Secrets management
OpenClaw supports additive SecretRefs so supported credentials do not need to be stored as plaintext in configuration. Plaintext still works. SecretRefs are opt-in per credential.Goals and runtime model
Secrets are resolved into an in-memory runtime snapshot.- Resolution is eager during activation, not lazy on request paths.
- Startup fails fast when an effectively active SecretRef cannot be resolved.
- Reload uses atomic swap: full success, or keep the last-known-good snapshot.
- Runtime requests read from the active in-memory snapshot only.
Active-surface filtering
SecretRefs are validated only on effectively active surfaces.- Enabled surfaces: unresolved refs block startup/reload.
- Inactive surfaces: unresolved refs do not block startup/reload.
- Inactive refs emit non-fatal diagnostics with code
SECRETS_REF_IGNORED_INACTIVE_SURFACE.
- Disabled channel/account entries.
- Top-level channel credentials that no enabled account inherits.
- Disabled tool/feature surfaces.
- Web search provider-specific keys that are not selected by
tools.web.search.provider. In auto mode (provider unset), provider-specific keys are also active for provider auto-detection. gateway.remote.token/gateway.remote.passwordSecretRefs are active (whengateway.remote.enabledis notfalse) if one of these is true:gateway.mode=remotegateway.remote.urlis configuredgateway.tailscale.modeisserveorfunnelIn local mode without those remote surfaces:gateway.remote.tokenis active when token auth can win and no env/auth token is configured.gateway.remote.passwordis active only when password auth can win and no env/auth password is configured.
Gateway auth surface diagnostics
When a SecretRef is configured ongateway.auth.password, gateway.remote.token, or
gateway.remote.password, gateway startup/reload logs the surface state explicitly:
active: the SecretRef is part of the effective auth surface and must resolve.inactive: the SecretRef is ignored for this runtime because another auth surface wins, or because remote auth is disabled/not active.
SECRETS_GATEWAY_AUTH_SURFACE and include the reason used by the
active-surface policy, so you can see why a credential was treated as active or inactive.
Onboarding reference preflight
When onboarding runs in interactive mode and you choose SecretRef storage, OpenClaw runs preflight validation before saving:- Env refs: validates env var name and confirms a non-empty value is visible during onboarding.
- Provider refs (
fileorexec): validates provider selection, resolvesid, and checks resolved value type.
SecretRef contract
Use one object shape everywhere:source: "env"
providermust match^[a-z][a-z0-9_-]{0,63}$idmust match^[A-Z][A-Z0-9_]{0,127}$
source: "file"
providermust match^[a-z][a-z0-9_-]{0,63}$idmust be an absolute JSON pointer (/...)- RFC6901 escaping in segments:
~=>~0,/=>~1
source: "exec"
providermust match^[a-z][a-z0-9_-]{0,63}$idmust match^[A-Za-z0-9][A-Za-z0-9._:/-]{0,255}$
Provider config
Define providers undersecrets.providers:
Env provider
- Optional allowlist via
allowlist. - Missing/empty env values fail resolution.
File provider
- Reads local file from
path. mode: "json"expects JSON object payload and resolvesidas pointer.mode: "singleValue"expects ref id"value"and returns file contents.- Path must pass ownership/permission checks.
- Windows fail-closed note: if ACL verification is unavailable for a path, resolution fails. For trusted paths only, set
allowInsecurePath: trueon that provider to bypass path security checks.
Exec provider
- Runs configured absolute binary path, no shell.
- By default,
commandmust point to a regular file (not a symlink). - Set
allowSymlinkCommand: trueto allow symlink command paths (for example Homebrew shims). OpenClaw validates the resolved target path. - Pair
allowSymlinkCommandwithtrustedDirsfor package-manager paths (for example["/opt/homebrew"]). - Supports timeout, no-output timeout, output byte limits, env allowlist, and trusted dirs.
- Windows fail-closed note: if ACL verification is unavailable for the command path, resolution fails. For trusted paths only, set
allowInsecurePath: trueon that provider to bypass path security checks.
Exec integration examples
1Password CLI
HashiCorp Vault CLI
sops
Supported credential surface
Canonical supported and unsupported credentials are listed in: Runtime-minted or rotating credentials and OAuth refresh material are intentionally excluded from read-only SecretRef resolution.Required behavior and precedence
- Field without a ref: unchanged.
- Field with a ref: required on active surfaces during activation.
- If both plaintext and ref are present, ref takes precedence on supported precedence paths.
SECRETS_REF_OVERRIDES_PLAINTEXT(runtime warning)REF_SHADOWED(audit finding whenauth-profiles.jsoncredentials take precedence overopenclaw.jsonrefs)
serviceAccountReftakes precedence over plaintextserviceAccount.- Plaintext value is ignored when sibling ref is set.
Activation triggers
Secret activation runs on:- Startup (preflight plus final activation)
- Config reload hot-apply path
- Config reload restart-check path
- Manual reload via
secrets.reload
- Success swaps the snapshot atomically.
- Startup failure aborts gateway startup.
- Runtime reload failure keeps the last-known-good snapshot.
Degraded and recovered signals
When reload-time activation fails after a healthy state, OpenClaw enters degraded secrets state. One-shot system event and log codes:SECRETS_RELOADER_DEGRADEDSECRETS_RELOADER_RECOVERED
- Degraded: runtime keeps last-known-good snapshot.
- Recovered: emitted once after the next successful activation.
- Repeated failures while already degraded log warnings but do not spam events.
- Startup fail-fast does not emit degraded events because runtime never became active.
Command-path resolution
Credential-sensitive command paths that opt in (for exampleopenclaw memory remote-memory paths and openclaw qr --remote) can resolve supported SecretRefs via gateway snapshot RPC.
- When gateway is running, those command paths read from the active snapshot.
- If a configured SecretRef is required and gateway is unavailable, command resolution fails fast with actionable diagnostics.
- Snapshot refresh after backend secret rotation is handled by
openclaw secrets reload. - Gateway RPC method used by these command paths:
secrets.resolve.
Audit and configure workflow
Default operator flow:secrets audit
Findings include:
- plaintext values at rest (
openclaw.json,auth-profiles.json,.env) - unresolved refs
- precedence shadowing (
auth-profiles.jsontaking priority overopenclaw.jsonrefs) - legacy residues (
auth.json, OAuth reminders)
secrets configure
Interactive helper that:
- configures
secrets.providersfirst (env/file/exec, add/edit/remove) - lets you select supported secret-bearing fields in
openclaw.jsonplusauth-profiles.jsonfor one agent scope - can create a new
auth-profiles.jsonmapping directly in the target picker - captures SecretRef details (
source,provider,id) - runs preflight resolution
- can apply immediately
openclaw secrets configure --providers-onlyopenclaw secrets configure --skip-provider-setupopenclaw secrets configure --agent <id>
configure apply defaults:
- scrub matching static credentials from
auth-profiles.jsonfor targeted providers - scrub legacy static
api_keyentries fromauth.json - scrub matching known secret lines from
<config-dir>/.env
secrets apply
Apply a saved plan:
One-way safety policy
OpenClaw intentionally does not write rollback backups containing historical plaintext secret values. Safety model:- preflight must succeed before write mode
- runtime activation is validated before commit
- apply updates files using atomic file replacement and best-effort restore on failure
Legacy auth compatibility notes
For static credentials, runtime no longer depends on plaintext legacy auth storage.- Runtime credential source is the resolved in-memory snapshot.
- Legacy static
api_keyentries are scrubbed when discovered. - OAuth-related compatibility behavior remains separate.
Web UI note
Some SecretInput unions are easier to configure in raw editor mode than in form mode.Related docs
- CLI commands: secrets
- Plan contract details: Secrets Apply Plan Contract
- Credential surface: SecretRef Credential Surface
- Auth setup: Authentication
- Security posture: Security
- Environment precedence: Environment Variables