Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Connect 2,000+ APIs with managed OAuth via Pipedream. Includes full UI integration for Clawdbot Gateway dashboard.
Connect 2,000+ APIs with managed OAuth via Pipedream. Includes full UI integration for Clawdbot Gateway dashboard.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Connect your AI agents to 2,000+ APIs with managed OAuth via Pipedream. Each agent gets its own isolated app connections and OAuth tokens.
Added AβZ alphabet filter in the per-agent Browse Apps modal for fast app lookup by starting letter Added active letter indicator in results summary (e.g., Letter: Q) Improved app card readability in Browse Apps (wrapped names, reduced truncation) Updated reference snapshots for latest app catalog fallback + CSP compatibility path
Added explicit metadata declarations for config paths, capabilities, persistence, and security notes Clarified persistent behavior (optional cron token refresh) and sensitive file access in docs Aligned docs with actual paths under ~/.openclaw/
Per-agent app connections β App connections moved to Agents β [Agent] β Tools β Pipedream Global tab = credentials only β The Pipedream tab is now for platform auth (Client ID/Secret/Project ID) only External User ID defaults to agent slug β e.g. main, scout-monitor (not a UUID) Live connected apps β Refresh queries the Pipedream API for real connected accounts Environment warning β Agent panel shows a warning when running in development mode New RPCs: pipedream.connect, pipedream.disconnect, pipedream.test (per-agent, use agentId + appSlug)
clientId and clientSecret stored in ~/.openclaw/secrets.json (OpenClaw vault) β no longer plaintext in pipedream-credentials.json PIPEDREAM_CLIENT_SECRET removed from mcporter.json env β client secret is never written to mcporter config Auto-migration: on first gateway start after upgrade, existing pipedream-credentials.json secrets are silently moved to vault and stripped from the file Token refresh script now reads from vault first (falls back to credentials.json β mcporter.json for backwards compat) pipedream-credentials.json now contains only non-sensitive fields: projectId, environment, externalUserId VirusTotal "suspicious" flag resolved β no plaintext credential files
Global Pipedream Tab βββ Platform credentials (Client ID, Secret, Project ID, Environment) βββ Agent quick-links table (β navigate to per-agent config) Agents β [Agent] β Tools β Pipedream βββ External User ID (defaults to agent slug) βββ Connected Apps (live from Pipedream API) βββ Available Apps grid + Browse All Apps modal βββ Manual slug entry
Pipedream Account β pipedream.com mcporter β npm install -g mcporter OpenClaw Gateway β v2026.1.0 or later
Go to pipedream.com/settings/api β New OAuth Client Copy Client ID and Client Secret Go to pipedream.com/projects β create a project Copy Project ID (proj_...)
OpenClaw Dashboard β Pipedream tab β Configure Enter Client ID, Client Secret, Project ID Set Environment to production (not development β development tokens expire faster and have lower rate limits) Click Save Credentials
Go to Agents β [Agent] β Tools β Pipedream Verify the External User ID (defaults to agent slug, e.g. main) Click Connect on any app in the grid β completes OAuth in a popup Click β» Refresh after OAuth completes to see the app appear in Connected Apps
# Cron job β runs every 45 minutes (crontab -l 2>/dev/null; echo "*/45 * * * * /usr/bin/python3 $HOME/openclaw/skills/pipedream-connect/scripts/pipedream-token-refresh.py >> $HOME/openclaw/logs/pipedream-cron.log 2>&1") | crontab -
Each agent uses a separate Pipedream external_user_id: AgentExternal User IDPipedream IdentitymainmainIsolated OAuth tokensscout-monitorscout-monitorIsolated OAuth tokensscout-sparkscout-sparkIsolated OAuth tokens Config stored at: ~/.openclaw/workspace/config/integrations/pipedream/{agentId}.json External User ID defaults to agent slug. Override it in Agents β Tools β Pipedream β Edit.
RPCParamsDescriptionpipedream.statusβGet global credential status + agent summariespipedream.saveCredentialsclientId, clientSecret, projectId, environmentSave platform credentialspipedream.getTokenβGet/refresh the platform OAuth access tokenpipedream.getConnectUrlagentId, appSlugGet OAuth connect URL for a user+apppipedream.connectAppagentId, appSlugComplete app connection + write to mcporterpipedream.disconnectAppagentId, appSlugDisconnect app + remove from mcporterpipedream.refreshTokenagentId?, appSlug?Refresh token(s) β all or specific agent/apppipedream.activateagentId, appSlugActivate an app (add to mcporter if not present)
RPCParamsDescriptionpipedream.agent.statusagentIdGet config + live connected apps from APIpipedream.agent.saveagentId, externalUserIdSave per-agent configpipedream.agent.deleteagentIdRemove per-agent configpipedream.connectagentId, appSlugGet OAuth connect URL for agentpipedream.disconnectagentId, appSlugDisconnect app + remove from mcporterpipedream.testagentId, appSlugTest app connection
# Gmail (agent: main β externalUserId: main) mcporter call pipedream-main-gmail.gmail-find-email \ instruction="Find unread emails from today" # Google Calendar (agent: scout-monitor) mcporter call pipedream-scout-monitor-google-calendar.google-calendar-find-event \ instruction="Find events for tomorrow" Server names follow the pattern: pipedream-{externalUserId}-{appSlug}
β οΈ Use Production for real work: Development tokens expire faster and have lower rate limits Set in: Pipedream tab β Edit credentials β Environment β Production The agent Pipedream panel shows a warning when running in development mode
BehaviorDetailclientIdStored in ~/.openclaw/secrets.json (vault, 0600)clientSecretStored in ~/.openclaw/secrets.json (vault, 0600) β never in plaintext config filesNon-secret config~/.openclaw/workspace/config/pipedream-credentials.json β projectId, environment, externalUserId onlyPer-agent config~/.openclaw/workspace/config/integrations/pipedream/{agentId}.jsonAccess tokens (JWT)Short-lived Bearer token in mcporter.json Authorization header β acceptable, refreshed every 45 minmcporter envPIPEDREAM_CLIENT_SECRET is never written to mcporter.jsonExternal API callsapi.pipedream.com, remote.mcp.pipedream.netAuto-migrationExisting plaintext credentials.json secrets automatically moved to vault on first gateway start
Connected app not showing after OAuth β Click β» Refresh β the panel queries the Pipedream API live for connected accounts unknown method: pipedream.connect β Rebuild and restart gateway: pnpm build && openclaw gateway restart No Pipedream credentials configured β Set up credentials in the global Pipedream tab first Development environment warning β Edit credentials in Pipedream tab, change Environment to production, save Token expired β Set up the 45-minute cron job above, or click Connect again to re-authorize
ClawHub: clawhub.ai/skills/pipedream-connect Pipedream Docs: pipedream.com/docs MCP Apps: mcp.pipedream.com OpenClaw Discord: discord.com/invite/clawd
FilePurposereference/pipedream-backend.tsGateway RPC handlers (all pipedream.* methods)reference/pipedream-views.tsGlobal Pipedream tab UI (Lit)reference/pipedream-controller.tsGlobal tab state managementreference/agent-pipedream-views.tsPer-agent Pipedream panel UI (Agents β Tools β Pipedream)reference/agent-pipedream-controller.tsPer-agent state managementreference/control-ui-csp.tsControl UI CSP policy (connect-src allowlist)reference/README.mdReference file notesscripts/Token refresh and utility scripts
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.