Caricamento in corso...
Caricamento in corso...
Last synced: Today, 22:00
Technical reference for the OpenClaw framework. Real-time synchronization with the official documentation engine.
Use this file to discover all available pages before exploring further.
openclaw secretsUse
openclaw secretsCommand roles:
reloadsecrets.reloadaudit--allow-execconfigureapply--dry-run--allow-execRecommended operator loop:
bashopenclaw secrets audit --check openclaw secrets configure openclaw secrets apply --from /tmp/openclaw-secrets-plan.json --dry-run openclaw secrets apply --from /tmp/openclaw-secrets-plan.json openclaw secrets audit --check openclaw secrets reload
If your plan includes
exec--allow-execExit code note for CI/gates:
audit --check12Related:
Re-resolve secret refs and atomically swap runtime snapshot.
bashopenclaw secrets reload openclaw secrets reload --json openclaw secrets reload --url ws://127.0.0.1:18789 --token <token>
Notes:
secrets.reloadwarningCountOptions:
--url <url>--token <token>--timeout <ms>--jsonScan OpenClaw state for:
auth-profiles.jsonopenclaw.jsonagents/*/agent/models.jsonapiKeyHeader residue note:
authorizationx-api-keytokensecretpasswordcredentialbashopenclaw secrets audit openclaw secrets audit --check openclaw secrets audit --json openclaw secrets audit --allow-exec
Exit behavior:
--checkReport shape highlights:
statusclean | findings | unresolvedresolutionrefsCheckedskippedExecRefsresolvabilityCompletesummaryplaintextCountunresolvedRefCountshadowedRefCountlegacyResidueCountPLAINTEXT_FOUNDREF_UNRESOLVEDREF_SHADOWEDLEGACY_RESIDUEBuild provider and SecretRef changes interactively, run preflight, and optionally apply:
bashopenclaw secrets configure openclaw secrets configure --plan-out /tmp/openclaw-secrets-plan.json openclaw secrets configure --apply --yes openclaw secrets configure --providers-only openclaw secrets configure --skip-provider-setup openclaw secrets configure --agent ops openclaw secrets configure --json
Flow:
add/edit/removesecrets.providers{source, provider, id}Flags:
--providers-onlysecrets.providers--skip-provider-setup--agent <id>auth-profiles.json--allow-execNotes:
--providers-only--skip-provider-setupconfigureopenclaw.jsonauth-profiles.jsonconfigureauth-profiles.json--allow-execscrubEnvscrubAuthProfilesForProviderTargetsscrubLegacyAuthJson--applyApply this plan now?--apply--yes--jsonExec provider safety note:
/opt/homebrew/bin/*allowSymlinkCommand: truetrustedDirs["/opt/homebrew"]allowInsecurePath: trueApply or preflight a plan generated previously:
bashopenclaw secrets apply --from /tmp/openclaw-secrets-plan.json openclaw secrets apply --from /tmp/openclaw-secrets-plan.json --allow-exec openclaw secrets apply --from /tmp/openclaw-secrets-plan.json --dry-run openclaw secrets apply --from /tmp/openclaw-secrets-plan.json --dry-run --allow-exec openclaw secrets apply --from /tmp/openclaw-secrets-plan.json --json
Exec behavior:
--dry-run--allow-exec--allow-execPlan contract details (allowed target paths, validation rules, and failure semantics):
What
applyopenclaw.jsonauth-profiles.jsonauth.json~/.openclaw/.envsecrets applySafety comes from strict preflight + atomic-ish apply with best-effort in-memory restore on failure.
bashopenclaw secrets audit --check openclaw secrets configure openclaw secrets audit --check
If
audit --check© 2024 TaskFlow Mirror
Powered by TaskFlow Sync Engine