secret-manager

Review·Scanned 2/18/2026

This skill manages API keys with GNOME Keyring, updates auth-profiles.json, sources SECRETS_ENV_FILE, imports secrets into the systemd user environment, and restarts the OpenClaw Gateway. It reads/writes secrets via secret-tool and executes system commands (systemctl, distrobox enter) that modify local configs and user services.

from clawhub.ai·vcfa8b35·7.6 KB·0 installs
Scanned from 1.0.0 at cfa8b35 · Transparency log ↗
$ vett add clawhub.ai/jswortz/secret-managerReview findings below

Secret Manager

A secure way to manage API keys for OpenClaw using the system keyring (GNOME Keyring / libsecret).

This skill provides a secret-manager CLI that:

  1. Stores API keys securely using secret-tool.
  2. Injects them into your auth-profiles.json.
  3. Propagates them to systemd user environment.
  4. Restarts the OpenClaw Gateway service inside your Distrobox container.

Installation

Ensure you have the dependencies:

  • Debian/Ubuntu: sudo apt install libsecret-tools
  • Fedora: sudo dnf install libsecret
  • Arch: sudo pacman -S libsecret

Copy the script to your path or run it directly.

Configuration

The script uses default paths that work for most OpenClaw installations, but you can override them with environment variables:

VariableDescriptionDefault
OPENCLAW_CONTAINERName of the Distrobox containerclawdbot
OPENCLAW_HOMEPath to OpenClaw config directory~/.openclaw
SECRETS_ENV_FILEPath to an optional .env file to source~/.config/openclaw/secrets.env

Usage

List all configured keys:

secret-manager list

Set a key (interactive prompt):

secret-manager OPENAI_API_KEY
# (Paste key when prompted)

Set a key (direct):

secret-manager DISCORD_BOT_TOKEN "my-token-value"

Supported Keys:

  • OPENAI_API_KEY
  • GEMINI_API_KEY
  • DISCORD_BOT_TOKEN
  • GATEWAY_AUTH_TOKEN
  • OLLAMA_API_KEY
  • GIPHY_API_KEY
  • GOOGLE_PLACES_API_KEY
  • LINKEDIN_LI_AT
  • LINKEDIN_JSESSIONID