Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Inject secrets into subprocesses via environment variables. You never see secret values — authy run injects them directly. Use for any command that needs API...
Inject secrets into subprocesses via environment variables. You never see secret values — authy run injects them directly. Use for any command that needs API...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Inject secrets into subprocesses as environment variables. You never see, handle, or log secret values.
Your token is run-only. You can discover secret names with authy list and inject them into subprocesses with authy run. You never see secret values directly.
authy run --scope <policy> --uppercase --replace-dash '_' -- <command> [args...] The --uppercase --replace-dash '_' flags turn secret names like db-host into env vars like DB_HOST. Examples: authy run --scope deploy --uppercase --replace-dash '_' -- ./deploy.sh authy run --scope backend --uppercase --replace-dash '_' -- node server.js authy run --scope testing --uppercase --replace-dash '_' -- pytest
authy list --scope <policy> --json Output: {"secrets":[{"name":"db-host","version":1,...}]}
Write code that reads environment variables, then run it with authy run: cat > task.sh << 'EOF' #!/bin/bash curl -H "Authorization: Bearer $API_KEY" https://api.example.com/data EOF chmod +x task.sh authy run --scope my-scope --uppercase --replace-dash '_' -- ./task.sh
CodeMeaning0Success2Auth failed — check AUTHY_TOKEN / AUTHY_KEYFILE3Secret or policy not found4Access denied or run-only restriction6Token invalid, expired, or revoked
Only use authy run and authy list — these are the only commands available to you Never hardcode credentials — reference env vars, run via authy run Never echo, print, or log env vars in subprocess scripts — secrets exist in memory only Never redirect env vars to files — do not write $SECRET to disk Use --scope to limit access to needed secrets only
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.