โ† All skills
Tencent SkillHub ยท Developer Tools

Codex Multi Subscription Auth Fallbacks

Set up OpenClaw multi-provider auth with OpenAI Codex OAuth fallback profiles and automatic model switching. Use when configuring multiple OpenAI Codex accou...

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Set up OpenClaw multi-provider auth with OpenAI Codex OAuth fallback profiles and automatic model switching. Use when configuring multiple OpenAI Codex accou...

โฌ‡ 0 downloads โ˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
SKILL.md, scripts/codex-add-profile.sh, references/config-templates.md

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
1.1.0

Documentation

ClawHub primary doc Primary doc: SKILL.md 9 sections Open source page

Codex Auth Fallback

Multi-provider auth setup for OpenClaw with automatic failover between Anthropic and multiple OpenAI Codex OAuth sessions.

Overview

OpenClaw supports multiple auth profiles per provider. When one profile hits a rate limit, the platform can fail over to another. This skill covers: Adding Codex OAuth profiles via device-flow login Configuring openclaw.json for provider fallback order Setting up auth-profiles.json with multiple profiles Deploying a cron job to auto-switch models on cooldown

Prerequisites

OpenClaw instance running codex CLI installed (npm i -g @openai/codex) โ€” this also ensures node is available One or more OpenAI accounts with Codex access

Security & Safety

What this skill accesses: FileAccessPurpose~/.codex/auth.jsonRead + Temporary WriteTemporarily cleared to force a fresh device-flow login, then restored from backup. Original tokens are never deleted โ€” a timestamped backup is created first.~/.openclaw/agents/main/agent/auth-profiles.jsonRead + WriteImported OAuth tokens (access + refresh) are written here. A timestamped backup is created before any modification. Important safety notes: Tokens stay local. No tokens are sent to any external endpoint. The script reads tokens from the local Codex CLI auth file and writes them to the local OpenClaw auth-profiles file. Backups are always created. Both files are backed up with timestamps before any modification. If login fails or the script is interrupted, a trap handler restores the original Codex CLI auth automatically. Interactive confirmation. The script prompts for confirmation before clearing the Codex CLI auth file, so you can abort if needed. No elevated privileges. The script runs as your user and does not require sudo or any special permissions. Back up manually first. Despite the automatic backups, it is recommended to manually back up ~/.codex/auth.json and your OpenClaw configs before running, especially on first use. Test with a non-production account. For initial testing, consider using a throwaway or non-production OpenAI account.

Step 1: Add Codex OAuth Profiles

Run the bundled script for each OpenAI account: ./scripts/codex-add-profile.sh <profile-name> The script: Backs up ~/.codex/auth.json and auth-profiles.json Clears Codex CLI auth to force fresh device-flow login Runs codex auth login (opens browser for OAuth) Extracts tokens and imports them into OpenClaw's auth-profiles.json Restores the original Codex CLI auth Repeat for each account. Profile names should be short identifiers (e.g., the OpenAI username).

Step 2: Configure openclaw.json

Add auth profile declarations and fallback model config. See references/config-templates.md for the exact JSON blocks to add to openclaw.json. Key sections: auth.profiles โ€” Declare each profile with provider and mode auth.order โ€” Set failover priority per provider agents.defaults.model โ€” Set primary model + fallbacks

Step 3: Auth Profiles JSON Structure

OpenClaw stores live tokens in agents/main/agent/auth-profiles.json. See references/config-templates.md for the schema. Each Codex profile contains: type: "oauth" provider: "openai-codex" access: JWT access token (auto-populated by the add-profile script) refresh: Refresh token (auto-populated) expires: Token expiry in ms (parsed from JWT) accountId: OpenAI account ID (parsed from JWT) The order object controls which profile is tried first per provider. The usageStats object tracks rate limits and cooldowns automatically.

Step 4: Model Cooldown Auto-Switch Cron (Optional)

This step is entirely optional. The auth profiles from Steps 1-3 work on their own with OpenClaw's built-in failover. This cron job adds automatic model switching, which means your active model may change without manual intervention. Only enable it if you understand and want this behavior. Deploy a cron job that checks cooldown state every 10 minutes and switches the active model. See references/config-templates.md for the full cron job definition. The cron job: Runs openclaw models status to check cooldown state Picks the best available model (priority: opus > codex profiles in order) Updates the session model override if needed Logs state to a local memory file; only notifies on change Before enabling: Test manually first: run openclaw models status to verify your profiles are working Review the cron job template in references/config-templates.md โ€” the job only runs local commands and writes to a local state file The job runs in an isolated session and does not affect your main chat unless a model switch occurs Add the job to cron/jobs.json using the template in the references.

File Layout

codex-auth-fallback/ โ”œโ”€โ”€ SKILL.md # This file โ”œโ”€โ”€ scripts/ โ”‚ โ””โ”€โ”€ codex-add-profile.sh # Device-flow profile importer โ””โ”€โ”€ references/ โ””โ”€โ”€ config-templates.md # openclaw.json, auth-profiles, cron templates

Category context

Code helpers, APIs, CLIs, browser automation, testing, and developer operations.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
2 Docs1 Scripts
  • SKILL.md Primary doc
  • references/config-templates.md Docs
  • scripts/codex-add-profile.sh Scripts