Pipedrive
Quick start
Always invoke through bash {baseDir}/scripts/invoke.sh — never call mcporter directly. The wrapper seeds the OAuth vault from the env-supplied tokens when needed, then calls mcporter.
bash {baseDir}/scripts/invoke.sh list maverick-pipedrive --schema
For structured output (also surfaces transport errors as JSON envelopes — workaround for mcporter #153):
bash {baseDir}/scripts/invoke.sh call --output json maverick-pipedrive.TOOL_NAME key=value | jq '.result.content'
Safety
Write operations that create records, update properties, change deal stages, mark activities done, create notes, or delete data modify Pipedrive CRM state visible to the connected account. Confirm clear user intent before invoking write tools — search and read tools are safe to call freely while exploring. Search deals, people, organizations, and activities before assuming IDs, and read current deal stage, owner, value, and activity history before updating.
Authentication
Tokens are provisioned and rotated automatically. If a call returns HTTP 401 that doesn't recover within a few seconds, the OAuth grant has been revoked — re-authorize the integration to refresh credentials.
Data flow
Tool calls travel to Pipedrive's hosted MCP service at https://mcp.pipedrive.com/mcp over HTTPS, authenticated via OAuth. Pipedrive sees the deal, person, organization, activity, pipeline, and sales-workflow data referenced by each call. Use this skill for Pipedrive-related work only; do not pass unrelated sensitive content through these tools.
Dependencies
mcporter(github.com/steipete/mcporter) — MCP CLI used to invoke Pipedrive's hosted MCP server. Auto-installed vianpm install -g --ignore-scripts mcporterif missing on PATH (seeinstallspec in frontmatter). The install spec uses unpinnedmcporter(npmlatest); operators with strict supply-chain controls should override the install to pin a specific version (e.g.mcporter@<version>).jq(stedolan.github.io/jq) — JSON processor used by the vault initializer. System dependency; install via your OS package manager (apt install jq,brew install jq, etc.).flock(part of util-linux) — file locking used to serialize concurrent vault writes. Available by default on Linux; on macOS install viabrew install flock.shasum(Perl, ships withDigest::SHA) — computes the SHA-256 hashes used to derive the mcporter vault key and the provisioned-token marker. Preinstalled on macOS and on Debian/Ubuntu (incl. the deployedcloudflare/sandboxUbuntu 22.04 image); on minimal Linux images installperl-Digest-SHA. The script invokesshasum -a 256rather than GNUsha256sumso it runs on stock macOS withoutcoreutils.