Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
1Password UI tab for OpenClaw dashboard. Manage secrets, credential mappings, and auth state from the Control UI.
1Password UI tab for OpenClaw dashboard. Manage secrets, credential mappings, and auth state from the Control UI.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Adds a 1Password tab to the OpenClaw Control dashboard under the Tools group. Browse vaults, manage credential mappings for skills, and handle authentication โ all from the web UI.
FeatureDescriptionDashboard Tab"1Password" under Tools in sidebarConnection StatusSee signed-in account, CLI/Connect modeSign In FlowAuthenticate directly from the UIDocker SupportWorks with 1Password Connect for containersCredential MappingsMap 1Password items to skill configs
To install this skill, give your agent this prompt: Install the 1password-ui skill from ClawHub. The skill is at: ~/clawd/skills/1password-ui/ Follow INSTALL_INSTRUCTIONS.md step by step. Summary of changes needed: 1. Copy 1password-backend.ts to src/gateway/server-methods/1password.ts 2. Register handlers in server-methods.ts 3. Add "1password" tab to navigation.ts (TAB_GROUPS, Tab type, TAB_PATHS, icon, title, subtitle) 4. Add state variables to app.ts 5. Copy 1password-views.ts to ui/src/ui/views/1password.ts 6. Add view rendering to app-render.ts 7. Add tab loading to app-settings.ts 8. Build and restart: pnpm build && pnpm ui:build && clawdbot gateway restart
1Password CLI (op): # macOS/Linux brew install 1password-cli # Or from https://1password.com/downloads/command-line/ CLI Integration enabled in 1Password app: Settings โ Developer โ "Integrate with 1Password CLI" โ
See Docker Setup below.
Open OpenClaw Dashboard โ Tools โ 1Password Click Sign In with 1Password Authorize in the 1Password app popup (or run op signin in terminal) Status shows "Connected" with your account
Once signed in, you can map 1Password items to skills: Skills like Pipedream can read credentials from 1Password Mappings are stored in ~/clawd/config/1password-mappings.json Format: { "skillId": { "item": "Item Name", "vault": "Private", "fields": {...} } }
# Store Pipedream credentials in 1Password op item create --category="API Credential" --title="Pipedream Connect" \ --vault="Private" \ "client_id[text]=your_client_id" \ "client_secret[password]=your_client_secret" \ "project_id[text]=proj_xxxxx" # Use in token refresh PIPEDREAM_1PASSWORD_ITEM="Pipedream Connect" python3 ~/clawd/scripts/pipedream-token-refresh.py
MethodDescription1password.statusGet CLI/Connect status, signed-in account1password.signinTrigger sign-in flow1password.signoutSign out of current session1password.vaultsList available vaults1password.itemsList items in a vault1password.getItemGet item field structure (not values)1password.readSecretRead a secret (backend only)1password.mappings.listGet skill โ 1Password mappings1password.mappings.setCreate/update a mapping1password.mappings.deleteRemove a mapping1password.mappings.testTest if a mapping works
For Docker-based OpenClaw installations, use 1Password Connect instead of the CLI.
# docker-compose.yml services: op-connect-api: image: 1password/connect-api:latest ports: - "8080:8080" volumes: - ./1password-credentials.json:/home/opuser/.op/1password-credentials.json:ro - op-data:/home/opuser/.op/data op-connect-sync: image: 1password/connect-sync:latest volumes: - ./1password-credentials.json:/home/opuser/.op/1password-credentials.json:ro - op-data:/home/opuser/.op/data volumes: op-data:
Go to my.1password.com โ Integrations โ Secrets Automation Create a Connect server Download 1password-credentials.json Create an access token
services: clawdbot: environment: - OP_CONNECT_HOST=http://op-connect-api:8080 - OP_CONNECT_TOKEN=your-access-token The UI automatically detects Connect mode.
1password-ui/ โโโ SKILL.md # This file โโโ INSTALL_INSTRUCTIONS.md # Step-by-step installation โโโ CHANGELOG.md # Version history โโโ package.json # Skill metadata โโโ reference/ โ โโโ 1password-backend.ts # Gateway RPC handlers โ โโโ 1password-views.ts # UI view (Lit template) โ โโโ 1password-settings.ts # Tab loading logic โ โโโ 1password-plugin.ts # Plugin registration (optional) โโโ scripts/ โโโ op-helper.py # CLI/Connect bridge for skills
AspectImplementationSecrets not in UIgetItem and items return field names only, never valuesNo network installersNo curl | sh or remote scripts โ all code is localManual installationRequires explicit code edits, no automated patchingMapping file perms1password-mappings.json should be 0600 (contains references, not secrets)CLI authUses 1Password app integration for biometric auth when available
RiskMitigationreadSecret RPC availableThe 1password.readSecret method IS exposed via gateway RPC. This is intentional โ skills need to read secrets. Security relies on: (1) 1Password requiring user auth, (2) gateway access control (loopback-only by default).Gateway exposureAll 1password.* methods are RPC calls. If you expose your gateway to the network, protect it with authentication.Connect tokenIn Docker mode, OP_CONNECT_TOKEN grants vault access. Keep it secure like any API key.
# Recommended permissions for mapping file chmod 600 ~/clawd/config/1password-mappings.json
brew install 1password-cli # or download from 1password.com/downloads/command-line/
op signin op whoami # verify
Unlock the 1Password app Enable CLI integration: Settings โ Developer โ "Integrate with 1Password CLI"
docker ps | grep op-connect # check containers running
Verify OP_CONNECT_TOKEN is set correctly Check token hasn't expired
ClawHub: clawhub.ai/skills/1password-ui 1Password CLI: developer.1password.com/docs/cli 1Password Connect: developer.1password.com/docs/connect OpenClaw Discord: discord.com/invite/clawd
Full working implementation with dashboard UI Sign-in flow from web interface CLI and Connect mode support Credential mapping system
Initial release with reference implementations
Long-tail utilities that do not fit the current primary taxonomy cleanly.
Largest current source with strong distribution and engagement signals.