Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Securely access and manage secrets with 1Password CLI using a Service Account token for vault operations like read, write, edit, and delete.
Securely access and manage secrets with 1Password CLI using a Service Account token for vault operations like read, write, edit, and delete.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
This skill allows agents to securely access and manage secrets using the 1Password CLI (op) and a Service Account. It provides commands for reading, writing, and managing items within a dedicated vault.
Install 1Password CLI: macOS: brew install --cask 1password-cli Linux/Windows: See official docs. Create a Service Account: Go to 1Password Developer Portal. Create a Service Account and grant it access to a specific vault (e.g., "Agent Vault"). Copy the Service Account Token. Set Environment Variable: Set OP_SERVICE_ACCOUNT_TOKEN in your environment (e.g., .env file or export in shell). For OpenClaw, you can add OP_SERVICE_ACCOUNT_TOKEN=... to .env.
All commands require the OP_SERVICE_ACCOUNT_TOKEN to be set.
Verify the service account is working: op whoami
List vaults accessible to the service account: op vault list
Get details of an item (JSON format is best for parsing): op item get "Item Name" --vault "Vault Name" --format json Or get a specific field (e.g., password): op read "op://Vault Name/Item Name/password"
Create a login item: op item create --category login --title "My Service" --url "https://example.com" --vault "Vault Name" username="myuser" password="mypassword" Create a secure note: op item create --category "Secure Note" --title "API Key" --vault "Vault Name" notes="my-secret-key"
Update a password: op item edit "Item Name" password="newpassword" --vault "Vault Name"
op item delete "Item Name" --vault "Vault Name"
Always use JSON output: Add --format json to op commands for structured data that is easier to parse. Security: Never print the OP_SERVICE_ACCOUNT_TOKEN or retrieved secrets to the console unless explicitly asked. Vaults: If multiple vaults are available, specify the --vault flag to avoid ambiguity. Rate Limits: Service accounts have rate limits. Cache results if possible or retry with backoff.
"You are not currently signed in": Ensure OP_SERVICE_ACCOUNT_TOKEN is set correctly. "account is not authorized": Check that the service account has permission for the specific vault and operation (read/write).
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.