Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Zero-knowledge secrets management via PassBox — store, retrieve, rotate, and inject credentials securely.
Zero-knowledge secrets management via PassBox — store, retrieve, rotate, and inject credentials securely.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Zero-knowledge secrets management. Store API keys, tokens, and credentials with client-side encryption. The server never sees plaintext values.
Store a secret: Use passbox_set_secret with vault "my-project", key "API_KEY", value "sk-abc123" Retrieve a secret: Use passbox_get_secret with vault "my-project", key "API_KEY"
ToolDescriptionpassbox_get_secretRetrieve and decrypt a secretpassbox_set_secretCreate or update a secret (encrypted before upload)passbox_list_secretsList secret names (values not returned)passbox_delete_secretDelete a secretpassbox_rotate_secretTrigger manual secret rotation
ToolDescriptionpassbox_list_vaultsList all available vaultspassbox_list_environmentsList environments (dev, staging, prod)passbox_get_environmentGet all secrets in an environment
ToolDescriptionpassbox_diff_envCompare local .env with vault secretspassbox_import_envImport .env file into vault
passbox_list_vaults — see existing vaults passbox_set_secret — store each credential passbox_list_secrets — verify all keys are stored
Read your local .env file passbox_diff_env — see what's different passbox_import_env — push local secrets to vault
passbox_get_environment for "dev" Review values passbox_set_secret for each key in "staging"
Use with a2a_secure_execute to automatically inject secrets: Use a2a_secure_execute with toolId "my-api-tool" and input { "apiKey": "{{API_KEY}}" }, vault "my-project" The {{API_KEY}} placeholder is resolved from PassBox before execution.
Client-side encryption: Values are encrypted before leaving your device Zero-knowledge: The server stores only ciphertext Environment isolation: dev/staging/prod secrets are fully separated Audit trail: All access is logged Secret rotation: Built-in rotation support with webhooks
Long-tail utilities that do not fit the current primary taxonomy cleanly.
Largest current source with strong distribution and engagement signals.