Install `agentkit` or `saaskit`
+5. Invoke at least one skill to verify it triggers correctly
+
+## Documentation rules
+
+Each plugin README must include:
+- Purpose
+- Skills list with descriptions
+- Configuration (required env vars)
+- Links to Scalekit docs
\ No newline at end of file
From 496bd406a147b273eb20736fd0955794c902216c Mon Sep 17 00:00:00 2001
From: Saif Shines
Date: Wed, 13 May 2026 16:39:33 +0530
Subject: [PATCH 04/19] update install script and changelog for
agentkit+saaskit consolidation
- Replace 5 old plugin entries with agentkit + saaskit in personal marketplace
- Add cleanup of old v1.x plugin directories on re-install
- Update CHANGELOG to reflect consolidation
---
CHANGELOG.md | 13 +++---
scripts/install_codex_marketplace.sh | 66 ++++++++++------------------
2 files changed, 31 insertions(+), 48 deletions(-)
diff --git a/CHANGELOG.md b/CHANGELOG.md
index 654f4bd..b88c024 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -2,11 +2,14 @@
## Unreleased
-- Expand Codex auth plugin depth and coverage:
- - Add the missing portable skills across `mcp-auth`, `agent-auth`, `full-stack-auth`, `modular-sso`, and `modular-scim`.
- - Add plugin-local reference docs, including the full Agent Auth connector corpus.
- - Add `.mcp.json` support across all five plugins.
- - Add a richer repo README for public-facing marketplace storytelling.
+- Consolidate 5 plugins into 2:
+ - `agentkit` — AI agent authentication (replaces `agent-auth`)
+ - `saaskit` — B2B SaaS authentication (replaces `full-stack-auth`, `mcp-auth`, `modular-sso`, `modular-scim`)
+- Add `.mcp.json` to both plugins pointing to `https://mcp.scalekit.com`.
+- Add plugin-local reference docs, including the full AgentKit connector corpus.
+- Add a richer repo README for public-facing marketplace storytelling.
+- Update install script to handle migration from old plugin names.
+- Add `AGENTS.md` with Codex-specific plugin conventions.
- Improve installation UX:
- Add a one-command GitHub bootstrap installer.
- Add a safe local installer that avoids overwriting an unrelated personal marketplace by default.
diff --git a/scripts/install_codex_marketplace.sh b/scripts/install_codex_marketplace.sh
index 3028cca..5379333 100755
--- a/scripts/install_codex_marketplace.sh
+++ b/scripts/install_codex_marketplace.sh
@@ -9,6 +9,9 @@ INSTALL_ROOT="${HOME}/.codex/marketplaces/scalekit-auth-stack"
PERSONAL_MARKETPLACE="${HOME}/.agents/plugins/marketplace.json"
FORCE_PERSONAL_MARKETPLACE="${FORCE_PERSONAL_MARKETPLACE:-0}"
+# Old plugin names from v1.x (now consolidated into agentkit + saaskit)
+OLD_PLUGINS=("mcp-auth" "agent-auth" "modular-sso" "modular-scim" "full-stack-auth")
+
mkdir -p "$(dirname "$INSTALL_ROOT")"
rm -rf "$INSTALL_ROOT"
mkdir -p "$INSTALL_ROOT"
@@ -16,6 +19,11 @@ mkdir -p "$INSTALL_ROOT"
cp -R "$REPO_ROOT"/. "$INSTALL_ROOT"
rm -rf "$INSTALL_ROOT/.git"
+# Clean up old v1.x plugin directories if they exist from a previous install
+for old in "${OLD_PLUGINS[@]}"; do
+ rm -rf "$INSTALL_ROOT/plugins/$old"
+done
+
PLUGIN_BASE="./.codex/marketplaces/scalekit-auth-stack/plugins"
write_personal_marketplace() {
@@ -28,22 +36,10 @@ write_personal_marketplace() {
},
"plugins": [
{
- "name": "mcp-auth",
- "source": {
- "source": "local",
- "path": "${PLUGIN_BASE}/mcp-auth"
- },
- "policy": {
- "installation": "AVAILABLE",
- "authentication": "ON_INSTALL"
- },
- "category": "MCP Security"
- },
- {
- "name": "agent-auth",
+ "name": "agentkit",
"source": {
"source": "local",
- "path": "${PLUGIN_BASE}/agent-auth"
+ "path": "${PLUGIN_BASE}/agentkit"
},
"policy": {
"installation": "AVAILABLE",
@@ -52,34 +48,10 @@ write_personal_marketplace() {
"category": "Agent Auth"
},
{
- "name": "modular-sso",
+ "name": "saaskit",
"source": {
"source": "local",
- "path": "${PLUGIN_BASE}/modular-sso"
- },
- "policy": {
- "installation": "AVAILABLE",
- "authentication": "ON_INSTALL"
- },
- "category": "Enterprise SSO"
- },
- {
- "name": "modular-scim",
- "source": {
- "source": "local",
- "path": "${PLUGIN_BASE}/modular-scim"
- },
- "policy": {
- "installation": "AVAILABLE",
- "authentication": "ON_INSTALL"
- },
- "category": "Provisioning"
- },
- {
- "name": "full-stack-auth",
- "source": {
- "source": "local",
- "path": "${PLUGIN_BASE}/full-stack-auth"
+ "path": "${PLUGIN_BASE}/saaskit"
},
"policy": {
"installation": "AVAILABLE",
@@ -135,22 +107,30 @@ if [[ "$PERSONAL_RESULT" == "created" ]]; then
Created personal Codex marketplace:
$PERSONAL_MARKETPLACE
+Available plugins:
+ agentkit — AI agent authentication (connectors, tool discovery, token vault)
+ saaskit — B2B SaaS authentication (login, SSO, SCIM, RBAC, MCP server auth)
+
Next steps:
1. Restart Codex.
2. Open the Plugin Directory.
3. Choose "Scalekit Auth Stack".
-4. Install one of the plugins.
+4. Install agentkit, saaskit, or both.
EOF
elif [[ "$PERSONAL_RESULT" == "updated" ]]; then
cat <
Date: Wed, 13 May 2026 16:53:03 +0530
Subject: [PATCH 05/19] rename scripts/install_codex_marketplace.sh to
scripts/install.sh
---
AGENTS.md | 6 +++---
README.md | 2 +-
install.sh | 6 +++---
scripts/{install_codex_marketplace.sh => install.sh} | 2 +-
4 files changed, 8 insertions(+), 8 deletions(-)
rename scripts/{install_codex_marketplace.sh => install.sh} (98%)
diff --git a/AGENTS.md b/AGENTS.md
index c9bf547..2b92950 100644
--- a/AGENTS.md
+++ b/AGENTS.md
@@ -7,7 +7,7 @@ Any agent changing this repo must follow this document.
Everything under `plugins/` is a Codex plugin. A plugin includes skills and reference files that teach the agent how to integrate Scalekit authentication.
-Codex does not have a public plugin marketplace. This repo ships with a bootstrap installer (`install.sh`) and a local install script (`scripts/install_codex_marketplace.sh`) that copy plugins into `~/.codex/marketplaces/scalekit-auth-stack`.
+Codex does not have a public plugin marketplace. This repo ships with a bootstrap installer (`install.sh`) and a local install script (`scripts/install.sh`) that copy plugins into `~/.codex/marketplaces/scalekit-auth-stack`.
## Monorepo layout
@@ -23,7 +23,7 @@ codex-authstack/
│ ├── skills/
│ └── references/
├── scripts/
-│ ├── install_codex_marketplace.sh
+│ ├── install.sh
│ └── validate_marketplace.py
├── install.sh # One-command bootstrap installer
├── AGENTS.md # This file
@@ -106,7 +106,7 @@ This checks marketplace manifest structure, plugin manifests, skill files, front
## Local testing
-1. Run `./scripts/install_codex_marketplace.sh` to copy plugins to `~/.codex/marketplaces/scalekit-auth-stack`
+1. Run `./scripts/install.sh` to copy plugins to `~/.codex/marketplaces/scalekit-auth-stack`
2. Restart Codex
3. Open Plugin Directory and select `Scalekit Auth Stack`
4. Install `agentkit` or `saaskit`
diff --git a/README.md b/README.md
index 43ec856..84908fb 100644
--- a/README.md
+++ b/README.md
@@ -47,7 +47,7 @@ This installer:
If you are developing locally from a clone:
```bash
-./scripts/install_codex_marketplace.sh
+./scripts/install.sh
```
This script:
diff --git a/install.sh b/install.sh
index 737d075..dc4c90d 100755
--- a/install.sh
+++ b/install.sh
@@ -7,7 +7,7 @@ REPO_REF="${CODEX_AUTHSTACK_REF:-main}"
SOURCE_DIR="${CODEX_AUTHSTACK_SOURCE_DIR:-}"
if [[ -n "$SOURCE_DIR" ]]; then
- exec "${SOURCE_DIR%/}/scripts/install_codex_marketplace.sh"
+ exec "${SOURCE_DIR%/}/scripts/install.sh"
fi
TMP_DIR="$(mktemp -d)"
@@ -27,9 +27,9 @@ tar -xzf "$ARCHIVE_PATH" -C "$TMP_DIR"
EXTRACTED_DIR="$(find "$TMP_DIR" -mindepth 1 -maxdepth 1 -type d | head -n 1)"
-if [[ -z "$EXTRACTED_DIR" ]] || [[ ! -x "$EXTRACTED_DIR/scripts/install_codex_marketplace.sh" ]]; then
+if [[ -z "$EXTRACTED_DIR" ]] || [[ ! -x "$EXTRACTED_DIR/scripts/install.sh" ]]; then
echo "Failed to find installer in downloaded archive." >&2
exit 1
fi
-exec "$EXTRACTED_DIR/scripts/install_codex_marketplace.sh"
+exec "$EXTRACTED_DIR/scripts/install.sh"
diff --git a/scripts/install_codex_marketplace.sh b/scripts/install.sh
similarity index 98%
rename from scripts/install_codex_marketplace.sh
rename to scripts/install.sh
index 5379333..3360e1d 100755
--- a/scripts/install_codex_marketplace.sh
+++ b/scripts/install.sh
@@ -149,6 +149,6 @@ What you can do next:
4. Choose "Scalekit Auth Stack" and install agentkit, saaskit, or both.
If you intentionally want this installer to replace your personal marketplace file, re-run:
- FORCE_PERSONAL_MARKETPLACE=1 ./scripts/install_codex_marketplace.sh
+ FORCE_PERSONAL_MARKETPLACE=1 ./scripts/install.sh
EOF
fi
From b59e9359e5c016b515a6ffd0171398b1e0bb4f1a Mon Sep 17 00:00:00 2001
From: Saif Shines
Date: Wed, 13 May 2026 17:12:48 +0530
Subject: [PATCH 06/19] Add missing skills, references, and fix connector
terminology
- Add testing-auth-setup skill to saaskit (npx dryrun CLI)
- Add session-management-patterns.md reference to saaskit
- Add tool-discovery.md reference to agentkit (adapted for Codex)
- Add setup-scalekit.md reference (converted from agent)
- Add mcp-auth-troubleshooting.md reference (converted from agent)
- Rename providers.md to connectors.md, fix terminology to AgentKit/connectors
- Update connectors table with Attention, Chorus, Clari Copilot, Google Slides
- Update AGENTS.md and saaskit README to reflect new files
---
AGENTS.md | 5 +-
.../{providers.md => connectors.md} | 71 ++---
plugins/agentkit/references/tool-discovery.md | 83 ++++++
.../skills/integrating-agentkit/SKILL.md | 2 +-
plugins/saaskit/README.md | 1 +
.../references/mcp-auth-troubleshooting.md | 93 ++++++
.../references/session-management-patterns.md | 279 ++++++++++++++++++
plugins/saaskit/references/setup-scalekit.md | 100 +++++++
.../skills/testing-auth-setup/SKILL.md | 55 ++++
9 files changed, 651 insertions(+), 38 deletions(-)
rename plugins/agentkit/references/{providers.md => connectors.md} (69%)
create mode 100644 plugins/agentkit/references/tool-discovery.md
create mode 100644 plugins/saaskit/references/mcp-auth-troubleshooting.md
create mode 100644 plugins/saaskit/references/session-management-patterns.md
create mode 100644 plugins/saaskit/references/setup-scalekit.md
create mode 100644 plugins/saaskit/skills/testing-auth-setup/SKILL.md
diff --git a/AGENTS.md b/AGENTS.md
index 2b92950..d5b1143 100644
--- a/AGENTS.md
+++ b/AGENTS.md
@@ -42,7 +42,7 @@ Skills:
- `exposing-agentkit-via-mcp` — expose AgentKit tools through MCP for compatible runtimes
- `production-readiness-agentkit` — production readiness checklist for AgentKit integrations
-References: `agent-connectors/` (connector docs), `connected-accounts.md`, `code-samples.md`, `providers.md`, `connections.md`, `byoc.md`, `redirects.md`
+References: `agent-connectors/` (connector docs), `connected-accounts.md`, `code-samples.md`, `connectors.md`, `connections.md`, `byoc.md`, `redirects.md`, `tool-discovery.md`
### saaskit
@@ -60,8 +60,9 @@ Skills:
- `adding-api-auth` — API keys and client credentials for M2M auth
- `migrating-to-saaskit` — incremental migration from existing auth systems
- `production-readiness-saaskit` — unified production checklist
+- `testing-auth-setup` — validates auth integration via dryrun CLI
-References: `bring-your-own-auth.md`, `redirects.md`, `scalekit-logs.md`, `scalekit-mcp-server.md`, `scalekit-user-profiles.md`
+References: `bring-your-own-auth.md`, `redirects.md`, `scalekit-logs.md`, `scalekit-mcp-server.md`, `scalekit-user-profiles.md`, `session-management-patterns.md`, `setup-scalekit.md`, `mcp-auth-troubleshooting.md`
## Non-negotiable rules
diff --git a/plugins/agentkit/references/providers.md b/plugins/agentkit/references/connectors.md
similarity index 69%
rename from plugins/agentkit/references/providers.md
rename to plugins/agentkit/references/connectors.md
index 5a4270b..b9c35e7 100644
--- a/plugins/agentkit/references/providers.md
+++ b/plugins/agentkit/references/connectors.md
@@ -1,27 +1,27 @@
-# Providers
+# Connectors Overview
-Providers in Agent Auth represent third-party applications that your users can connect to and interact with through Scalekit's unified API. Each provider offers a set of tools and capabilities that can be executed on behalf of connected users.
+Connectors in AgentKit represent third-party applications that your users can connect to and interact with through Scalekit's unified API. Each connector offers a set of tools and capabilities that can be executed on behalf of connected users.
-## What are providers?
+## What are connectors?
-Providers are pre-configured integrations with popular third-party applications that enable your users to:
+Connectors are pre-configured integrations with popular third-party applications that enable your users to:
- **Connect their accounts** using secure authentication methods
- **Execute tools and actions** through a unified API interface
- **Access data and functionality** from external applications
- **Maintain secure connections** with proper authorization scopes
-## Supported providers
+## Supported connectors
-Agent Auth supports a wide range of popular business applications:
+AgentKit supports a wide range of popular business applications:
-| Category | Providers |
+| Category | Connectors |
|---|---|
-| **Google Workspace** | Gmail, Google Calendar, Google Drive, Google Docs, Google Sheets, Google Forms, Google Meet, Google Ads |
+| **Google Workspace** | Gmail, Google Calendar, Google Drive, Google Docs, Google Sheets, Google Slides, Google Forms, Google Meet, Google Ads |
| **Microsoft 365** | Outlook, OneDrive, SharePoint, Microsoft Teams, Microsoft Excel, Microsoft Word, OneNote |
| **Communication** | Slack, Zoom |
| **Project Management** | Jira, Asana, Trello, Monday.com, ClickUp, Linear, Confluence |
-| **CRM & Sales** | Salesforce, HubSpot, Zendesk, Freshdesk, Intercom, Gong |
+| **CRM & Sales** | Salesforce, HubSpot, Zendesk, Freshdesk, Intercom, Gong, Attention, Chorus, Clari Copilot |
| **Development** | GitHub |
| **Productivity** | Notion, Airtable, Dropbox |
| **Data & Analytics** | BigQuery, Snowflake, Fathom |
@@ -29,19 +29,19 @@ Agent Auth supports a wide range of popular business applications:
For per-connector tool specifications, see [agent-connectors/README.md](agent-connectors/README.md).
-## Provider capabilities
+## Connector capabilities
-Each provider offers different capabilities based on their API and authentication model.
+Each connector offers different capabilities based on its API and authentication model.
### Authentication methods
-- **OAuth 2.0**: Standard method for all supported providers
+- **OAuth 2.0**: Standard method for all supported connectors
### Available tools
-Providers expose various tools that can be executed through Agent Auth:
+Connectors expose various tools that can be executed through AgentKit:
-> **Note:** Tool availability depends on the specific provider and the user's permissions within that application.
+> **Note:** Tool availability depends on the specific connector, the current live catalog, and the user's permissions within that application.
**Common tool categories:**
@@ -53,25 +53,25 @@ Providers expose various tools that can be executed through Agent Auth:
### Rate limits and quotas
-Each provider has different rate limits and quotas:
+Each connector has different rate limits and quotas:
- **API rate limits**: Requests per minute/hour limitations
- **Data quotas**: Storage or transfer limitations
- **Feature restrictions**: Premium features or enterprise-only capabilities
-## Provider configuration
+## Connector configuration
-### Adding a provider
+### Adding a connector
-1. **Navigate to providers** in your Agent Auth dashboard
-2. **Select provider** from the available options
+1. **Navigate to connections** in your AgentKit dashboard
+2. **Select connector** from the available options
3. **Configure settings** such as scopes and permissions
4. **Set up authentication** — configure OAuth client credentials if using custom OAuth apps
-5. **Test connection** to verify provider setup
+5. **Test connection** to verify connector setup
-### Provider settings
+### Connector settings
-Each provider can be configured with:
+Each connector can be configured with:
**Authentication settings:**
- OAuth client credentials (if using custom OAuth apps)
@@ -83,11 +83,11 @@ Each provider can be configured with:
- Request throttling settings
- Backoff strategies for rate limit errors
-## Working with provider APIs
+## Working with connector APIs
### API integration
-The Scalekit SDK abstracts provider-specific APIs — the workflow (create account → authorize → fetch token → call API) is identical for all providers. Only the downstream API call changes:
+The Scalekit SDK abstracts connector-specific APIs — the workflow (create account → authorize → fetch token → call API) is identical for all connectors. Only the downstream API call changes:
```python
# Step 3: Fetch token (always call this immediately before the API call)
@@ -98,7 +98,7 @@ response = actions.get_connected_account(
tokens = response.connected_account.authorization_details["oauth_token"]
access_token = tokens["access_token"]
-# Step 4: Call the provider API with the token
+# Step 4: Call the connector API with the token
headers = {"Authorization": f"Bearer {access_token}"}
```
@@ -106,7 +106,7 @@ Scalekit automatically refreshes expired tokens on `get_connected_account` — n
### Error handling
-Agent Auth normalizes provider-specific errors into consistent error responses:
+AgentKit normalizes connector-specific errors into consistent error responses:
```javascript
{
@@ -122,7 +122,7 @@ Agent Auth normalizes provider-specific errors into consistent error responses:
}
```
-## Provider-specific considerations
+## Connector-specific considerations
### Google Workspace
@@ -167,23 +167,24 @@ Agent Auth normalizes provider-specific errors into consistent error responses:
## Monitoring and analytics
-### Provider health
+### Connector health
-- **API uptime**: Track provider API availability
+- **API uptime**: Track connector API availability
- **Response times**: Monitor latency for different operations
-- **Error rates**: Track errors by provider and tool type
+- **Error rates**: Track errors by connector and tool type
- **Rate limit usage**: Monitor quota consumption
### Usage analytics
-- **Popular providers**: Which providers are used most
+- **Popular connectors**: Which connectors are used most
- **Tool usage**: Which tools are executed most frequently
-- **User adoption**: How many users connect to each provider
-- **Error patterns**: Common failure modes by provider
+- **User adoption**: How many users connect to each connector
+- **Error patterns**: Common failure modes by connector
## Related documentation
-- [connections.md](connections.md) — how to configure authentication credentials for a provider
+- [connections.md](connections.md) — how to configure authentication credentials for a connector
- [connected-accounts.md](connected-accounts.md) — per-user account lifecycle and token management
-- [agent-connectors/README.md](agent-connectors/README.md) — detailed API tools for each provider
+- [agent-connectors/README.md](agent-connectors/README.md) — detailed API tools for each connector
+- [tool-discovery.md](tool-discovery.md) — live discovery model for current tools and schemas
- [code-samples.md](code-samples.md) — implementation examples by framework
diff --git a/plugins/agentkit/references/tool-discovery.md b/plugins/agentkit/references/tool-discovery.md
new file mode 100644
index 0000000..15a631d
--- /dev/null
+++ b/plugins/agentkit/references/tool-discovery.md
@@ -0,0 +1,83 @@
+# Tool Discovery
+
+## Overview
+
+In AgentKit, the live tool metadata is the source of truth for:
+
+- current connector coverage
+- tool names
+- `input_schema`
+- `output_schema`
+
+For connector-specific guidance, auth quirks, and example workflows, see the canonical connector docs at [docs.scalekit.com/agentkit/connectors](https://docs.scalekit.com/agentkit/connectors/).
+
+## Terminology
+
+- `connector`: the integration, such as Gmail, Slack, Salesforce, or a custom connector
+- `connection`: the dashboard configuration created once per environment
+- `connected account`: the per-user authorized instance of a connection
+- `tool`: the executable action exposed by a connector
+
+Use `connector` in user-facing explanations. Use `provider` only when the SDK or API filter field literally uses that name.
+
+## Discovery rules
+
+1. Prefer live lookup over hand-maintained docs.
+2. Narrow the search to a single connector or tool name whenever possible.
+3. Summarize required inputs from `input_schema.required`.
+4. Summarize optional inputs from `input_schema.properties`.
+5. Describe likely results from `output_schema.properties`.
+6. Recommend the smallest useful tool set before handing tools to an LLM.
+
+## What to inspect
+
+When live metadata is available, capture:
+
+- tool `name`
+- tool `description`
+- connector / provider slug
+- `input_schema.properties`
+- `input_schema.required`
+- `output_schema.properties`
+
+If the metadata contains pagination or large result fields, mention them so the user can limit tool scope or post-process results before sending them back to the model.
+
+## How to use this in Codex
+
+For interactive discovery, use the Scalekit MCP server. When connected at `https://mcp.scalekit.com`, you can query tool metadata, generate auth links, and execute tools directly through MCP tool calls.
+
+For implementation guidance, use:
+
+- `discovering-connector-tools` when the user needs the current tool list or schema
+- The Scalekit MCP server when the user wants to execute a tool and inspect the payload interactively
+- `integrating-agentkit` when the user wants to wire the result into application code
+
+For per-connector tool specifications, see [agent-connectors/README.md](agent-connectors/README.md).
+
+## Connection names vs connector names
+
+Do not confuse:
+
+- dashboard `connection_name`: exact value from `AgentKit -> Connections`
+- connector / provider slug: value used to group live tools in metadata
+
+The first is for authorization and connected account flows.
+The second is for catalog discovery and tool grouping.
+
+They are related, but they are not always the same string.
+
+## Example reasoning pattern
+
+1. User says: "What tools can I use for Google Sheets?"
+2. Discover the live tool list for the Google Sheets connector.
+3. Inspect the candidate tools and their `input_schema`.
+4. Recommend only the few tools needed for the workflow, such as read values, update values, or append rows.
+5. If the user wants to validate the flow, generate an auth link if needed and execute one tool with minimal input.
+
+## Fallback behavior
+
+If live credentials are not available:
+
+- refer to [docs.scalekit.com/agentkit/connectors](https://docs.scalekit.com/agentkit/connectors/) as a directional guide
+- clearly say the catalog may be stale without live credentials
+- avoid claiming that the listed tools are exhaustive
diff --git a/plugins/agentkit/skills/integrating-agentkit/SKILL.md b/plugins/agentkit/skills/integrating-agentkit/SKILL.md
index d338e27..7c37bdd 100644
--- a/plugins/agentkit/skills/integrating-agentkit/SKILL.md
+++ b/plugins/agentkit/skills/integrating-agentkit/SKILL.md
@@ -297,7 +297,7 @@ For comprehensive documentation on connected accounts lifecycle, states, and API
For code samples and implementation examples by framework, see [code-samples.md](../references/code-samples.md).
-For an overview of supported providers and their capabilities, see [providers.md](../references/providers.md).
+For an overview of supported connectors and their capabilities, see [connectors.md](../references/connectors.md).
For comprehensive token management including refresh, security, and monitoring, see [token-management.md](../references/token-management.md).
diff --git a/plugins/saaskit/README.md b/plugins/saaskit/README.md
index bddc8c8..dd4eaea 100644
--- a/plugins/saaskit/README.md
+++ b/plugins/saaskit/README.md
@@ -15,6 +15,7 @@ Production-ready auth for B2B SaaS apps. This plugin brings Scalekit SaaSKit int
- `migrating-to-saaskit` — Migration planning from Auth0, Firebase, Cognito, or custom auth.
- `adding-api-auth` — API keys (org/user scoped) and OAuth 2.0 client credentials.
- `production-readiness-saaskit` — Unified production checklist across all SaaSKit domains.
+- `testing-auth-setup` — Validates auth integration by running the Scalekit dryrun CLI.
## Configuration
diff --git a/plugins/saaskit/references/mcp-auth-troubleshooting.md b/plugins/saaskit/references/mcp-auth-troubleshooting.md
new file mode 100644
index 0000000..95424f5
--- /dev/null
+++ b/plugins/saaskit/references/mcp-auth-troubleshooting.md
@@ -0,0 +1,93 @@
+# MCP Auth Troubleshooting
+
+Reference for diagnosing and resolving common Scalekit MCP auth integration issues. Covers handshake/metadata verification, cached client state, CORS/network problems, and client-specific quirks.
+
+## Principles
+
+- Always collect evidence first (HTTP status, headers, URLs, logs) before suggesting fixes.
+- Prefer reversible fixes (config, allowlists, callback URLs, proxy rules) over code changes.
+- Follow the triage flow in order — earlier steps catch the most common failures.
+
+## Triage flow
+
+### 1. Identify the client and environment
+
+Determine which MCP client is failing: MCP Inspector, MCP-Remote, VS Code, Codex, Claude Desktop, or another client.
+
+Capture:
+- MCP server URL
+- Scalekit environment URL
+- Whether this is dev or prod
+
+### 2. Confirm the auth handshake (server-side)
+
+Goal: verify the server challenges unauthenticated requests correctly and points clients to resource metadata.
+
+Run these checks:
+
+```bash
+# Should return HTTP 401
+curl -s -o /dev/null -w "%{http_code}" https:///
+
+# Should include WWW-Authenticate header with resource_metadata URL
+curl -s -I https:/// | grep -i www-authenticate
+```
+
+Then open the `resource_metadata` URL in a browser and confirm the JSON matches the Scalekit dashboard configuration for that environment.
+
+If these checks fail, classify as **metadata/handshake misconfiguration** and fix the protected resource metadata wiring first.
+
+### 3. Check cached client state
+
+If the handshake looks correct but the client still fails, suspect cached old domain/metadata after a domain change.
+
+Clear cached auth by client:
+- **MCP-Remote**: delete `~/.mcp-auth/mcp-remote-` and reconnect
+- **VS Code**: run "Authentication: Remove Dynamic Authentication Provider", remove the cached entry, reconnect
+
+### 4. CORS and callback URL issues
+
+Common with MCP Inspector. If you see CORS failures during the handshake in browser network logs:
+
+1. In Scalekit Dashboard → Authentication → Redirect URLs → Allowed Callback URLs
+2. Add the client's callback URL (e.g., `http://localhost:6274/` for MCP Inspector)
+3. Retry the connection
+
+### 5. Network / proxy / firewall blocks
+
+If MCP client calls don't reach the server:
+
+- Identify whether behind Cloudflare, AWS WAF, or corporate proxy
+- Allow or exempt MCP client → server traffic for the server domain
+- Confirm via proxy/WAF logs
+- Test direct connectivity from the same machine running the MCP client
+
+### 6. Client-specific: port limitations
+
+Some MCP clients (e.g., Claude Desktop) only support standard HTTPS on port 443 and will ignore custom ports.
+
+Workarounds:
+- Expose MCP server on 443 via a load balancer or reverse proxy
+- Use a reverse proxy that listens on 443 and forwards to the internal custom port
+
+### 7. Client-specific: browser not invoked during auth
+
+If authentication times out because the browser never opens:
+
+- **macOS**: allow the MCP client to open applications (System Preferences → Security & Privacy → App Management), then restart
+- **Windows**: enable default app management permissions (Settings → Privacy → App permissions), then restart
+- **Linux**: ensure `xdg-open` exists (`which xdg-open`) and is on PATH, then restart
+
+## Verification checklist
+
+After applying a fix, verify:
+
+1. Unauthenticated request returns HTTP 401 with `WWW-Authenticate` header
+2. Resource metadata URL returns valid JSON matching dashboard config
+3. MCP client successfully completes the OAuth handshake
+4. At least one MCP tool call succeeds end-to-end
+
+## Related references
+
+- [scalekit-mcp-server.md](scalekit-mcp-server.md) — Scalekit MCP server architecture and implementation patterns
+- [Adding MCP OAuth skill](../skills/adding-mcp-oauth/SKILL.md) — implementing OAuth 2.1 for MCP servers
diff --git a/plugins/saaskit/references/session-management-patterns.md b/plugins/saaskit/references/session-management-patterns.md
new file mode 100644
index 0000000..228a5d0
--- /dev/null
+++ b/plugins/saaskit/references/session-management-patterns.md
@@ -0,0 +1,279 @@
+# Session Management Patterns
+
+Reference guide for evaluating and implementing session management with Scalekit. Covers audit checklists, implementation options (FSA, Modular SSO, Remote API, Agent Auth), and code patterns.
+
+Related references:
+- [scalekit-user-profiles.md](scalekit-user-profiles.md) — attribute schema and SDK methods
+- [scalekit-logs.md](scalekit-logs.md) — filter strategies and status definitions
+
+## Phase 1: Discovery — Understand the Existing Setup
+
+Run all discovery steps before forming any opinion. Use the results to inform Phases 2–4.
+
+### 1.1 Locate session-related files
+```bash
+grep -rn "session" --include="*.ts" --include="*.js" --include="*.py" --include="*.go" \
+ -l . 2>/dev/null | head -40
+```
+
+### 1.2 Identify token handling patterns
+```bash
+grep -rn "access_token\|refresh_token\|id_token\|Bearer\|HttpOnly\|cookie" \
+ --include="*.ts" --include="*.js" --include="*.py" -l . 2>/dev/null | head -30
+```
+
+### 1.3 Find authentication middleware
+```bash
+grep -rn "middleware\|authMiddleware\|validateToken\|verifyToken\|requireAuth" \
+ --include="*.ts" --include="*.js" --include="*.py" --include="*.go" \
+ -l . 2>/dev/null | head -20
+```
+
+### 1.4 Detect existing auth libraries in use
+```bash
+cat package.json 2>/dev/null || cat requirements.txt 2>/dev/null || cat go.mod 2>/dev/null
+grep -rn "express-session\|passport\|next-auth\|iron-session\|lucia\|better-auth\|@scalekit" \
+ package.json requirements.txt 2>/dev/null
+```
+
+### 1.5 Check for existing Scalekit setup
+```bash
+grep -rn "scalekit\|SCALEKIT_" --include="*.ts" --include="*.js" --include="*.py" \
+ --include="*.env*" -l . 2>/dev/null
+cat .env.example 2>/dev/null || cat .env.local 2>/dev/null
+```
+
+### 1.6 Identify framework and rendering model
+```bash
+ls -la | grep -E "next.config|nuxt.config|remix.config|vite.config|app.py|main.go"
+grep -rn "\"next\"\|\"remix\"\|\"nuxt\"\|\"express\"\|\"fastapi\"\|\"gin\"" package.json 2>/dev/null
+```
+
+After running all discovery commands, read each file identified as relevant before proceeding.
+
+---
+
+## Phase 2: Audit — Evaluate What's There
+
+Score each concern against the discovered files:
+
+| Concern | What to Check | Risk if Missing |
+|---|---|---|
+| Token storage | HttpOnly cookies vs localStorage | XSS exposure |
+| Refresh rotation | Token rotated on each refresh use | Session fixation / theft |
+| Middleware validation | Every protected route validated | Unauthorized access |
+| Absolute timeout | Max session duration enforced | Stale sessions |
+| Idle timeout | Inactivity logout configured | Unused session hijack |
+| CSRF protection | SameSite cookie attribute set | CSRF attacks |
+| Revocation capability | Remote session termination API | Incident response gap |
+| JWKS validation | Public key fetched & cached | Token forgery |
+
+For each concern, mark: ✅ Implemented | ⚠️ Partial | ❌ Missing | 🔍 Cannot determine
+
+Flag any critical anti-patterns immediately before options:
+- Tokens stored in localStorage → XSS risk
+- Missing HttpOnly flag → JS-accessible session tokens
+- No refresh rotation → session fixation window
+
+---
+
+## Phase 3: Options — Scalekit Implementation Paths
+
+Present only the options relevant to what is missing or broken. Tailor code examples to the
+actual framework and language detected in Phase 1.
+
+---
+
+### Option A: Full Stack Auth (FSA) — Scalekit Manages Sessions End-to-End
+**Best for:** New projects, or apps willing to delegate the full session lifecycle to Scalekit.
+
+Scalekit issues access tokens, refresh tokens, and ID tokens after login (Magic Link/OTP,
+Social, Enterprise SSO). Store them in HttpOnly cookies:
+
+```typescript
+// After successful Scalekit login callback
+res.cookie('access_token', tokens.access_token, {
+ httpOnly: true,
+ secure: true,
+ sameSite: 'lax',
+ path: '/api',
+ maxAge: 5 * 60 * 1000 // 5 minutes — match Scalekit dashboard config
+});
+
+res.cookie('refresh_token', tokens.refresh_token, {
+ httpOnly: true,
+ secure: true,
+ sameSite: 'strict',
+ path: '/auth/refresh', // scope to refresh endpoint only
+ maxAge: 7 * 24 * 60 * 60 * 1000 // 7 days
+});
+
+// ID token: accessible to JS for logout flows
+res.cookie('id_token', tokens.id_token, {
+ secure: true,
+ sameSite: 'lax',
+ path: '/'
+});
+```
+
+**Middleware pattern for every protected route:**
+```typescript
+async function scalekitSessionMiddleware(req, res, next) {
+ const accessToken = req.cookies.access_token;
+ if (!accessToken) return res.redirect('/login');
+
+ try {
+ const payload = await scalekit.auth.validateAccessToken(accessToken);
+ req.user = payload;
+ return next();
+ } catch (err) {
+ if (err.code === 'TOKEN_EXPIRED') {
+ return await handleTokenRefresh(req, res, next);
+ }
+ return res.redirect('/login');
+ }
+}
+
+async function handleTokenRefresh(req, res, next) {
+ const refreshToken = req.cookies.refresh_token;
+ if (!refreshToken) return res.redirect('/login');
+
+ try {
+ const newTokens = await scalekit.auth.refreshTokens(refreshToken);
+ res.cookie('access_token', newTokens.access_token, { /* same options */ });
+ res.cookie('refresh_token', newTokens.refresh_token, { /* same options */ });
+ req.user = await scalekit.auth.validateAccessToken(newTokens.access_token);
+ return next();
+ } catch (err) {
+ res.clearCookie('access_token');
+ res.clearCookie('refresh_token');
+ return res.redirect('/login');
+ }
+}
+```
+
+**Dashboard configuration (no code needed):**
+- Absolute session timeout: max duration user stays logged in
+- Idle session timeout: logout on inactivity
+- Access token lifetime: how often silent refresh triggers
+
+**Effort:** Medium | **Control:** Scalekit-managed | **Migration risk:** High if existing sessions
+
+---
+
+### Option B: Modular SSO — Scalekit for Identity Only, App Manages Sessions
+**Best for:** Apps with existing session infrastructure (express-session, next-auth, iron-session,
+lucia) that want enterprise SSO without rebuilding auth.
+
+```typescript
+// After Scalekit SSO callback — create your own session from verified identity
+app.get('/auth/callback', async (req, res) => {
+ const { code } = req.query;
+
+ const { user, idTokenClaims } = await scalekit.auth.authenticateWithCode(code, {
+ redirectUri: process.env.REDIRECT_URI
+ });
+
+ // Create session using YOUR existing mechanism
+ req.session.userId = user.id;
+ req.session.email = user.email;
+ req.session.org = idTokenClaims.org_id;
+ req.session.save(() => res.redirect('/dashboard'));
+});
+```
+
+**When to use this:**
+- `express-session`, `iron-session`, `lucia`, or similar already in place
+- Session storage (Redis, DB) is already wired
+- You need SSO on top, not a full auth overhaul
+
+**Effort:** Low | **Control:** App-managed | **Migration risk:** Low
+
+---
+
+### Option C: Remote Session Management API
+**Best for:** Adding session visibility and revocation to account settings or security
+dashboards. Works alongside Option A or B.
+
+```typescript
+// List all active sessions for a user (for account settings page)
+const sessions = await scalekit.sessions.list({ userId: req.user.id });
+
+// Revoke a specific session (user clicks "Sign out of this device")
+await scalekit.sessions.revoke({ sessionId: req.params.sessionId });
+
+// Revoke all sessions for a user (security incident response)
+await scalekit.sessions.revokeAll({ userId: req.user.id });
+```
+
+**Effort:** Low (additive) | **Control:** Full | **Migration risk:** None
+
+---
+
+### Option D: Agent Auth — Token Vault for AI Agent Scenarios
+**Best for:** AI apps where agents make API calls on behalf of users to third-party services.
+
+```typescript
+// Agent retrieves a valid token for a user's connected account
+const { access_token } = await scalekit.agentAuth.getToken({
+ userId: req.user.id,
+ provider: 'google',
+ scopes: ['calendar.read']
+});
+
+// Token is automatically refreshed, encrypted at rest, rotated on use
+await googleCalendarClient.listEvents({
+ headers: { Authorization: `Bearer ${access_token}` }
+});
+```
+
+**Effort:** Low | **Control:** Scalekit-managed token vault | **Migration risk:** None
+
+---
+
+## Phase 4: Recommendation Output Format
+
+Produce this structured report after completing all phases:
+
+---
+
+### 🔍 Session Audit Report
+
+**Detected stack:** [Framework, language, existing auth libs]
+**Existing Scalekit integration:** [Yes / Partial / None]
+**Session storage detected:** [Cookies / localStorage / In-memory / Server-side / Unknown]
+
+#### Audit Results
+[Completed audit table from Phase 2]
+
+#### ⚠️ Critical Anti-Patterns (fix before anything else)
+[List any immediate security issues with specific file references]
+
+#### Recommended Implementation Path
+**Primary:** [Option A / B / C / D] — [One-line reason tied to audit findings]
+**Secondary (if applicable):** [Option] — [Why it complements primary]
+
+#### Critical Gaps to Address First
+1. [Gap] — [Specific file:line to fix] — [Scalekit feature that addresses it]
+2. ...
+
+#### Implementation Steps
+[Numbered, concrete steps specific to this codebase. Reference actual file paths. No generic steps.]
+
+#### Scalekit Dashboard Actions Required
+- [ ] Set absolute session timeout to [suggested value based on app type]
+- [ ] Set access token lifetime to [suggested value]
+- [ ] Enable/disable idle session timeout
+
+---
+
+## Routing After Audit
+
+After delivering the report, offer to route to the appropriate skill for implementation:
+
+- Option A selected → `plugins/saaskit/skills/implementing-saaskit/SKILL.md`
+- Option B selected → `plugins/saaskit/skills/implementing-modular-sso/SKILL.md`
+- Option D selected → `plugins/agentkit/skills/integrating-agentkit/SKILL.md`
+
+If Scalekit is not yet set up, route to setup first:
+- `plugins/saaskit/references/setup-scalekit.md`
diff --git a/plugins/saaskit/references/setup-scalekit.md b/plugins/saaskit/references/setup-scalekit.md
new file mode 100644
index 0000000..aea1c50
--- /dev/null
+++ b/plugins/saaskit/references/setup-scalekit.md
@@ -0,0 +1,100 @@
+# Scalekit Setup Guide
+
+Reference for setting up Scalekit credentials, installing the SDK, and verifying the integration works before building features.
+
+## Required environment variables
+
+| Variable | Where to find it |
+|----------|-----------------|
+| `SCALEKIT_ENVIRONMENT_URL` | [app.scalekit.com](https://app.scalekit.com) → Settings → Environment |
+| `SCALEKIT_CLIENT_ID` | [app.scalekit.com](https://app.scalekit.com) → Developers → Settings → API Credentials |
+| `SCALEKIT_CLIENT_SECRET` | [app.scalekit.com](https://app.scalekit.com) → Developers → Settings → API Credentials |
+
+Store credentials in `.env`, shell environment, or CI secrets. Never hardcode them in source files.
+
+## Setup workflow
+
+### 1. Determine language and env var location
+
+Identify the project's language/runtime (Node.js, Python, Go, Java) and where env vars should live (`.env`, shell profile, CI secrets).
+
+### 2. Confirm env vars exist
+
+Verify all three variables are set in the current shell or process:
+
+```bash
+echo $SCALEKIT_ENVIRONMENT_URL
+echo $SCALEKIT_CLIENT_ID
+echo $SCALEKIT_CLIENT_SECRET
+```
+
+### 3. Install the SDK
+
+| Language | Package |
+|----------|---------|
+| Node.js | `npm install @scalekit-sdk/node` |
+| Python | `pip install scalekit-sdk-python` |
+| Go | `go get github.com/scalekit-inc/scalekit-sdk-go` |
+| Java | Add `scalekit-sdk-java` to Maven/Gradle |
+
+### 4. Initialize the client
+
+**Python**
+```python
+import scalekit.client, os
+from dotenv import load_dotenv
+load_dotenv()
+
+scalekit = scalekit.client.ScalekitClient(
+ client_id=os.getenv("SCALEKIT_CLIENT_ID"),
+ client_secret=os.getenv("SCALEKIT_CLIENT_SECRET"),
+ env_url=os.getenv("SCALEKIT_ENVIRONMENT_URL"),
+)
+```
+
+**Node.js**
+```typescript
+import { ScalekitClient } from '@scalekit-sdk/node';
+import 'dotenv/config';
+
+const scalekit = new ScalekitClient(
+ process.env.SCALEKIT_ENVIRONMENT_URL!,
+ process.env.SCALEKIT_CLIENT_ID!,
+ process.env.SCALEKIT_CLIENT_SECRET!
+);
+```
+
+### 5. Verify credentials
+
+List organizations with a small page size as the simplest verification:
+
+**Python**
+```python
+orgs = scalekit.organizations.list(page_size=5)
+print(f"Connected. Found {len(orgs.organizations)} organizations.")
+```
+
+**Node.js**
+```typescript
+const orgs = await scalekit.organization.listOrganizations({ pageSize: 5 });
+console.log(`Connected. Found ${orgs.organizations.length} organizations.`);
+```
+
+### 6. Diagnose failures
+
+If verification fails, check in this order:
+
+1. **Wrong environment URL** — dev vs prod, missing `https://` prefix
+2. **Missing env vars** — not loaded in current shell/process, `.env` not in project root
+3. **Incorrect client ID/secret** — regenerate from dashboard if unsure
+4. **Network/DNS issues** — corporate proxy, firewall, or VPN blocking the request
+
+## After setup succeeds
+
+Route to the appropriate skill for the user's goal:
+
+- SSO → `plugins/saaskit/skills/implementing-modular-sso/SKILL.md`
+- SCIM → `plugins/saaskit/skills/implementing-scim-provisioning/SKILL.md`
+- MCP server auth → `plugins/saaskit/skills/adding-mcp-oauth/SKILL.md`
+- SaaSKit auth → `plugins/saaskit/skills/implementing-saaskit/SKILL.md`
+- Agent auth → `plugins/agentkit/skills/integrating-agentkit/SKILL.md`
diff --git a/plugins/saaskit/skills/testing-auth-setup/SKILL.md b/plugins/saaskit/skills/testing-auth-setup/SKILL.md
new file mode 100644
index 0000000..4db0bd2
--- /dev/null
+++ b/plugins/saaskit/skills/testing-auth-setup/SKILL.md
@@ -0,0 +1,55 @@
+---
+name: testing-auth-setup
+description: Validates a Scalekit auth integration by running the dryrun CLI against a live environment. Use when the user says "test my auth", "verify SSO setup", "check my login flow", "dryrun", or wants to confirm their Scalekit credentials and configuration are working.
+argument-hint: "[fsa|sso]"
+---
+
+# Testing Auth Setup
+
+Runs the Scalekit dryrun CLI to validate that your auth integration is correctly configured against a live environment.
+
+## Modes
+
+| Mode | What it tests | When to use |
+|------|--------------|-------------|
+| `fsa` | Full-stack auth login flow | User is setting up or verifying login, callback, and session handling |
+| `sso` | Enterprise SSO flow | User is setting up or verifying SAML/OIDC SSO with an identity provider |
+
+## Prerequisites
+
+Before running, confirm these environment variables are available:
+
+- `SCALEKIT_ENV_URL` — your Scalekit environment URL
+- `SCALEKIT_CLIENT_ID` — your client ID from app.scalekit.com → Settings
+
+If either is missing, ask the user to provide them. Do not write credentials into source-controlled files.
+
+## Running the test
+
+### Full-stack auth (fsa)
+
+```bash
+npx @scalekit-sdk/dryrun --env_url= --client_id= --mode=fsa
+```
+
+### Enterprise SSO
+
+Requires an `organization_id` — ask for it if not provided.
+
+```bash
+npx @scalekit-sdk/dryrun --env_url= --client_id= --mode=sso --organization_id=
+```
+
+## Choosing the mode
+
+If the user doesn't specify a mode:
+
+1. Check the project context — if there's SSO configuration (identity providers, SAML metadata), suggest `sso`.
+2. Otherwise default to `fsa` as the most common starting point.
+3. If ambiguous, ask which mode to use.
+
+## After running
+
+- Show the command output.
+- Explain what passed and what failed in plain language.
+- If the test fails, suggest specific next steps based on the error (missing redirect URI, invalid credentials, organization not found, etc.).
\ No newline at end of file
From 77cc16d0fac83a6e48862013211b765b94603777 Mon Sep 17 00:00:00 2001
From: Saif Shines
Date: Wed, 13 May 2026 17:21:00 +0530
Subject: [PATCH 07/19] Improve post-install message with plugin activation and
auto-update guidance
---
scripts/install.sh | 31 +++++++++++++++++++++++--------
1 file changed, 23 insertions(+), 8 deletions(-)
diff --git a/scripts/install.sh b/scripts/install.sh
index 3360e1d..f337e45 100755
--- a/scripts/install.sh
+++ b/scripts/install.sh
@@ -111,11 +111,16 @@ Available plugins:
agentkit — AI agent authentication (connectors, tool discovery, token vault)
saaskit — B2B SaaS authentication (login, SSO, SCIM, RBAC, MCP server auth)
-Next steps:
-1. Restart Codex.
+To activate the plugins in Codex:
+1. Restart Codex (or reload the session).
2. Open the Plugin Directory.
-3. Choose "Scalekit Auth Stack".
+3. Select "Scalekit Auth Stack" as your marketplace.
4. Install agentkit, saaskit, or both.
+5. Set update policy to "Auto-update (recommended)" to stay current.
+
+To verify:
+ Check the Plugin Directory shows agentkit and saaskit as installed.
+ Try a skill: ask "help me integrate agentkit" or "test my auth setup".
EOF
elif [[ "$PERSONAL_RESULT" == "updated" ]]; then
cat <
Date: Wed, 13 May 2026 17:30:56 +0530
Subject: [PATCH 08/19] Simplify post-install message to focus on what to look
for, not UI steps
---
scripts/install.sh | 52 ++++++++++++++++++++--------------------------
1 file changed, 23 insertions(+), 29 deletions(-)
diff --git a/scripts/install.sh b/scripts/install.sh
index f337e45..a4da0bf 100755
--- a/scripts/install.sh
+++ b/scripts/install.sh
@@ -111,16 +111,14 @@ Available plugins:
agentkit — AI agent authentication (connectors, tool discovery, token vault)
saaskit — B2B SaaS authentication (login, SSO, SCIM, RBAC, MCP server auth)
-To activate the plugins in Codex:
-1. Restart Codex (or reload the session).
-2. Open the Plugin Directory.
-3. Select "Scalekit Auth Stack" as your marketplace.
-4. Install agentkit, saaskit, or both.
-5. Set update policy to "Auto-update (recommended)" to stay current.
-
-To verify:
- Check the Plugin Directory shows agentkit and saaskit as installed.
- Try a skill: ask "help me integrate agentkit" or "test my auth setup".
+What to do next in Codex:
+- Restart Codex (or reload the session).
+- Look for the "Scalekit Auth Stack" marketplace in your plugin settings.
+- Install both plugins: "agentkit" and "saaskit".
+- Set the update policy to auto-update so you always have the latest skills.
+
+To verify it works:
+ Ask Codex to "help me integrate agentkit" or "test my auth setup".
EOF
elif [[ "$PERSONAL_RESULT" == "updated" ]]; then
cat <
Date: Wed, 13 May 2026 18:05:24 +0530
Subject: [PATCH 09/19] =?UTF-8?q?Fix=20stale=20terminology:=20Agent=20Auth?=
=?UTF-8?q?=20=E2=86=92=20AgentKit=20across=20all=20plugin=20content?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
- Replace 'Agent Auth' with 'AgentKit' in 8 files (skills, references)
- Fix stale skill reference: integrating-agent-auth → integrating-agentkit
- Fix stale URL: /agent-auth/connected-accounts → connected-accounts.md
---
.../agentkit/references/agent-connectors/README.md | 4 ++--
plugins/agentkit/references/byoc.md | 6 +++---
plugins/agentkit/references/code-samples.md | 4 ++--
plugins/agentkit/references/connected-accounts.md | 4 ++--
plugins/agentkit/references/connections.md | 12 ++++++------
.../skills/exposing-agentkit-via-mcp/SKILL.md | 8 ++++----
.../agentkit/skills/integrating-agentkit/SKILL.md | 8 ++++----
.../references/session-management-patterns.md | 4 ++--
8 files changed, 25 insertions(+), 25 deletions(-)
diff --git a/plugins/agentkit/references/agent-connectors/README.md b/plugins/agentkit/references/agent-connectors/README.md
index 807653a..2a38c02 100644
--- a/plugins/agentkit/references/agent-connectors/README.md
+++ b/plugins/agentkit/references/agent-connectors/README.md
@@ -1,6 +1,6 @@
# Agent Connectors Reference
-This directory contains documentation for all supported agent connectors in the Scalekit Agent Auth platform.
+This directory contains documentation for all supported agent connectors in the Scalekit AgentKit platform.
## Available Connectors
@@ -61,7 +61,7 @@ Each connector documentation includes:
## Authentication
-Connectors support OAuth 2.0, API Key, or Basic Auth authentication through the Agent Auth platform. You'll need to:
+Connectors support OAuth 2.0, API Key, or Basic Auth authentication through the AgentKit platform. You'll need to:
1. Create a connection for the desired service
2. Configure OAuth credentials in your connection
diff --git a/plugins/agentkit/references/byoc.md b/plugins/agentkit/references/byoc.md
index b88d0f6..83460ac 100644
--- a/plugins/agentkit/references/byoc.md
+++ b/plugins/agentkit/references/byoc.md
@@ -1,6 +1,6 @@
# Bring Your Own Credentials
-Bring Your Own Credentials (BYOC) allows you to use your own OAuth applications and authentication credentials with Agent Auth instead of Scalekit's shared credentials. This provides complete control over the authentication experience and enables full whitelabeling of your application.
+Bring Your Own Credentials (BYOC) allows you to use your own OAuth applications and authentication credentials with AgentKit instead of Scalekit's shared credentials. This provides complete control over the authentication experience and enables full whitelabeling of your application.
## Why bring your own credentials?
@@ -33,7 +33,7 @@ With BYOC, authentication flows work as follows:
1. **Scalekit** handles the initial authentication request with your OAuth client-id details
2. **Provider** authenticates the user and returns tokens to Scalekit
-3. **Agent Auth** uses your tokens to execute tools on behalf of users
+3. **AgentKit** uses your tokens to execute tools on behalf of users
## Setting up BYOC
@@ -53,4 +53,4 @@ If you're currently using Scalekit's shared credentials and want to migrate to B
> - Rate limits and quotas will change to your application's limits
> - Some users may need to re-grant permissions
-By implementing BYOC, you gain complete control over your users' authentication experience while maintaining the power and flexibility of Agent Auth's unified API for tool execution.
+By implementing BYOC, you gain complete control over your users' authentication experience while maintaining the power and flexibility of AgentKit's unified API for tool execution.
diff --git a/plugins/agentkit/references/code-samples.md b/plugins/agentkit/references/code-samples.md
index 537ca57..81361aa 100644
--- a/plugins/agentkit/references/code-samples.md
+++ b/plugins/agentkit/references/code-samples.md
@@ -1,6 +1,6 @@
# Code Samples
-This reference provides implementation examples for integrating Scalekit Agent Auth across different frameworks, languages, and use cases.
+This reference provides implementation examples for integrating Scalekit AgentKit across different frameworks, languages, and use cases.
## Quick Start Guide
@@ -129,7 +129,7 @@ response = agent_executor.invoke({
### Repository: [scalekit-inc/google-adk-agent-example](https://github.com/scalekit-inc/google-adk-agent-example.git)
-**Overview:** Minimal Gmail-powered agent demonstrating Agent Auth integration with Google's Agent Development Kit. Entire integration fits in one file.
+**Overview:** Minimal Gmail-powered agent demonstrating AgentKit integration with Google's Agent Development Kit. Entire integration fits in one file.
**Requirements:**
- Python >= 3.11
diff --git a/plugins/agentkit/references/connected-accounts.md b/plugins/agentkit/references/connected-accounts.md
index c32f761..6aa7b9c 100644
--- a/plugins/agentkit/references/connected-accounts.md
+++ b/plugins/agentkit/references/connected-accounts.md
@@ -1,6 +1,6 @@
# Connected accounts
-Connected accounts in Agent Auth represent individual user or organization connections to third-party providers. They contain the authentication state, tokens, and permissions needed to execute tools on behalf of a specific identifier (user_id, org_id, or custom identifier).
+Connected accounts in AgentKit represent individual user or organization connections to third-party providers. They contain the authentication state, tokens, and permissions needed to execute tools on behalf of a specific identifier (user_id, org_id, or custom identifier).
## What are connected accounts?
@@ -51,7 +51,7 @@ F -> B
### Using the dashboard
-1. Navigate to connected accounts in your Agent Auth dashboard
+1. Navigate to connected accounts in your AgentKit dashboard
2. Click create account to start the process
3. Select connection to use for authentication
4. Enter identifier (user_id, email, or custom identifier)
diff --git a/plugins/agentkit/references/connections.md b/plugins/agentkit/references/connections.md
index 118dc1f..5f0ef42 100644
--- a/plugins/agentkit/references/connections.md
+++ b/plugins/agentkit/references/connections.md
@@ -1,6 +1,6 @@
# Connections
-Connections in Agent Auth are specific configurations that define how your application authenticates and interacts with third-party providers. Each connection contains the necessary credentials, settings, and parameters required to establish secure communication with a provider's API.
+Connections in AgentKit are specific configurations that define how your application authenticates and interacts with third-party providers. Each connection contains the necessary credentials, settings, and parameters required to establish secure communication with a provider's API.
## Table of Contents
@@ -18,7 +18,7 @@ Connections in Agent Auth are specific configurations that define how your appli
## What are connections?
-Connections serve as the bridge between your Agent Auth setup and third-party providers. They contain:
+Connections serve as the bridge between your AgentKit setup and third-party providers. They contain:
- **Authentication credentials** (OAuth client ID/secret, API keys, etc.)
- **Configuration settings** (scopes, permissions, endpoints)
@@ -28,7 +28,7 @@ Connections serve as the bridge between your Agent Auth setup and third-party pr
## Connection types
-Agent Auth supports various connection types based on different authentication methods:
+AgentKit supports various connection types based on different authentication methods:
### OAuth 2.0 connections
@@ -101,7 +101,7 @@ For providers with unique authentication requirements:
### Using the dashboard
-1. **Navigate to connections** in your Agent Auth dashboard
+1. **Navigate to connections** in your AgentKit dashboard
2. **Select provider** from the list of available providers
3. **Choose connection type** based on your authentication method
4. **Configure credentials** by entering your API keys or OAuth settings
@@ -111,7 +111,7 @@ For providers with unique authentication requirements:
### Using the API
-Create connections programmatically using the Agent Auth API:
+Create connections programmatically using the AgentKit API:
**cURL:**
@@ -427,7 +427,7 @@ Use templates for common connection patterns:
}
```
-Next, learn how to create and manage [Connected accounts](/agent-auth/connected-accounts) that use these connections to authenticate and execute tools for your users.
+Next, learn how to create and manage [Connected accounts](connected-accounts.md) that use these connections to authenticate and execute tools for your users.
## Related documentation
diff --git a/plugins/agentkit/skills/exposing-agentkit-via-mcp/SKILL.md b/plugins/agentkit/skills/exposing-agentkit-via-mcp/SKILL.md
index 20b19e6..5c54742 100644
--- a/plugins/agentkit/skills/exposing-agentkit-via-mcp/SKILL.md
+++ b/plugins/agentkit/skills/exposing-agentkit-via-mcp/SKILL.md
@@ -7,9 +7,9 @@ description: Guides developers through creating a Scalekit MCP server with authe
Scalekit lets you build MCP servers that manage authentication, create personalized access URLs for users, and define which tools are accessible. You can also bundle several toolkits (e.g., Gmail + Google Calendar) within a single server.
-[Model Context Protocol (MCP)](https://modelcontextprotocol.io/docs/getting-started/intro) is an open-source standard that enables AI systems to interface with external tools and data sources. Where the `integrating-agent-auth` skill uses the SDK directly, this workflow exposes Scalekit tools over the MCP protocol so any compliant client — LangChain, Claude Desktop, MCP Inspector — can consume them.
+[Model Context Protocol (MCP)](https://modelcontextprotocol.io/docs/getting-started/intro) is an open-source standard that enables AI systems to interface with external tools and data sources. Where the `integrating-agentkit` skill uses the SDK directly, this workflow exposes Scalekit tools over the MCP protocol so any compliant client — LangChain, Claude Desktop, MCP Inspector — can consume them.
-> **Note:** Agent Auth MCP servers only support Streamable HTTP transport.
+> **Note:** AgentKit MCP servers only support Streamable HTTP transport.
## What you'll build
@@ -23,12 +23,12 @@ Scalekit lets you build MCP servers that manage authentication, create personali
> **Gmail is the only connector that does not require dashboard setup.** All other connectors (including Google Calendar) must be created in the Scalekit Dashboard before use:
>
-> Go to **Scalekit Dashboard → Agent Auth → Connections → + Create Connection → Select connector** → Set `Connection Name` → Save
+> Go to **Scalekit Dashboard → AgentKit → Connections → + Create Connection → Select connector** → Set `Connection Name` → Save
> **Important**: The **Connection Name** you set in the dashboard is exactly what you use as the `connection_name` parameter in your code. They must match exactly.
For this example, create the Google Calendar connector:
-- [ ] **Google Calendar connector**: Scalekit Dashboard → Agent Auth → Connections → Create Connection → Google Calendar → `Connection Name = MY_CALENDAR` → Save
+- [ ] **Google Calendar connector**: Scalekit Dashboard → AgentKit → Connections → Create Connection → Google Calendar → `Connection Name = MY_CALENDAR` → Save
## Step 1 — Set up your environment
diff --git a/plugins/agentkit/skills/integrating-agentkit/SKILL.md b/plugins/agentkit/skills/integrating-agentkit/SKILL.md
index 7c37bdd..facd3c1 100644
--- a/plugins/agentkit/skills/integrating-agentkit/SKILL.md
+++ b/plugins/agentkit/skills/integrating-agentkit/SKILL.md
@@ -3,7 +3,7 @@ name: integrating-agentkit
description: Integrates Scalekit AgentKit into a project to handle OAuth flows, token storage, and automatic refresh for third-party connectors (Gmail, Slack, Notion, Calendar, and 40+ more). Use when a user needs to connect to an external service, authorize OAuth access, fetch access or refresh tokens, execute API calls on behalf of a user, or build agents with LangChain or Google ADK.
---
-# Agent Auth Integration
+# AgentKit Integration
Scalekit handles the full OAuth lifecycle — authorization, token storage, and refresh — so agents can act on behalf of users in Gmail, Slack, Notion, Calendar, and other connectors.
@@ -16,7 +16,7 @@ Install the SDK and initialize the client:
> **Important**: Except for Gmail, all connectors must be configured in the Scalekit Dashboard first before creating authorization URLs.
>
-> To set up a connector: **Scalekit Dashboard → Agent Auth → Connections → + Create Connection → Select connector → Set Connection Name → Save**
+> To set up a connector: **Scalekit Dashboard → AgentKit → Connections → + Create Connection → Select connector → Set Connection Name → Save**
@@ -63,7 +63,7 @@ Before integrating with a connector, follow these steps in the Scalekit Dashboar
For all other connectors (Slack, Notion, Google Calendar, etc.):
-1. Go to **Scalekit Dashboard → Agent Auth → Connections**
+1. Go to **Scalekit Dashboard → AgentKit → Connections**
2. Click **+ Create Connection**
3. Select the connector you want to use
4. Enter a **Connection Name** (e.g., `MY_SLACK`, `MY_NOTION`)
@@ -83,7 +83,7 @@ For all other connectors (Slack, Notion, Google Calendar, etc.):
Copy this checklist and check off steps as you complete them:
```
-Agent Auth Integration Progress:
+AgentKit Integration Progress:
- [ ] Step 1: SDK installed and client initialized
- [ ] Step 2: Connected account created for the user
- [ ] Step 3: User has authorized the connection (status = ACTIVE)
diff --git a/plugins/saaskit/references/session-management-patterns.md b/plugins/saaskit/references/session-management-patterns.md
index 228a5d0..6421c8a 100644
--- a/plugins/saaskit/references/session-management-patterns.md
+++ b/plugins/saaskit/references/session-management-patterns.md
@@ -1,6 +1,6 @@
# Session Management Patterns
-Reference guide for evaluating and implementing session management with Scalekit. Covers audit checklists, implementation options (FSA, Modular SSO, Remote API, Agent Auth), and code patterns.
+Reference guide for evaluating and implementing session management with Scalekit. Covers audit checklists, implementation options (FSA, Modular SSO, Remote API, AgentKit), and code patterns.
Related references:
- [scalekit-user-profiles.md](scalekit-user-profiles.md) — attribute schema and SDK methods
@@ -210,7 +210,7 @@ await scalekit.sessions.revokeAll({ userId: req.user.id });
---
-### Option D: Agent Auth — Token Vault for AI Agent Scenarios
+### Option D: AgentKit — Token Vault for AI Agent Scenarios
**Best for:** AI apps where agents make API calls on behalf of users to third-party services.
```typescript
From 36ad3d9e95382fcd379936dfc815ca2b8d9e1bf8 Mon Sep 17 00:00:00 2001
From: Saif Shines
Date: Wed, 13 May 2026 18:07:21 +0530
Subject: [PATCH 10/19] Add Codex CLI check warning to install script
---
scripts/install.sh | 6 ++++++
1 file changed, 6 insertions(+)
diff --git a/scripts/install.sh b/scripts/install.sh
index a4da0bf..748b0b5 100755
--- a/scripts/install.sh
+++ b/scripts/install.sh
@@ -2,6 +2,12 @@
set -euo pipefail
+if ! command -v codex >/dev/null 2>&1; then
+ echo "Warning: Codex CLI is not installed or not on PATH." >&2
+ echo "The plugins will be copied, but you will need Codex to use them." >&2
+ echo
+fi
+
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
REPO_ROOT="$(cd "$SCRIPT_DIR/.." && pwd)"
From e596e192d50f242b308f14eed4969667b235771e Mon Sep 17 00:00:00 2001
From: Saif Shines
Date: Wed, 13 May 2026 18:08:52 +0530
Subject: [PATCH 11/19] Add usage beacon hooks to both plugins
- Add hooks/hooks.json and hooks/beacon.sh to agentkit and saaskit
- Beacon sends plugin_used event to PostHog on session stop
- Update AGENTS.md to reflect hooks support
---
AGENTS.md | 2 +-
plugins/agentkit/hooks/beacon.sh | 20 ++++++++++++++++++++
plugins/agentkit/hooks/hooks.json | 16 ++++++++++++++++
plugins/saaskit/hooks/beacon.sh | 20 ++++++++++++++++++++
plugins/saaskit/hooks/hooks.json | 16 ++++++++++++++++
5 files changed, 73 insertions(+), 1 deletion(-)
create mode 100755 plugins/agentkit/hooks/beacon.sh
create mode 100644 plugins/agentkit/hooks/hooks.json
create mode 100755 plugins/saaskit/hooks/beacon.sh
create mode 100644 plugins/saaskit/hooks/hooks.json
diff --git a/AGENTS.md b/AGENTS.md
index d5b1143..e9abc86 100644
--- a/AGENTS.md
+++ b/AGENTS.md
@@ -79,7 +79,7 @@ Codex plugins differ from Claude Code and Cursor plugins:
- **No `.claude-plugin/` or `.cursor-plugin/` directory.** Codex uses `~/.agents/plugins/marketplace.json` to discover marketplaces.
- **No rules (`.mdc` files).** Codex does not support Cursor-style rules. Use skill content and references instead.
- **No agents.** Codex does not support sub-agent definitions. Guidance that would be an agent in other auth stacks should be a skill or reference doc here.
-- **No hooks.** Codex does not support lifecycle hooks.
+- **Hooks.** Codex supports `hooks.json` for lifecycle hooks. Both plugins include a usage beacon hook.
- **No commands.** Codex does not support slash commands. Skills are the only entrypoint.
## Skill authoring rules
diff --git a/plugins/agentkit/hooks/beacon.sh b/plugins/agentkit/hooks/beacon.sh
new file mode 100755
index 0000000..eee1202
--- /dev/null
+++ b/plugins/agentkit/hooks/beacon.sh
@@ -0,0 +1,20 @@
+#!/bin/bash
+PLUGIN="${1:-unknown}"
+HOOK="${2:-stop}"
+INPUT=$(cat)
+
+SESSION_ID=$(echo "$INPUT" | python3 -c \
+ "import sys,json; print(json.load(sys.stdin).get('session_id','anonymous'))" \
+ 2>/dev/null || echo "anonymous")
+
+TOOL_NAME=$(echo "$INPUT" | python3 -c \
+ "import sys,json; print(json.load(sys.stdin).get('tool_name',''))" \
+ 2>/dev/null || echo "")
+
+curl -s -o /dev/null --max-time 5 \
+ -X POST https://ph.scalekit.com/i/v0/e/ \
+ -H "Content-Type: application/json" \
+ -d "{\"token\":\"phc_85pLP8gwYvRCQdxgLQP24iqXHPRGaLgEw4S4dgZHJZ\",\
+\"event\":\"plugin_used\",\
+\"distinct_id\":\"${SESSION_ID}\",\
+\"properties\":{\"plugin\":\"${PLUGIN}\",\"coding_agent\":\"codex\",\"hook\":\"${HOOK}\",\"tool_name\":\"${TOOL_NAME}\"}}"
diff --git a/plugins/agentkit/hooks/hooks.json b/plugins/agentkit/hooks/hooks.json
new file mode 100644
index 0000000..5c173a7
--- /dev/null
+++ b/plugins/agentkit/hooks/hooks.json
@@ -0,0 +1,16 @@
+{
+ "description": "Usage beacon for Scalekit agentkit plugin",
+ "hooks": {
+ "Stop": [
+ {
+ "hooks": [
+ {
+ "type": "command",
+ "command": "${CODEX_PLUGIN_ROOT}/hooks/beacon.sh agentkit stop",
+ "timeout": 10
+ }
+ ]
+ }
+ ]
+ }
+}
diff --git a/plugins/saaskit/hooks/beacon.sh b/plugins/saaskit/hooks/beacon.sh
new file mode 100755
index 0000000..eee1202
--- /dev/null
+++ b/plugins/saaskit/hooks/beacon.sh
@@ -0,0 +1,20 @@
+#!/bin/bash
+PLUGIN="${1:-unknown}"
+HOOK="${2:-stop}"
+INPUT=$(cat)
+
+SESSION_ID=$(echo "$INPUT" | python3 -c \
+ "import sys,json; print(json.load(sys.stdin).get('session_id','anonymous'))" \
+ 2>/dev/null || echo "anonymous")
+
+TOOL_NAME=$(echo "$INPUT" | python3 -c \
+ "import sys,json; print(json.load(sys.stdin).get('tool_name',''))" \
+ 2>/dev/null || echo "")
+
+curl -s -o /dev/null --max-time 5 \
+ -X POST https://ph.scalekit.com/i/v0/e/ \
+ -H "Content-Type: application/json" \
+ -d "{\"token\":\"phc_85pLP8gwYvRCQdxgLQP24iqXHPRGaLgEw4S4dgZHJZ\",\
+\"event\":\"plugin_used\",\
+\"distinct_id\":\"${SESSION_ID}\",\
+\"properties\":{\"plugin\":\"${PLUGIN}\",\"coding_agent\":\"codex\",\"hook\":\"${HOOK}\",\"tool_name\":\"${TOOL_NAME}\"}}"
diff --git a/plugins/saaskit/hooks/hooks.json b/plugins/saaskit/hooks/hooks.json
new file mode 100644
index 0000000..a354231
--- /dev/null
+++ b/plugins/saaskit/hooks/hooks.json
@@ -0,0 +1,16 @@
+{
+ "description": "Usage beacon for Scalekit saaskit plugin",
+ "hooks": {
+ "Stop": [
+ {
+ "hooks": [
+ {
+ "type": "command",
+ "command": "${CODEX_PLUGIN_ROOT}/hooks/beacon.sh saaskit stop",
+ "timeout": 10
+ }
+ ]
+ }
+ ]
+ }
+}
From 85f90fd885065186c5bf05307c1531f23f3aa39f Mon Sep 17 00:00:00 2001
From: Saif Shines
Date: Wed, 13 May 2026 18:11:20 +0530
Subject: [PATCH 12/19] Fix hooks for Codex format and add hooks to plugin
manifests
- Remove non-existent CODEX_PLUGIN_ROOT variable, use relative path
- Remove extra description field from hooks.json
- Add hooks field to both plugin.json manifests
---
plugins/agentkit/.codex-plugin/plugin.json | 1 +
plugins/agentkit/hooks/hooks.json | 3 +--
plugins/saaskit/.codex-plugin/plugin.json | 1 +
plugins/saaskit/hooks/hooks.json | 3 +--
4 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/plugins/agentkit/.codex-plugin/plugin.json b/plugins/agentkit/.codex-plugin/plugin.json
index 62612d8..0f71ec1 100644
--- a/plugins/agentkit/.codex-plugin/plugin.json
+++ b/plugins/agentkit/.codex-plugin/plugin.json
@@ -13,6 +13,7 @@
"keywords": ["scalekit", "agentkit", "agent-auth", "oauth", "connectors", "tool-calling"],
"skills": "./skills/",
"mcpServers": "./.mcp.json",
+ "hooks": "./hooks/hooks.json",
"interface": {
"displayName": "AgentKit",
"shortDescription": "Connect agents to third-party apps safely.",
diff --git a/plugins/agentkit/hooks/hooks.json b/plugins/agentkit/hooks/hooks.json
index 5c173a7..361d51d 100644
--- a/plugins/agentkit/hooks/hooks.json
+++ b/plugins/agentkit/hooks/hooks.json
@@ -1,12 +1,11 @@
{
- "description": "Usage beacon for Scalekit agentkit plugin",
"hooks": {
"Stop": [
{
"hooks": [
{
"type": "command",
- "command": "${CODEX_PLUGIN_ROOT}/hooks/beacon.sh agentkit stop",
+ "command": "./hooks/beacon.sh agentkit stop",
"timeout": 10
}
]
diff --git a/plugins/saaskit/.codex-plugin/plugin.json b/plugins/saaskit/.codex-plugin/plugin.json
index 8bd3432..82e4c9b 100644
--- a/plugins/saaskit/.codex-plugin/plugin.json
+++ b/plugins/saaskit/.codex-plugin/plugin.json
@@ -13,6 +13,7 @@
"keywords": ["scalekit", "saaskit", "authentication", "sso", "scim", "mcp-auth", "sessions"],
"skills": "./skills/",
"mcpServers": "./.mcp.json",
+ "hooks": "./hooks/hooks.json",
"interface": {
"displayName": "SaaSKit",
"shortDescription": "Production-ready B2B SaaS authentication.",
diff --git a/plugins/saaskit/hooks/hooks.json b/plugins/saaskit/hooks/hooks.json
index a354231..0b35607 100644
--- a/plugins/saaskit/hooks/hooks.json
+++ b/plugins/saaskit/hooks/hooks.json
@@ -1,12 +1,11 @@
{
- "description": "Usage beacon for Scalekit saaskit plugin",
"hooks": {
"Stop": [
{
"hooks": [
{
"type": "command",
- "command": "${CODEX_PLUGIN_ROOT}/hooks/beacon.sh saaskit stop",
+ "command": "./hooks/beacon.sh saaskit stop",
"timeout": 10
}
]
From 749642214fe9be23913b8d8620c7bc118ca45462 Mon Sep 17 00:00:00 2001
From: Saif Shines
Date: Wed, 13 May 2026 18:14:56 +0530
Subject: [PATCH 13/19] Make bootstrap installer resilient to missing execute
bit in tarball
---
install.sh | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/install.sh b/install.sh
index dc4c90d..31c382a 100755
--- a/install.sh
+++ b/install.sh
@@ -27,9 +27,10 @@ tar -xzf "$ARCHIVE_PATH" -C "$TMP_DIR"
EXTRACTED_DIR="$(find "$TMP_DIR" -mindepth 1 -maxdepth 1 -type d | head -n 1)"
-if [[ -z "$EXTRACTED_DIR" ]] || [[ ! -x "$EXTRACTED_DIR/scripts/install.sh" ]]; then
+if [[ -z "$EXTRACTED_DIR" ]] || [[ ! -f "$EXTRACTED_DIR/scripts/install.sh" ]]; then
echo "Failed to find installer in downloaded archive." >&2
exit 1
fi
+chmod +x "$EXTRACTED_DIR/scripts/install.sh"
exec "$EXTRACTED_DIR/scripts/install.sh"
From 7f8f40bb499c84cd2eaf7b2af0461da8ea092043 Mon Sep 17 00:00:00 2001
From: Saif Shines
Date: Wed, 13 May 2026 18:40:06 +0530
Subject: [PATCH 14/19] Add hooks enable and MCP login instructions to
post-install output
---
scripts/install.sh | 12 ++++++++++++
1 file changed, 12 insertions(+)
diff --git a/scripts/install.sh b/scripts/install.sh
index 748b0b5..b77a07d 100755
--- a/scripts/install.sh
+++ b/scripts/install.sh
@@ -167,3 +167,15 @@ If you intentionally want this installer to replace your personal marketplace fi
FORCE_PERSONAL_MARKETPLACE=1 ./scripts/install.sh
EOF
fi
+
+cat <<'EOF'
+
+Optional setup:
+
+ To enable lifecycle hooks, add this to your Codex config.toml:
+ [features]
+ codex_hooks = true
+
+ To authenticate the Scalekit MCP server for Codex CLI:
+ codex mcp login scalekit
+EOF
From b11ff21d0a4c6ec3d7ba126c42acb089ff20d68e Mon Sep 17 00:00:00 2001
From: Saif Shines
Date: Wed, 13 May 2026 20:58:42 +0530
Subject: [PATCH 15/19] Remove agent-connectors directory, point to live docs
instead
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Per-connector docs are unmaintainable — live AgentKit metadata and
docs.scalekit.com/agentkit/connectors/ are the source of truth.
---
AGENTS.md | 2 +-
.../references/agent-connectors/README.md | 71 ----
.../references/agent-connectors/airtable.md | 3 -
.../references/agent-connectors/asana.md | 3 -
.../references/agent-connectors/attention.md | 3 -
.../references/agent-connectors/bigquery.md | 3 -
.../references/agent-connectors/chorus.md | 3 -
.../agent-connectors/clari_copilot.md | 3 -
.../references/agent-connectors/clickup.md | 3 -
.../references/agent-connectors/confluence.md | 3 -
.../references/agent-connectors/dropbox.md | 3 -
.../references/agent-connectors/fathom.md | 3 -
.../references/agent-connectors/freshdesk.md | 149 ---------
.../references/agent-connectors/github.md | 137 --------
.../references/agent-connectors/gmail.md | 79 -----
.../references/agent-connectors/gong.md | 3 -
.../references/agent-connectors/google_ads.md | 3 -
.../agent-connectors/google_docs.md | 3 -
.../agent-connectors/google_drive.md | 3 -
.../agent-connectors/google_forms.md | 3 -
.../agent-connectors/google_meets.md | 3 -
.../agent-connectors/google_sheets.md | 3 -
.../agent-connectors/google_slides.md | 32 --
.../agent-connectors/googlecalendar.md | 128 -------
.../references/agent-connectors/hubspot.md | 143 --------
.../references/agent-connectors/intercom.md | 3 -
.../references/agent-connectors/jira.md | 3 -
.../references/agent-connectors/linear.md | 58 ----
.../agent-connectors/microsoft_excel.md | 3 -
.../agent-connectors/microsoft_teams.md | 3 -
.../agent-connectors/microsoft_word.md | 3 -
.../references/agent-connectors/monday.md | 3 -
.../references/agent-connectors/notion.md | 189 -----------
.../references/agent-connectors/onedrive.md | 3 -
.../references/agent-connectors/onenote.md | 3 -
.../references/agent-connectors/outlook.md | 3 -
.../references/agent-connectors/salesforce.md | 316 ------------------
.../references/agent-connectors/servicenow.md | 3 -
.../references/agent-connectors/sharepoint.md | 3 -
.../references/agent-connectors/slack.md | 197 -----------
.../references/agent-connectors/snowflake.md | 3 -
.../references/agent-connectors/trello.md | 3 -
.../references/agent-connectors/zendesk.md | 3 -
.../references/agent-connectors/zoom.md | 3 -
plugins/agentkit/references/connectors.md | 4 +-
plugins/agentkit/references/tool-discovery.md | 2 +-
.../discovering-connector-tools/SKILL.md | 2 +-
.../skills/integrating-agentkit/SKILL.md | 2 +-
48 files changed, 6 insertions(+), 1601 deletions(-)
delete mode 100644 plugins/agentkit/references/agent-connectors/README.md
delete mode 100644 plugins/agentkit/references/agent-connectors/airtable.md
delete mode 100644 plugins/agentkit/references/agent-connectors/asana.md
delete mode 100644 plugins/agentkit/references/agent-connectors/attention.md
delete mode 100644 plugins/agentkit/references/agent-connectors/bigquery.md
delete mode 100644 plugins/agentkit/references/agent-connectors/chorus.md
delete mode 100644 plugins/agentkit/references/agent-connectors/clari_copilot.md
delete mode 100644 plugins/agentkit/references/agent-connectors/clickup.md
delete mode 100644 plugins/agentkit/references/agent-connectors/confluence.md
delete mode 100644 plugins/agentkit/references/agent-connectors/dropbox.md
delete mode 100644 plugins/agentkit/references/agent-connectors/fathom.md
delete mode 100644 plugins/agentkit/references/agent-connectors/freshdesk.md
delete mode 100644 plugins/agentkit/references/agent-connectors/github.md
delete mode 100644 plugins/agentkit/references/agent-connectors/gmail.md
delete mode 100644 plugins/agentkit/references/agent-connectors/gong.md
delete mode 100644 plugins/agentkit/references/agent-connectors/google_ads.md
delete mode 100644 plugins/agentkit/references/agent-connectors/google_docs.md
delete mode 100644 plugins/agentkit/references/agent-connectors/google_drive.md
delete mode 100644 plugins/agentkit/references/agent-connectors/google_forms.md
delete mode 100644 plugins/agentkit/references/agent-connectors/google_meets.md
delete mode 100644 plugins/agentkit/references/agent-connectors/google_sheets.md
delete mode 100644 plugins/agentkit/references/agent-connectors/google_slides.md
delete mode 100644 plugins/agentkit/references/agent-connectors/googlecalendar.md
delete mode 100644 plugins/agentkit/references/agent-connectors/hubspot.md
delete mode 100644 plugins/agentkit/references/agent-connectors/intercom.md
delete mode 100644 plugins/agentkit/references/agent-connectors/jira.md
delete mode 100644 plugins/agentkit/references/agent-connectors/linear.md
delete mode 100644 plugins/agentkit/references/agent-connectors/microsoft_excel.md
delete mode 100644 plugins/agentkit/references/agent-connectors/microsoft_teams.md
delete mode 100644 plugins/agentkit/references/agent-connectors/microsoft_word.md
delete mode 100644 plugins/agentkit/references/agent-connectors/monday.md
delete mode 100644 plugins/agentkit/references/agent-connectors/notion.md
delete mode 100644 plugins/agentkit/references/agent-connectors/onedrive.md
delete mode 100644 plugins/agentkit/references/agent-connectors/onenote.md
delete mode 100644 plugins/agentkit/references/agent-connectors/outlook.md
delete mode 100644 plugins/agentkit/references/agent-connectors/salesforce.md
delete mode 100644 plugins/agentkit/references/agent-connectors/servicenow.md
delete mode 100644 plugins/agentkit/references/agent-connectors/sharepoint.md
delete mode 100644 plugins/agentkit/references/agent-connectors/slack.md
delete mode 100644 plugins/agentkit/references/agent-connectors/snowflake.md
delete mode 100644 plugins/agentkit/references/agent-connectors/trello.md
delete mode 100644 plugins/agentkit/references/agent-connectors/zendesk.md
delete mode 100644 plugins/agentkit/references/agent-connectors/zoom.md
diff --git a/AGENTS.md b/AGENTS.md
index e9abc86..328f989 100644
--- a/AGENTS.md
+++ b/AGENTS.md
@@ -42,7 +42,7 @@ Skills:
- `exposing-agentkit-via-mcp` — expose AgentKit tools through MCP for compatible runtimes
- `production-readiness-agentkit` — production readiness checklist for AgentKit integrations
-References: `agent-connectors/` (connector docs), `connected-accounts.md`, `code-samples.md`, `connectors.md`, `connections.md`, `byoc.md`, `redirects.md`, `tool-discovery.md`
+References: `connected-accounts.md`, `code-samples.md`, `connectors.md`, `connections.md`, `byoc.md`, `redirects.md`, `tool-discovery.md`
### saaskit
diff --git a/plugins/agentkit/references/agent-connectors/README.md b/plugins/agentkit/references/agent-connectors/README.md
deleted file mode 100644
index 2a38c02..0000000
--- a/plugins/agentkit/references/agent-connectors/README.md
+++ /dev/null
@@ -1,71 +0,0 @@
-# Agent Connectors Reference
-
-This directory contains documentation for all supported agent connectors in the Scalekit AgentKit platform.
-
-## Available Connectors
-
-| Connector | Description | Auth Type |
-|-----------|-------------|-----------|
-| [Airtable](airtable.md) | Connect to Airtable bases for data management | OAuth 2.0 |
-| [Asana](asana.md) | Project management and task tracking | OAuth 2.0 |
-| [Attention](attention.md) | AI insights, conversations, teams, and workflows | API Key |
-| [BigQuery](bigquery.md) | Google BigQuery data warehouse | OAuth 2.0 |
-| [Chorus](chorus.md) | Sync calls, transcripts, conversation intelligence, and analytics | Basic Auth |
-| [Clari Copilot](clari_copilot.md) | Sales call transcripts, analytics, call data, and insights | API Key |
-| [ClickUp](clickup.md) | Project management and collaboration | OAuth 2.0 |
-| [Confluence](confluence.md) | Atlassian Confluence wiki pages | OAuth 2.0 |
-| [Dropbox](dropbox.md) | File storage and sharing | OAuth 2.0 |
-| [Fathom](fathom.md) | Website analytics | OAuth 2.0 |
-| [Freshdesk](freshdesk.md) | Customer support ticketing | OAuth 2.0 |
-| [GitHub](github.md) | Code repository and development tools | OAuth 2.0 |
-| [Gmail](gmail.md) | Google Gmail email service | OAuth 2.0 |
-| [Google Ads](google_ads.md) | Google advertising platform | OAuth 2.0 |
-| [Google Calendar](googlecalendar.md) | Google Calendar events and scheduling | OAuth 2.0 |
-| [Google Docs](google_docs.md) | Google Docs document editing | OAuth 2.0 |
-| [Google Drive](google_drive.md) | Google Drive file storage | OAuth 2.0 |
-| [Google Forms](google_forms.md) | Google Forms survey creation | OAuth 2.0 |
-| [Google Meet](google_meets.md) | Google Meet video conferencing | OAuth 2.0 |
-| [Google Sheets](google_sheets.md) | Google Sheets spreadsheet editing | OAuth 2.0 |
-| [Google Slides](google_slides.md) | Create, read, and modify presentations programmatically | OAuth 2.0 |
-| [Gong](gong.md) | Sales conversation intelligence | OAuth 2.0 |
-| [HubSpot](hubspot.md) | CRM and marketing automation | OAuth 2.0 |
-| [Intercom](intercom.md) | Customer messaging platform | OAuth 2.0 |
-| [Jira](jira.md) | Atlassian Jira issue tracking | OAuth 2.0 |
-| [Linear](linear.md) | Software development issue tracking | OAuth 2.0 |
-| [Microsoft Excel](microsoft_excel.md) | Microsoft Excel spreadsheet editing | OAuth 2.0 |
-| [Microsoft Teams](microsoft_teams.md) | Microsoft Teams collaboration | OAuth 2.0 |
-| [Microsoft Word](microsoft_word.md) | Microsoft Word document editing | OAuth 2.0 |
-| [Monday](monday.md) | Work management platform | OAuth 2.0 |
-| [Notion](notion.md) | Notion workspace and pages | OAuth 2.0 |
-| [OneDrive](onedrive.md) | Microsoft OneDrive file storage | OAuth 2.0 |
-| [OneNote](onenote.md) | Microsoft OneNote note-taking | OAuth 2.0 |
-| [Outlook](outlook.md) | Microsoft Outlook email | OAuth 2.0 |
-| [Salesforce](salesforce.md) | Salesforce CRM platform | OAuth 2.0 |
-| [ServiceNow](servicenow.md) | IT service management | OAuth 2.0 |
-| [SharePoint](sharepoint.md) | Microsoft SharePoint collaboration | OAuth 2.0 |
-| [Slack](slack.md) | Slack messaging and collaboration | OAuth 2.0 |
-| [Snowflake](snowflake.md) | Snowflake data warehouse | OAuth 2.0 |
-| [Trello](trello.md) | Trello project boards | OAuth 2.0 |
-| [Zendesk](zendesk.md) | Customer support platform | OAuth 2.0 |
-| [Zoom](zoom.md) | Zoom video conferencing | OAuth 2.0 |
-
-## Getting Started
-
-Each connector documentation includes:
-
-- Service description and capabilities
-- Authentication requirements
-- Complete API reference for all available tools
-- Parameter specifications and examples
-- Usage guidelines and best practices
-
-## Authentication
-
-Connectors support OAuth 2.0, API Key, or Basic Auth authentication through the AgentKit platform. You'll need to:
-
-1. Create a connection for the desired service
-2. Configure OAuth credentials in your connection
-3. Create connected accounts for your users
-4. Use the connection in your agent workflows
-
-For detailed authentication setup, see the [Connected Accounts](../connected-accounts.md) documentation.
\ No newline at end of file
diff --git a/plugins/agentkit/references/agent-connectors/airtable.md b/plugins/agentkit/references/agent-connectors/airtable.md
deleted file mode 100644
index f3acf0b..0000000
--- a/plugins/agentkit/references/agent-connectors/airtable.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Airtable. Manage databases, tables, records, and collaborate on structured data
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/asana.md b/plugins/agentkit/references/agent-connectors/asana.md
deleted file mode 100644
index cea2fc7..0000000
--- a/plugins/agentkit/references/agent-connectors/asana.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Asana. Manage tasks, projects, teams, and workflow automation
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/attention.md b/plugins/agentkit/references/agent-connectors/attention.md
deleted file mode 100644
index 9af975e..0000000
--- a/plugins/agentkit/references/agent-connectors/attention.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Attention for AI insights, conversations, teams, and workflows
-
-Supports authentication: API Key
diff --git a/plugins/agentkit/references/agent-connectors/bigquery.md b/plugins/agentkit/references/agent-connectors/bigquery.md
deleted file mode 100644
index 64b8a33..0000000
--- a/plugins/agentkit/references/agent-connectors/bigquery.md
+++ /dev/null
@@ -1,3 +0,0 @@
-BigQuery is Google Cloud’s fully-managed enterprise data warehouse for analytics at scale.
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/chorus.md b/plugins/agentkit/references/agent-connectors/chorus.md
deleted file mode 100644
index b57dd23..0000000
--- a/plugins/agentkit/references/agent-connectors/chorus.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Chorus.ai to sync calls, transcripts, conversation intelligence, and analytics.
-
-Supports authentication: Basic Auth
diff --git a/plugins/agentkit/references/agent-connectors/clari_copilot.md b/plugins/agentkit/references/agent-connectors/clari_copilot.md
deleted file mode 100644
index 2949e94..0000000
--- a/plugins/agentkit/references/agent-connectors/clari_copilot.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Clari Copilot for sales call transcripts, analytics, call data, and insights.
-
-Supports authentication: API Key
diff --git a/plugins/agentkit/references/agent-connectors/clickup.md b/plugins/agentkit/references/agent-connectors/clickup.md
deleted file mode 100644
index dd7d216..0000000
--- a/plugins/agentkit/references/agent-connectors/clickup.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to ClickUp. Manage tasks, projects, workspaces, and team collaboration
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/confluence.md b/plugins/agentkit/references/agent-connectors/confluence.md
deleted file mode 100644
index 96d699f..0000000
--- a/plugins/agentkit/references/agent-connectors/confluence.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Confluence. Manage spaces, pages, content, and team collaboration
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/dropbox.md b/plugins/agentkit/references/agent-connectors/dropbox.md
deleted file mode 100644
index 1bfe1d3..0000000
--- a/plugins/agentkit/references/agent-connectors/dropbox.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Dropbox. Manage files, folders, sharing, and cloud storage workflows
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/fathom.md b/plugins/agentkit/references/agent-connectors/fathom.md
deleted file mode 100644
index 3408c98..0000000
--- a/plugins/agentkit/references/agent-connectors/fathom.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Fathom AI meeting assistant. Record, transcribe, and summarize meetings with AI-powered insights
-
-Supports authentication: API Key
diff --git a/plugins/agentkit/references/agent-connectors/freshdesk.md b/plugins/agentkit/references/agent-connectors/freshdesk.md
deleted file mode 100644
index 424a753..0000000
--- a/plugins/agentkit/references/agent-connectors/freshdesk.md
+++ /dev/null
@@ -1,149 +0,0 @@
-Connect to Freshdesk. Manage tickets, contacts, companies, and customer support workflows
-
-Supports authentication: Basic Auth
-
-## Table of Contents
-
-- [Tool list](#tool-list)
-
----
-
-## Tool list
-
-## `freshdesk_agent_create`
-
-Create a new agent in Freshdesk. Email is required and must be unique. Agent will receive invitation email to set up account. At least one role must be assigned.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `agent_type` | Type of agent (1=Support Agent, 2=Field Agent, 3=Collaborator) | number | null |
-| `email` | Email address of the agent (must be unique) | string |
-| `focus_mode` | Focus mode setting for the agent | boolean | null |
-| `group_ids` | Array of group IDs to assign the agent to | `array` | null |
-| `language` | Language preference of the agent | string | null |
-| `name` | Full name of the agent | string | null |
-| `occasional` | Whether the agent is occasional (true) or full-time (false) | boolean | null |
-| `role_ids` | Array of role IDs to assign to the agent (at least one required) | `array` |
-| `signature` | Agent email signature in HTML format | string | null |
-| `skill_ids` | Array of skill IDs to assign to the agent | `array` | null |
-| `ticket_scope` | Ticket permission level (1=Global Access, 2=Group Access, 3=Restricted Access) | number |
-| `time_zone` | Time zone of the agent | string | null |
-
-## `freshdesk_agent_delete`
-
-Delete an agent from Freshdesk. This action is irreversible and will remove the agent from the system. The agent will no longer have access to the helpdesk and all associated data will be permanently deleted.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `agent_id` | ID of the agent to delete | number |
-
-## `freshdesk_agents_list`
-
-Retrieve a list of agents from Freshdesk with filtering options. Returns agent details including IDs, contact information, roles, and availability status. Supports pagination with up to 100 agents per page.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `email` | Filter agents by email address | string | null |
-| `mobile` | Filter agents by mobile number | string | null |
-| `page` | Page number for pagination (starts from 1) | number | null |
-| `per_page` | Number of agents per page (max 100) | number | null |
-| `phone` | Filter agents by phone number | string | null |
-| `state` | Filter agents by state (fulltime or occasional) | string | null |
-
-## `freshdesk_contact_create`
-
-Create a new contact in Freshdesk. Email and name are required. Supports custom fields, company assignment, and contact segmentation.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `address` | Address of the contact | string | null |
-| `company_id` | Company ID to associate with the contact | number | null |
-| `custom_fields` | Key-value pairs for custom field values | `object` | null |
-| `description` | Description about the contact | string | null |
-| `email` | Email address of the contact | string |
-| `job_title` | Job title of the contact | string | null |
-| `language` | Language preference of the contact | string | null |
-| `mobile` | Mobile number of the contact | string | null |
-| `name` | Full name of the contact | string |
-| `phone` | Phone number of the contact | string | null |
-| `tags` | Array of tags to associate with the contact | `array` | null |
-| `time_zone` | Time zone of the contact | string | null |
-
-## `freshdesk_roles_list`
-
-Retrieve a list of all roles from Freshdesk. Returns role details including IDs, names, descriptions, default status, and timestamps. This endpoint provides information about the different permission levels and access controls available in the Freshdesk system.
-
-## `freshdesk_ticket_create`
-
-Create a new ticket in Freshdesk. Requires either requester_id, email, facebook_id, phone, twitter_id, or unique_external_id to identify the requester.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `cc_emails` | Array of email addresses to be added in CC | `array` | null |
-| `custom_fields` | Key-value pairs containing custom field names and values | `object` | null |
-| `description` | HTML content of the ticket describing the issue | string | null |
-| `email` | Email address of the requester. If no contact exists, will be added as new contact. | string | null |
-| `group_id` | ID of the group to which the ticket has been assigned | number | null |
-| `name` | Name of the requester | string | null |
-| `priority` | Priority of the ticket. 1=Low, 2=Medium, 3=High, 4=Urgent | number | null |
-| `requester_id` | User ID of the requester. For existing contacts, can be passed instead of email. | number | null |
-| `responder_id` | ID of the agent to whom the ticket has been assigned | number | null |
-| `source` | Channel through which ticket was created. 1=Email, 2=Portal, 3=Phone, 7=Chat, 9=Feedback Widget, 10=Outbound Email | number | null |
-| `status` | Status of the ticket. 2=Open, 3=Pending, 4=Resolved, 5=Closed | number | null |
-| `subject` | Subject of the ticket | string | null |
-| `tags` | Array of tags to be associated with the ticket | `array` | null |
-| `type` | Helps categorize the ticket according to different kinds of issues | string | null |
-
-## `freshdesk_ticket_get`
-
-Retrieve details of a specific ticket by ID. Includes ticket properties, conversations, and metadata.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `include` | Additional resources to include (stats, requester, company, conversations) | string | null |
-| `ticket_id` | ID of the ticket to retrieve | number |
-
-## `freshdesk_ticket_update`
-
-Update an existing ticket in Freshdesk. Note: Subject and description of outbound tickets cannot be updated.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `custom_fields` | Key-value pairs containing custom field names and values | `object` | null |
-| `description` | HTML content of the ticket (cannot be updated for outbound tickets) | string | null |
-| `group_id` | ID of the group to which the ticket has been assigned | number | null |
-| `name` | Name of the requester | string | null |
-| `priority` | Priority of the ticket. 1=Low, 2=Medium, 3=High, 4=Urgent | number | null |
-| `responder_id` | ID of the agent to whom the ticket has been assigned | number | null |
-| `status` | Status of the ticket. 2=Open, 3=Pending, 4=Resolved, 5=Closed | number | null |
-| `subject` | Subject of the ticket (cannot be updated for outbound tickets) | string | null |
-| `tags` | Array of tags to be associated with the ticket | `array` | null |
-| `ticket_id` | ID of the ticket to update | number |
-
-## `freshdesk_tickets_list`
-
-Retrieve a list of tickets with filtering and pagination. Supports filtering by status, priority, requester, and more. Returns 30 tickets per page by default.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `company_id` | Filter by company ID | number | null |
-| `email` | Filter by requester email | string | null |
-| `filter` | Filter name (new_and_my_open, watching, spam, deleted) | string | null |
-| `include` | Additional resources to include (description, requester, company, stats) | string | null |
-| `page` | Page number for pagination (starts from 1) | number | null |
-| `per_page` | Number of tickets per page (max 100) | number | null |
-| `requester_id` | Filter by requester ID | number | null |
-| `updated_since` | Filter tickets updated since this timestamp (ISO 8601) | string | null |
-
-## `freshdesk_tickets_reply`
-
-Add a public reply to a ticket conversation. The reply will be visible to the customer and will update the ticket status if specified.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `bcc_emails` | Array of email addresses to BCC on the reply | `array` | null |
-| `body` | HTML content of the reply | string |
-| `cc_emails` | Array of email addresses to CC on the reply | `array` | null |
-| `from_email` | Email address to send the reply from | string | null |
-| `ticket_id` | ID of the ticket to reply to | number |
-| `user_id` | ID of the agent sending the reply | number | null |
diff --git a/plugins/agentkit/references/agent-connectors/github.md b/plugins/agentkit/references/agent-connectors/github.md
deleted file mode 100644
index c9cf234..0000000
--- a/plugins/agentkit/references/agent-connectors/github.md
+++ /dev/null
@@ -1,137 +0,0 @@
-GitHub is a cloud-based Git repository hosting service that allows developers to store, manage, and track changes to their code.
-
-Supports authentication: OAuth 2.0
-
-## Table of Contents
-
-- [Tool list](#tool-list)
-
----
-
-## Tool list
-
-## `github_file_contents_get`
-
-Get the contents of a file or directory from a GitHub repository. Returns Base64 encoded content for files.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `owner` | The account owner of the repository | string |
-| `path` | The content path (file or directory path in the repository) | string |
-| `ref` | The name of the commit/branch/tag | string | null |
-| `repo` | The name of the repository | string |
-
-## `github_file_create_update`
-
-Create a new file or update an existing file in a GitHub repository. Content must be Base64 encoded. Requires SHA when updating existing files.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `author` | Author information object with name and email | `object` | null |
-| `branch` | The branch name | string | null |
-| `committer` | Committer information object with name and email | `object` | null |
-| `content` | The new file content (Base64 encoded) | string |
-| `message` | The commit message for this change | string |
-| `owner` | The account owner of the repository | string |
-| `path` | The file path in the repository | string |
-| `repo` | The name of the repository | string |
-| `sha` | The blob SHA of the file being replaced (required when updating existing files) | string | null |
-
-## `github_issue_create`
-
-Create a new issue in a repository. Requires push access to set assignees, milestones, and labels.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `assignees` | GitHub usernames to assign to the issue | `array` | null |
-| `body` | The contents of the issue | string | null |
-| `labels` | Labels to associate with the issue | `array` | null |
-| `milestone` | Milestone number to associate with the issue | number | null |
-| `owner` | The account owner of the repository | string |
-| `repo` | The name of the repository | string |
-| `title` | The title of the issue | string |
-| `type` | The name of the issue type | string | null |
-
-## `github_issues_list`
-
-List issues in a repository. Both issues and pull requests are returned as issues in the GitHub API.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `assignee` | Filter by assigned user | string | null |
-| `creator` | Filter by issue creator | string | null |
-| `direction` | Sort order | string | null |
-| `labels` | Filter by comma-separated list of label names | string | null |
-| `milestone` | Filter by milestone number or state | string | null |
-| `owner` | The account owner of the repository | string |
-| `page` | Page number of results to fetch | number | null |
-| `per_page` | Number of results per page (max 100) | number | null |
-| `repo` | The name of the repository | string |
-| `since` | Show issues updated after this timestamp (ISO 8601 format) | string | null |
-| `sort` | Property to sort issues by | string | null |
-| `state` | Filter by issue state | string | null |
-
-## `github_public_repos_list`
-
-List public repositories for a specified user. Does not require authentication.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `direction` | Sort order | string | null |
-| `page` | Page number of results to fetch | number | null |
-| `per_page` | Number of results per page (max 100) | number | null |
-| `sort` | Property to sort repositories by | string | null |
-| `type` | Filter repositories by type | string | null |
-| `username` | The GitHub username to list repositories for | string |
-
-## `github_pull_request_create`
-
-Create a new pull request in a repository. Requires write access to the head branch.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `base` | The name of the branch you want the changes pulled into | string |
-| `body` | The contents of the pull request description | string | null |
-| `draft` | Indicates whether the pull request is a draft | boolean | null |
-| `head` | The name of the branch where your changes are implemented (format: user:branch) | string |
-| `maintainer_can_modify` | Indicates whether maintainers can modify the pull request | boolean | null |
-| `owner` | The account owner of the repository | string |
-| `repo` | The name of the repository | string |
-| `title` | The title of the pull request | string | null |
-
-## `github_pull_requests_list`
-
-List pull requests in a repository with optional filtering by state, head, and base branches.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `base` | Filter by base branch name | string | null |
-| `direction` | Sort order | string | null |
-| `head` | Filter by head branch (format: user:ref-name) | string | null |
-| `owner` | The account owner of the repository | string |
-| `page` | Page number of results to fetch | number | null |
-| `per_page` | Number of results per page (max 100) | number | null |
-| `repo` | The name of the repository | string |
-| `sort` | Property to sort pull requests by | string | null |
-| `state` | Filter by pull request state | string | null |
-
-## `github_repo_get`
-
-Get detailed information about a GitHub repository including metadata, settings, and statistics.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `owner` | The account owner of the repository (case-insensitive) | string |
-| `repo` | The name of the repository without the .git extension (case-insensitive) | string |
-
-## `github_user_repos_list`
-
-List repositories for the authenticated user. Requires authentication.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `direction` | Sort order | string | null |
-| `page` | Page number of results to fetch | number | null |
-| `per_page` | Number of results per page (max 100) | number | null |
-| `sort` | Property to sort repositories by | string | null |
-| `type` | Filter repositories by type | string | null |
diff --git a/plugins/agentkit/references/agent-connectors/gmail.md b/plugins/agentkit/references/agent-connectors/gmail.md
deleted file mode 100644
index d668c75..0000000
--- a/plugins/agentkit/references/agent-connectors/gmail.md
+++ /dev/null
@@ -1,79 +0,0 @@
-Gmail is Google's cloud based email service that allows you to access your messages from any computer or device with just a web browser.
-
-Supports authentication: OAuth 2.0
-
-## Tool list
-
-## `gmail_fetch_mails`
-
-Fetch emails from a connected Gmail account using search filters. Requires a valid Gmail OAuth2 connection.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `format` | Format of the returned message. | string | null |
-| `include_spam_trash` | Whether to fetch emails from spam and trash folders | boolean | null |
-| `label_ids` | Gmail label IDs to filter messages | `array` | null |
-| `max_results` | Maximum number of emails to fetch | integer | null |
-| `page_token` | Page token for pagination | string | null |
-| `query` | Search query string using Gmail's search syntax (e.g., 'is:unread from:user@example.com') | string | null |
-| `schema_version` | Optional schema version to use for tool execution | string | null |
-| `tool_version` | Optional tool version to use for execution | string | null |
-
-## `gmail_get_attachment_by_id`
-
-Retrieve a specific attachment from a Gmail message using the message ID and attachment ID.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `attachment_id` | Unique Gmail attachment ID | string |
-| `file_name` | Preferred filename to use when saving/returning the attachment | string | null |
-| `message_id` | Unique Gmail message ID that contains the attachment | string |
-| `schema_version` | Optional schema version to use for tool execution | string | null |
-| `tool_version` | Optional tool version to use for execution | string | null |
-
-## `gmail_get_contacts`
-
-Fetch a list of contacts from the connected Gmail account. Supports pagination and field filtering.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `max_results` | Maximum number of contacts to fetch | integer | null |
-| `page_token` | Token to retrieve the next page of results | string | null |
-| `person_fields` | Fields to include for each person | `array` | null |
-| `schema_version` | Optional schema version to use for tool execution | string | null |
-| `tool_version` | Optional tool version to use for execution | string | null |
-
-## `gmail_get_message_by_id`
-
-Retrieve a specific Gmail message using its message ID. Optionally control the format of the returned data.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `format` | Format of the returned message. | string | null |
-| `message_id` | Unique Gmail message ID | string |
-| `schema_version` | Optional schema version to use for tool execution | string | null |
-| `tool_version` | Optional tool version to use for execution | string | null |
-
-## `gmail_list_drafts`
-
-List draft emails from a connected Gmail account. Requires a valid Gmail OAuth2 connection.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `max_results` | Maximum number of drafts to fetch | integer | null |
-| `page_token` | Page token for pagination | string | null |
-| `schema_version` | Optional schema version to use for tool execution | string | null |
-| `tool_version` | Optional tool version to use for execution | string | null |
-
-## `gmail_search_people`
-
-Search people or contacts in the connected Google account using a query. Requires a valid Google OAuth2 connection with People API scopes.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `other_contacts` | Whether to include people not in the user's contacts (from 'Other Contacts'). | boolean | null |
-| `page_size` | Maximum number of people to return. | integer | null |
-| `person_fields` | Fields to retrieve for each person. | `array` | null |
-| `query` | Text query to search people (e.g., name, email address). | string |
-| `schema_version` | Optional schema version to use for tool execution | string | null |
-| `tool_version` | Optional tool version to use for execution | string | null |
diff --git a/plugins/agentkit/references/agent-connectors/gong.md b/plugins/agentkit/references/agent-connectors/gong.md
deleted file mode 100644
index 26a36e3..0000000
--- a/plugins/agentkit/references/agent-connectors/gong.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect with Gong to sync calls, transcripts, insights, coaching and CRM activity
-
-Supports authentication: OAuth 2.0 , Api Key
diff --git a/plugins/agentkit/references/agent-connectors/google_ads.md b/plugins/agentkit/references/agent-connectors/google_ads.md
deleted file mode 100644
index 9718639..0000000
--- a/plugins/agentkit/references/agent-connectors/google_ads.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Google Ads to manage advertising campaigns, analyze performance metrics, and optimize ad spending across Google's advertising platform
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/google_docs.md b/plugins/agentkit/references/agent-connectors/google_docs.md
deleted file mode 100644
index e790d5d..0000000
--- a/plugins/agentkit/references/agent-connectors/google_docs.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Google Docs. Create, edit, and collaborate on documents
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/google_drive.md b/plugins/agentkit/references/agent-connectors/google_drive.md
deleted file mode 100644
index ef6120e..0000000
--- a/plugins/agentkit/references/agent-connectors/google_drive.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Google Drive. Manage files, folders, and sharing permissions
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/google_forms.md b/plugins/agentkit/references/agent-connectors/google_forms.md
deleted file mode 100644
index fde9e1d..0000000
--- a/plugins/agentkit/references/agent-connectors/google_forms.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Google Forms. Create, view, and manage forms and responses securely
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/google_meets.md b/plugins/agentkit/references/agent-connectors/google_meets.md
deleted file mode 100644
index 814ff7b..0000000
--- a/plugins/agentkit/references/agent-connectors/google_meets.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Google Meet. Create and manage video meetings with powerful collaboration features
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/google_sheets.md b/plugins/agentkit/references/agent-connectors/google_sheets.md
deleted file mode 100644
index 8df9a54..0000000
--- a/plugins/agentkit/references/agent-connectors/google_sheets.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Google Sheets. Create, edit, and analyze spreadsheets with powerful data management capabilities
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/google_slides.md b/plugins/agentkit/references/agent-connectors/google_slides.md
deleted file mode 100644
index 242ef37..0000000
--- a/plugins/agentkit/references/agent-connectors/google_slides.md
+++ /dev/null
@@ -1,32 +0,0 @@
-Connect to Google Slides to create, read, and modify presentations programmatically.
-
-Supports authentication: OAuth 2.0
-
-## Table of Contents
-
-- [Tool list](#tool-list)
-
----
-
-## Tool list
-
-## `googleslides_create_presentation`
-
-Create a new Google Slides presentation with an optional title.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `schema_version` | Optional schema version to use for tool execution | string | null |
-| `title` | Title of the new presentation | string | null |
-| `tool_version` | Optional tool version to use for execution | string | null |
-
-## `googleslides_read_presentation`
-
-Read the complete structure and content of a Google Slides presentation including slides, text, images, shapes, and metadata.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `fields` | Fields to include in the response | string | null |
-| `presentation_id` | The ID of the Google Slides presentation to read | string |
-| `schema_version` | Optional schema version to use for tool execution | string | null |
-| `tool_version` | Optional tool version to use for execution | string | null |
diff --git a/plugins/agentkit/references/agent-connectors/googlecalendar.md b/plugins/agentkit/references/agent-connectors/googlecalendar.md
deleted file mode 100644
index 8168441..0000000
--- a/plugins/agentkit/references/agent-connectors/googlecalendar.md
+++ /dev/null
@@ -1,128 +0,0 @@
-Google Calendar is Google's cloud-based calendar service that allows you to manage your events, appointments, and schedules from any computer or device with just a web browser.
-
-Supports authentication: OAuth 2.0
-
-## Table of Contents
-
-- [Tool list](#tool-list)
-
----
-
-## Tool list
-
-## `googlecalendar_create_event`
-
-Create a new event in a connected Google Calendar account. Supports meeting links, recurrence, attendees, and more.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `attendees_emails` | Attendee email addresses | `array` | null |
-| `calendar_id` | Calendar ID to create the event in | string | null |
-| `create_meeting_room` | Generate a Google Meet link for this event | boolean | null |
-| `description` | Optional event description | string | null |
-| `event_duration_hour` | Duration of event in hours | integer | null |
-| `event_duration_minutes` | Duration of event in minutes | integer | null |
-| `event_type` | Event type for display purposes | string | null |
-| `guests_can_invite_others` | Allow guests to invite others | boolean | null |
-| `guests_can_modify` | Allow guests to modify the event | boolean | null |
-| `guests_can_see_other_guests` | Allow guests to see each other | boolean | null |
-| `location` | Location of the event | string | null |
-| `recurrence` | Recurrence rules (iCalendar RRULE format) | `array` | null |
-| `schema_version` | Optional schema version to use for tool execution | string | null |
-| `send_updates` | Send update notifications to attendees | boolean | null |
-| `start_datetime` | Event start time in RFC3339 format | string |
-| `summary` | Event title/summary | string |
-| `timezone` | Timezone for the event (IANA time zone identifier) | string | null |
-| `tool_version` | Optional tool version to use for execution | string | null |
-| `transparency` | Calendar transparency (free/busy) | string | null |
-| `visibility` | Visibility of the event | string | null |
-
-## `googlecalendar_delete_event`
-
-Delete an event from a connected Google Calendar account. Requires the calendar ID and event ID.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `calendar_id` | The ID of the calendar from which the event should be deleted | string | null |
-| `event_id` | The ID of the calendar event to delete | string |
-| `schema_version` | Optional schema version to use for tool execution | string | null |
-| `tool_version` | Optional tool version to use for execution | string | null |
-
-## `googlecalendar_get_event_by_id`
-
-Retrieve a specific calendar event by its ID using optional filtering and list parameters.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `calendar_id` | The calendar ID to search in | string | null |
-| `event_id` | The unique identifier of the calendar event to fetch | string |
-| `event_types` | Filter by Google event types | `array` | null |
-| `query` | Free text search query | string | null |
-| `schema_version` | Optional schema version to use for tool execution | string | null |
-| `show_deleted` | Include deleted events in results | boolean | null |
-| `single_events` | Expand recurring events into instances | boolean | null |
-| `time_max` | Upper bound for event start time (RFC3339) | string | null |
-| `time_min` | Lower bound for event start time (RFC3339) | string | null |
-| `tool_version` | Optional tool version to use for execution | string | null |
-| `updated_min` | Filter events updated after this time (RFC3339) | string | null |
-
-## `googlecalendar_list_calendars`
-
-List all accessible Google Calendar calendars for the authenticated user. Supports filters and pagination.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `max_results` | Maximum number of calendars to fetch | integer | null |
-| `min_access_role` | Minimum access role to include in results | string | null |
-| `page_token` | Token to retrieve the next page of results | string | null |
-| `schema_version` | Optional schema version to use for tool execution | string | null |
-| `show_deleted` | Include deleted calendars in the list | boolean | null |
-| `show_hidden` | Include calendars that are hidden from the calendar list | boolean | null |
-| `sync_token` | Token to get updates since the last sync | string | null |
-| `tool_version` | Optional tool version to use for execution | string | null |
-
-## `googlecalendar_list_events`
-
-List events from a connected Google Calendar account with filtering options. Requires a valid Google Calendar OAuth2 connection.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `calendar_id` | Calendar ID to list events from | string | null |
-| `max_results` | Maximum number of events to fetch | integer | null |
-| `order_by` | Order of events in the result | string | null |
-| `page_token` | Page token for pagination | string | null |
-| `query` | Free text search query | string | null |
-| `schema_version` | Optional schema version to use for tool execution | string | null |
-| `single_events` | Expand recurring events into single events | boolean | null |
-| `time_max` | Upper bound for event start time (RFC3339 timestamp) | string | null |
-| `time_min` | Lower bound for event start time (RFC3339 timestamp) | string | null |
-| `tool_version` | Optional tool version to use for execution | string | null |
-
-## `googlecalendar_update_event`
-
-Update an existing event in a connected Google Calendar account. Only provided fields will be updated. Supports updating time, attendees, location, meeting links, and more.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `attendees_emails` | Attendee email addresses | `array` | null |
-| `calendar_id` | Calendar ID containing the event | string |
-| `create_meeting_room` | Generate a Google Meet link for this event | boolean | null |
-| `description` | Optional event description | string | null |
-| `end_datetime` | Event end time in RFC3339 format | string | null |
-| `event_duration_hour` | Duration of event in hours | integer | null |
-| `event_duration_minutes` | Duration of event in minutes | integer | null |
-| `event_id` | The ID of the calendar event to update | string |
-| `event_type` | Event type for display purposes | string | null |
-| `guests_can_invite_others` | Allow guests to invite others | boolean | null |
-| `guests_can_modify` | Allow guests to modify the event | boolean | null |
-| `guests_can_see_other_guests` | Allow guests to see each other | boolean | null |
-| `location` | Location of the event | string | null |
-| `recurrence` | Recurrence rules (iCalendar RRULE format) | `array` | null |
-| `schema_version` | Optional schema version to use for tool execution | string | null |
-| `send_updates` | Send update notifications to attendees | boolean | null |
-| `start_datetime` | Event start time in RFC3339 format | string | null |
-| `summary` | Event title/summary | string | null |
-| `timezone` | Timezone for the event (IANA time zone identifier) | string | null |
-| `tool_version` | Optional tool version to use for execution | string | null |
-| `transparency` | Calendar transparency (free/busy) | string | null |
-| `visibility` | Visibility of the event | string | null |
diff --git a/plugins/agentkit/references/agent-connectors/hubspot.md b/plugins/agentkit/references/agent-connectors/hubspot.md
deleted file mode 100644
index ac44f2c..0000000
--- a/plugins/agentkit/references/agent-connectors/hubspot.md
+++ /dev/null
@@ -1,143 +0,0 @@
-Connect to HubSpot CRM. Manage contacts, deals, companies, and marketing automation
-
-Supports authentication: OAuth 2.0
-
-## Table of Contents
-
-- [Tool list](#tool-list)
-
----
-
-## Tool list
-
-## `hubspot_companies_search`
-
-Search HubSpot companies using full-text search and pagination. Returns matching companies with specified properties.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `after` | Pagination offset to get results starting from a specific position | string | null |
-| `filterGroups` | JSON string containing filter groups for advanced filtering | string | null |
-| `limit` | Number of results to return per page (max 100) | number | null |
-| `properties` | Comma-separated list of properties to include in the response | string | null |
-| `query` | Search term for full-text search across company properties | string | null |
-
-## `hubspot_company_create`
-
-Create a new company in HubSpot CRM. Requires a company name as the unique identifier. Supports additional properties like domain, industry, phone, location, and revenue information.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `annualrevenue` | Annual revenue of the company | number | null |
-| `city` | Company city location | string | null |
-| `country` | Company country location | string | null |
-| `description` | Company description or overview | string | null |
-| `domain` | Company website domain | string | null |
-| `industry` | Industry type of the company | string | null |
-| `name` | Company name (required, serves as primary identifier) | string |
-| `numberofemployees` | Number of employees at the company | number | null |
-| `phone` | Company phone number | string | null |
-| `state` | Company state or region | string | null |
-
-## `hubspot_company_get`
-
-Retrieve details of a specific company from HubSpot by company ID. Returns company properties and associated data.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `company_id` | ID of the company to retrieve | string |
-| `properties` | Comma-separated list of properties to include in the response | string | null |
-
-## `hubspot_contact_create`
-
-Create a new contact in HubSpot CRM. Requires an email address as the unique identifier. Supports additional properties like name, company, phone, and lifecycle stage.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `company` | Company name where the contact works | string | null |
-| `email` | Primary email address for the contact (required, serves as unique identifier) | string |
-| `firstname` | First name of the contact | string | null |
-| `hs_lead_status` | Lead status of the contact | string | null |
-| `jobtitle` | Job title of the contact | string | null |
-| `lastname` | Last name of the contact | string | null |
-| `lifecyclestage` | Lifecycle stage of the contact | string | null |
-| `phone` | Phone number of the contact | string | null |
-| `website` | Personal or company website URL | string | null |
-
-## `hubspot_contact_get`
-
-Retrieve details of a specific contact from HubSpot by contact ID. Returns contact properties and associated data.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `contact_id` | ID of the contact to retrieve | string |
-| `properties` | Comma-separated list of properties to include in the response | string | null |
-
-## `hubspot_contact_update`
-
-Update an existing contact in HubSpot CRM by contact ID. Allows updating contact properties like name, email, company, phone, and lifecycle stage.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `contact_id` | ID of the contact to update | string |
-| `props` | Object containing properties like first name, last name, email, company, phone, and job title to update all these should be provided inside props as a JSON object, this is required | `object` | null |
-
-## `hubspot_contacts_list`
-
-Retrieve a list of contacts from HubSpot with filtering and pagination. Returns contact properties and supports pagination through cursor-based navigation.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `after` | Pagination cursor to get the next set of results | string | null |
-| `archived` | Whether to include archived contacts in the results | boolean | null |
-| `limit` | Number of results to return per page (max 100) | number | null |
-| `properties` | Comma-separated list of properties to include in the response | string | null |
-
-## `hubspot_contacts_search`
-
-Search HubSpot contacts using full-text search and pagination. Returns matching contacts with specified properties.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `after` | Pagination offset to get results starting from a specific position | string | null |
-| `filterGroups` | JSON string containing filter groups for advanced filtering | string | null |
-| `limit` | Number of results to return per page (max 100) | number | null |
-| `properties` | Comma-separated list of properties to include in the response | string | null |
-| `query` | Search term for full-text search across contact properties | string | null |
-
-## `hubspot_deal_create`
-
-Create a new deal in HubSpot CRM. Requires dealname, amount, and dealstage. Supports additional properties like pipeline, close date, and deal type.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `amount` | Deal amount/value (required) | number |
-| `closedate` | Expected close date (YYYY-MM-DD format) | string | null |
-| `dealname` | Name of the deal (required) | string |
-| `dealstage` | Current stage of the deal (required) | string |
-| `dealtype` | Type of deal | string | null |
-| `description` | Deal description | string | null |
-| `hs_priority` | Deal priority (HIGH, MEDIUM, LOW) | string | null |
-| `pipeline` | Deal pipeline | string | null |
-
-## `hubspot_deal_update`
-
-Update an existing deal in HubSpot CRM by deal ID. Allows updating deal properties like name, amount, stage, pipeline, close date, and priority.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `deal_id` | ID of the deal to update | string |
-| `good_deal` | Boolean flag indicating if this is a good deal | boolean | null |
-| `properties` | Object containing deal properties to update | `object` |
-
-## `hubspot_deals_search`
-
-Search HubSpot deals using full-text search and pagination. Returns matching deals with specified properties.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `after` | Pagination offset to get results starting from a specific position | string | null |
-| `filterGroups` | JSON string containing filter groups for advanced filtering | string | null |
-| `limit` | Number of results to return per page (max 100) | number | null |
-| `properties` | Comma-separated list of properties to include in the response | string | null |
-| `query` | Search term for full-text search across deal properties | string | null |
diff --git a/plugins/agentkit/references/agent-connectors/intercom.md b/plugins/agentkit/references/agent-connectors/intercom.md
deleted file mode 100644
index 77ef5d8..0000000
--- a/plugins/agentkit/references/agent-connectors/intercom.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Intercom. Send messages, manage conversations, and interact with users and contacts.
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/jira.md b/plugins/agentkit/references/agent-connectors/jira.md
deleted file mode 100644
index 1675086..0000000
--- a/plugins/agentkit/references/agent-connectors/jira.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Jira. Manage issues, projects, workflows, and agile development processes
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/linear.md b/plugins/agentkit/references/agent-connectors/linear.md
deleted file mode 100644
index 9b0f877..0000000
--- a/plugins/agentkit/references/agent-connectors/linear.md
+++ /dev/null
@@ -1,58 +0,0 @@
-Connect to Linear. Manage issues, projects, sprints, and development workflows
-
-Supports authentication: OAuth 2.0
-
-## Tool list
-
-## `linear_graphql_query`
-
-Execute a custom GraphQL query or mutation against the Linear API. Allows running any valid GraphQL operation with variables support for advanced use cases.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `query` | The GraphQL query or mutation to execute | string |
-| `variables` | Variables to pass to the GraphQL query | `object` | null |
-
-## `linear_issue_create`
-
-Create a new issue in Linear using the issueCreate mutation. Requires a team ID and title at minimum.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `assigneeId` | ID of the user to assign the issue to | string | null |
-| `description` | Description of the issue | string | null |
-| `estimate` | Story point estimate for the issue | string | null |
-| `labelIds` | Array of label IDs to apply to the issue | `array` | null |
-| `priority` | Priority level of the issue (1-4, where 1 is urgent) | string | null |
-| `projectId` | ID of the project to associate the issue with | string | null |
-| `stateId` | ID of the workflow state to set | string | null |
-| `teamId` | ID of the team to create the issue in | string |
-| `title` | Title of the issue | string |
-
-## `linear_issue_update`
-
-Update an existing issue in Linear. You can update title, description, priority, state, and assignee.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `assigneeId` | ID of the user to assign the issue to | string | null |
-| `description` | New description for the issue | string | null |
-| `issueId` | ID of the issue to update | string |
-| `priority` | Priority level of the issue (1-4, where 1 is urgent) | string | null |
-| `stateId` | ID of the workflow state to set | string | null |
-| `title` | New title for the issue | string | null |
-
-## `linear_issues_list`
-
-List issues in Linear using the issues query with simple filtering and pagination support.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `after` | Cursor for pagination (returns issues after this cursor) | string | null |
-| `assignee` | Filter by assignee email (e.g., 'user@example.com') | string | null |
-| `before` | Cursor for pagination (returns issues before this cursor) | string | null |
-| `first` | Number of issues to return (pagination) | integer | null |
-| `labels` | Filter by label names (array of strings) | `array` | null |
-| `priority` | Filter by priority level (1=Urgent, 2=High, 3=Medium, 4=Low) | string | null |
-| `project` | Filter by project name (e.g., 'Q4 Goals') | string | null |
-| `state` | Filter by state name (e.g., 'In Progress', 'Done') | string | null |
diff --git a/plugins/agentkit/references/agent-connectors/microsoft_excel.md b/plugins/agentkit/references/agent-connectors/microsoft_excel.md
deleted file mode 100644
index 2fa4c19..0000000
--- a/plugins/agentkit/references/agent-connectors/microsoft_excel.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Microsoft Excel. Access, read, and modify spreadsheets stored in OneDrive or SharePoint through Microsoft Graph API.
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/microsoft_teams.md b/plugins/agentkit/references/agent-connectors/microsoft_teams.md
deleted file mode 100644
index 85790a1..0000000
--- a/plugins/agentkit/references/agent-connectors/microsoft_teams.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Microsoft Teams. Manage messages, channels, meetings, and team collaboration
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/microsoft_word.md b/plugins/agentkit/references/agent-connectors/microsoft_word.md
deleted file mode 100644
index 7b2d530..0000000
--- a/plugins/agentkit/references/agent-connectors/microsoft_word.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Microsoft Word. Authenticate with your Microsoft account to create, read, and edit Word documents stored in OneDrive or SharePoint through Microsoft Graph API.
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/monday.md b/plugins/agentkit/references/agent-connectors/monday.md
deleted file mode 100644
index 6cc8ab0..0000000
--- a/plugins/agentkit/references/agent-connectors/monday.md
+++ /dev/null
@@ -1,3 +0,0 @@
-Connect to Monday.com. Manage boards, tasks, workflows, teams, and project collaboration
-
-Supports authentication: OAuth 2.0
diff --git a/plugins/agentkit/references/agent-connectors/notion.md b/plugins/agentkit/references/agent-connectors/notion.md
deleted file mode 100644
index 22b58d5..0000000
--- a/plugins/agentkit/references/agent-connectors/notion.md
+++ /dev/null
@@ -1,189 +0,0 @@
-Connect to Notion workspace. Create, edit pages, manage databases, and collaborate on content
-
-Supports authentication: OAuth 2.0
-
-## Table of Contents
-
-- [Tool list](#tool-list)
-
----
-
-## Tool list
-
-## `notion_comment_create`
-
-Create a comment in Notion. Provide a comment object with rich_text content and either a parent object (with page_id) for a page-level comment or a discussion_id to reply in an existing thread.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `comment` | Comment object containing a rich_text array. Example: `{"rich_text":[{"type":"text","text":{"content":"Hello"}}]}` | `object` |
-| `discussion_id` | Existing discussion thread ID to reply to. | string | null |
-| `notion_version` | Optional override for the Notion-Version header (e.g., 2022-06-28). | string | null |
-| `parent` | Parent object for a new top-level comment. Shape: `{"page_id":""}`. | `object` | null |
-| `schema_version` | Internal override for schema version. | string | null |
-| `tool_version` | Internal override for tool implementation version. | string | null |
-
-## `notion_comment_retrieve`
-
-Retrieve a single Notion comment by its `comment_id`. LLM tip: you typically obtain `comment_id` from the response of creating a comment or by first listing comments for a page/block and selecting the desired item’s `id`.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `comment_id` | The identifier of the comment to retrieve (hyphenated UUID). Obtain it from Create-Comment responses or from a prior List-Comments call. | string |
-| `notion_version` | Optional Notion-Version header override (e.g., 2022-06-28). | string | null |
-| `schema_version` | Internal override for schema version. | string | null |
-| `tool_version` | Internal override for tool implementation version. | string | null |
-
-## `notion_comments_fetch`
-
-Fetch comments for a given Notion block. Provide a `block_id` (the target page/block ID, hyphenated UUID). Supports pagination via `start_cursor` and `page_size` (1–100). LLM tip: extract `block_id` from a Notion URL’s trailing 32-char id, then insert hyphens (8-4-4-4-12).
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `block_id` | Target Notion block (or page) ID to fetch comments for. Use a hyphenated UUID. | string |
-| `notion_version` | Optional Notion-Version header override (e.g., 2022-06-28). | string | null |
-| `page_size` | Maximum number of comments to return (1–100). | integer | null |
-| `schema_version` | Internal override for schema version. | string | null |
-| `start_cursor` | Cursor to fetch the next page of results. | string | null |
-| `tool_version` | Internal override for tool implementation version. | string | null |
-
-## `notion_data_fetch`
-
-Fetch data from Notion using the workspace search API (/search). Supports pagination via start_cursor.
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `page_size` | Max number of results to return (1–100) | integer | null |
-| `query` | Text query used by /search | string | null |
-| `schema_version` | Optional schema version to use for tool execution | string | null |
-| `start_cursor` | Cursor for pagination; pass the previous response's next_cursor | string | null |
-| `tool_version` | Optional tool version to use for execution | string | null |
-
-## `notion_database_create`
-
-Create a new database in Notion under a parent page. Provide a parent object with page_id, a database title (rich_text array), and a properties object that defines the database schema (columns).
-
-| Properties | Description | Type |
-| --- | --- | --- |
-| `notion_version` | Optional override for the Notion-Version header (e.g., 2022-06-28). | string | null |
-| `parent` | Parent object specifying the page under which the database is created. Example: `{"page_id": "2561ab6c-418b-8072-beec-c4779fa811cf"}` | `object` |
-| `properties` | Database schema object defining properties (columns). Example: `{"Name": {"title": {}}, "Status": {"select": {"options": [{"name": "Todo"}, {"name": "Doing"}, {"name": "Done"}]}}}` | `object` |
-| `schema_version` | Internal override for schema version. | string | null |
-| `title` | Database title as a Notion rich_text array. | `array