WorkOS

v1.0.0

Connect OpenClaw and other AI agents to WorkOS — a self-hosted workspace platform with documents, databases, tasks, meeting transcription, and sharing. Expos...

0· 22·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for zecurecode/workosmcp.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "WorkOS" (zecurecode/workosmcp) from ClawHub.
Skill page: https://clawhub.ai/zecurecode/workosmcp
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Canonical install target

openclaw skills install zecurecode/workosmcp

ClawHub CLI

Package manager switcher

npx clawhub@latest install workosmcp
Security Scan
Capability signals
Requires OAuth tokenRequires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the instructions: this is a connector that teaches MCP-capable agents how to interact with a WorkOS server. The SKILL.md lists the MCP URL, OAuth flow, and the ~60 tools the server exposes — all expected for this type of skill. No unrelated credentials, binaries, or installs are requested.
Instruction Scope
Instructions focus on connecting via OAuth/PKCE and calling JSON-RPC tools over Streamable HTTP. It includes examples of editing client config files (e.g., ~/.config/openclaw/config.json, app-specific config paths) to add the MCP server — this is reasonable for a connector but means the agent (or a human following its directions) may write to local client configuration files. The skill does not instruct the agent to read or exfiltrate unrelated files or secrets, and it explicitly recommends conservative write behavior and user confirmation for destructive actions.
Install Mechanism
Instruction-only skill with no install spec and no code files to execute — minimal disk/write risk. Nothing is downloaded or extracted.
Credentials
The skill declares no required environment variables, no primary credential, and no config paths beyond documenting where client configs live. It relies on the standard OAuth browser flow (tokens stored in the client), which is proportionate to the described functionality. No broad or unrelated secrets are requested.
Persistence & Privilege
always is false and model invocation is allowed (default). The skill does not request permanent system-level presence or elevated privileges. It documents how to add the remote MCP server to client config files (normal for connector skills) but does not instruct modifying other skills' configurations or altering system-wide settings beyond adding a server entry.
Assessment
This skill is an instruction-only connector for the WorkOS MCP at https://workos.no/api/mcp and appears internally consistent. Before installing or using it, verify the MCP URL is correct and that you trust workos.no; the connector requires an OAuth browser flow that will grant 'read' and optionally 'write' scopes — be cautious about granting write access. The docs show adding the MCP server to local client config files (you or the client will store tokens in the client's secure store); confirm you are comfortable with that and that destructive operations (delete/archive) require explicit confirmation. If you need higher assurance, ask for the server's published metadata (/.well-known endpoints) and verify the domain and TLS certificate out-of-band.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

🧠 Clawdis
latestvk97fdne71dm9zf2jqt744vvgp585eqwg
22downloads
0stars
1versions
Updated 4h ago
v1.0.0
MIT-0

WorkOS

WorkOS is a self-hosted, AI-integrated workspace platform (a Notion alternative) that exposes its full data model through a remote MCP server. Use this skill whenever the user talks about their documents, pages, wiki, databases, tasks, meetings, transcripts, or wants the agent to create, update, or search their content on workos.no.

When to use WorkOS

Reach for this skill when the user:

  • Refers to "my wiki", "my workspace", "my page", "my database", "my tasks", "my meetings", "my notes".
  • Says things like "create a new page about …", "add a task", "update the status field on row X", "find the document about …".
  • Wants to search or fetch existing content on workos.no.
  • Asks about transcripts, summaries, or attendees from meetings.
  • Wants to share a page externally or manage access.

If the user has not yet connected the WorkOS MCP server, set up the connection first (see docs/connect.md).

Connection — once per agent

The WorkOS MCP server lives at:

https://workos.no/api/mcp
  • Transport: Streamable HTTP (JSON-RPC 2.0). Not SSE.
  • Auth: OAuth 2.1 with PKCE — fully automatic via client discovery.
  • Scopes: read, write.

OpenClaw and other MCP clients are configured with the URL above and let the OAuth flow happen in the system browser. Per-client setup is in docs/connect.md. Important: older Cline versions must set "type": "streamableHttp" — the server does not support SSE.

What the agent can do

After connecting, the server exposes ~60 tools grouped as follows:

AreaExample toolsUse for
Accountget_me, list_workspaces, get_workspaceIdentity and workspace context
Pagescreate_page, get_page, update_page, archive_page, restore_page, delete_page, move_page, search_pages, list_pagesDocuments, wiki, notes
Page blocksappend_blocks, insert_blocks_after, update_block, delete_blocksGranular editing
Page groupscreate_page_group, update_page_group, delete_page_group, reorder_page_groups, list_page_groupsSidebar organization
Databaseslist_databases, create_database, get_database, update_database, delete_databaseStructured data
Propertiesadd_db_property, update_db_property, remove_db_property, reorder_db_propertiesSchema
Rowslist_db_rows, create_db_row, update_db_cell, delete_db_row, move_db_rowContent
Viewslist_db_views, create_db_view, update_db_view, delete_db_viewTable / board / list
Meetingscreate_meeting, append_transcript, generate_meeting_summary, list_meeting_templatesTranscription + AI summary
Commentscreate_comment, update_comment, resolve_comment, list_comments, delete_commentDiscussion
Sharingcreate_share_link, list_share_links, revoke_share_linkExternal links
Filesupload_imageImage uploads

The full catalog is in docs/tools.md. Always call tools/list after initialize to get the authoritative, current set.

Workflow patterns

Common flows (full examples in docs/workflows.md):

  1. Search → fetch → show: search_pagesget_page → present content.
  2. Create page with structure: create_page (with the right workspaceId and pageGroupId) → append_blocks for content.
  3. Database update: list_databaseslist_db_rows (filtered) → update_db_cell per row.
  4. Meeting flow: create_meetingappend_transcript (in chunks) → generate_meeting_summary.
  5. Safe edits: fetch existing content before overwriting, and confirm destructive operations (delete, archive) with the user.

Rules and expectations

  • Workspace context first. If the user has not specified a workspace, call list_workspaces and ask which one is active before writing data.
  • Never guess IDs. Always fetch them from a list/search call.
  • Write conservatively. Prefer update_* over delete-and-recreate. Confirm deletes/archives before running them.
  • Mirror the user's language. WorkOS users are often Norwegian; mirror whatever language the user is writing in for new pages and comments.
  • Respect roles. read scope only allows fetching. If a write tool returns 403, tell the user they lack write access in the workspace.

Troubleshooting

SymptomCauseFix
401 from /api/mcpToken expired or missingThe client should refresh automatically; otherwise remove the server and re-add it
405 on GETClient is trying SSEUse Streamable HTTP — set type: streamableHttp (Cline) or upgrade the client
Empty workspace listUser is not a member of any workspaceHave the user create or join a workspace at workos.no first
403 on write toolsMissing write scopeRe-run the OAuth flow with read write

More in docs/connect.md under "Troubleshooting".

Links

Comments

Loading comments...