Run your meetings
from your AI assistant.
Yesterday: Shipped KOL-412 (search rate-limit), reviewed 3 PRs.
Today: Pair on KOL-418 webhook retries with Sarah, draft RFC.
Blockers: Waiting on staging access for KOL-425.
Three prompts your team will run every sprint.
Draft today's standup from yesterday's PRs and tickets.
Every morning, hand the assistant your context. It reads your activity, formats answers, and submits them so you walk into the day with the standup already done.
“Look at my GitHub PRs and Jira tickets from yesterday and draft my standup.”
Result. Standup submitted before standup. Three questions answered with linked PRs and ticket keys, ready for the team to read async.
From zero to first tool call in five minutes.
Add the MCP server
Drop the Kollabe MCP server URL into your AI client's settings (Claude Desktop, Cursor, Zed, ChatGPT, or your own script). Point it at kollabe.com/api/mcp.
Approve via OAuth
Sign in with your Kollabe account and approve the connection. The client issues tokens automatically and they last one year. No manual key wrangling or shared secrets.
Pick your organization
Choose which org the assistant should act in. Tokens are scoped to that single org and act on your behalf. Revoke anytime from Organization Settings → API Tokens.
Connect via MCP
Works with any MCP-compatible client (Claude, Cursor, Zed, ChatGPT, or your own scripts). OAuth handshake on first connect.
Build skills and scripts on top of the same API.
Drop a Kollabe Skill into your repo.
A Claude Skill is a tiny folder with a SKILL.md and a few helper scripts. Wire it to a Kollabe personal access token and Claude can run your team's exact rituals: your standup format, your retro columns, your action-item workflow.
One curl away from your sprint data.
Personal access tokens act as you. Bearer auth, JSON in/out, predictable shapes. Pick a permission level and an expiry, paste the token into your script, ship.
# .claude/skills/kollabe-standup/submit.shcurl -sS https://kollabe.com/api/v1/standups/today/answers \ -H "Authorization: Bearer $KOL_TOKEN" \ -H "Content-Type: application/json" \ -d "@./payload.json"Scoped tokens
Every token belongs to one organization and acts as one user. No cross-org leakage or service accounts to babysit.
OAuth handshake
MCP clients connect via OAuth. No copy-pasting keys or .env files for end users. Tokens last one year and rotate cleanly.
Permission levels
Choose read-only, write, or admin per token. The assistant gets exactly the scope you give it. Nothing more.
Revoke anytime
Disconnect a client with one click from Organization Settings → API Tokens. Revoke the token and every active session dies instantly.