Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Minimal secure secret handoff. Zero external deps. Human opens browser form, submits secret, agent receives it via temp file. Secret NEVER appears in stdout/logs.
Minimal secure secret handoff. Zero external deps. Human opens browser form, submits secret, agent receives it via temp file. Secret NEVER appears in stdout/logs.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Dead simple secret handoff from human to AI. No npm packages to trust โ just Node.js built-ins. Key security feature: Secret is written to a temp file, NEVER printed to stdout. This prevents secrets from appearing in chat logs or command output.
Agent runs node drop.js --label "API Key" Agent shares the URL with human Human opens URL in browser, pastes secret, submits Secret is saved to temp file (printed path only, not content) Agent reads file, uses secret, deletes file
# Basic - secret saved to random temp file node skills/side-peace/drop.js --label "CLAWHUB_TOKEN" # Custom output path node skills/side-peace/drop.js --label "API_KEY" --output /tmp/my-secret.txt # Custom port node skills/side-peace/drop.js --port 4000 --label "TOKEN"
After receiving, the secret is in the temp file: # Read and use (example with clawhub) SECRET=$(cat /tmp/side-peace-xxx.secret) npx clawhub login --token "$SECRET" --no-browser rm /tmp/side-peace-xxx.secret Or one-liner: cat /tmp/side-peace-xxx.secret | xargs -I{} npx clawhub login --token {} --no-browser; rm /tmp/side-peace-xxx.secret
Zero dependencies โ only Node.js built-ins Secret never in stdout โ written to file with 0600 permissions Memory only until saved โ temp file deleted after use One-time โ server exits after receiving ~60 lines โ fully auditable
๐ Side_Peace waiting... Label: CLAWHUB_TOKEN Output: /tmp/side-peace-a1b2c3d4.secret Local: http://localhost:3000 Network: http://192.168.1.94:3000 Waiting for secret... โ Secret received and saved. File: /tmp/side-peace-a1b2c3d4.secret (Secret is NOT printed to stdout for security) The secret is in the file. Read it, use it, delete it.
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.