Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Model any API with Swamp, test it, and enrich *Claw with new capabilities — full lifecycle from idea to working integration
Model any API with Swamp, test it, and enrich *Claw with new capabilities — full lifecycle from idea to working integration
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
You are an AI agent that uses Swamp to model any API, test it, and turn it into a reusable *Claw capability. Swamp is an AI-native automation CLI that represents external resources (APIs, CLIs, cloud services) as typed models with executable methods and composable workflows.
Before any operation, check if the current directory is a swamp repository. If not, initialize one: swamp repo init --tool claude This creates a .swamp/ directory with the necessary structure. Use --tool claude to set up the AI agent integration for Claude/OpenClaw.
Find available model types to understand what kinds of resources can be modeled: swamp model type search swamp model type describe <type> The command/shell type is the most versatile — it can model any API via shell commands (curl, httpie, CLI tools).
Create a new model definition for the API: swamp model create <type> <name> Example: swamp model create command/shell github-issues
Open and edit the model's YAML definition to configure endpoints, authentication, parameters, and methods: swamp model edit <name> When editing, define: Methods: The operations this API supports (list, create, update, delete) Inputs: Parameters each method accepts Authentication: Reference vault secrets via CEL expressions Commands: The actual shell commands (curl calls, CLI invocations) that execute each method
Ensure the model definition is well-formed: swamp model validate <name> Fix any validation errors before proceeding.
Execute a method on your model to test it: swamp model method run <model_name> <method_name>
Check outputs, logs, and data from the execution: swamp model output get <output_id_or_model_name> swamp model output logs <output_id> swamp model output data <output_id>
See past executions: swamp model method history search swamp model method history get <output_id_or_model_name> Iterate on the model definition until methods return the expected results.
Chain multiple model methods into automated workflows with dependency ordering: swamp workflow create <name> swamp workflow edit <name> swamp workflow validate <name> swamp workflow run <name> Workflows support: Parallel job execution Dependency ordering between jobs Trigger conditions via CEL expressions Cross-model references (one model's output feeds into another) Check workflow results: swamp workflow history get <name> swamp workflow history logs <run_id>
Store API keys and secrets securely — never hardcode them: swamp vault create <type> <name> swamp vault put <vault_name> <KEY=value> swamp vault list-keys <vault_name> Reference secrets in model definitions using CEL expressions like vault.get("my-vault", "API_KEY").
Inspect outputs and artifacts across models: swamp data list <model_name> swamp data get <model_name> <data_name> swamp data search <query>
Swamp-club is the community registry and collaboration layer. Authenticate to push/pull extensions and share work: swamp auth login swamp auth login --server <url> swamp auth whoami swamp auth logout swamp auth login opens a browser-based login flow by default Use --no-browser with --username and --password for headless/CI environments Set SWAMP_CLUB_URL env var to target a custom server Always verify identity with swamp auth whoami after login Authentication is required before pushing extensions to the registry.
Extensions expand Swamp's model types and capabilities. Use the extension registry to share and reuse custom models:
Install a community or team extension from the registry: swamp extension pull <extension_name> swamp extension pull <extension_name> --force Use --force to overwrite existing files without prompting.
See what extensions are currently installed: swamp extension list
Publish your own extension to the swamp registry (requires swamp auth login first): swamp extension push <manifest-path> swamp extension push <manifest-path> --dry-run Use --dry-run to build the archive locally and verify it without actually publishing. Use -y to skip confirmation prompts.
Uninstall a pulled extension and clean up its files: swamp extension remove <extension_name>
The typical flow for extending Swamp with new model types: Create custom TypeScript model definitions in extensions/models/ Test locally with swamp model create <your-type> <name> Package with a manifest file Dry-run: swamp extension push ./manifest.yaml --dry-run Publish: swamp extension push ./manifest.yaml Others install: swamp extension pull <your-extension>
Once a Swamp model is validated and working, turn it into a standalone *Claw skill: Export the model: Use swamp model get <name> --json to extract the full definition Generate a SKILL.md: Create a new skill file that wraps the Swamp model's methods as agent instructions Include setup instructions: Document the required env vars, binaries, and vault configuration Publish to ClawHub: Share the skill with the community via clawhub publish The generated skill should: Require swamp in its bins dependency Reference the swamp repo and model by name Map each model method to a clear agent instruction Include examples of typical invocations
For reusable model types (not just individual models), publish as a Swamp extension: Build the custom model type in extensions/models/ Push to the Swamp registry: swamp extension push ./manifest.yaml Create a *Claw skill that pulls the extension and uses it: swamp extension pull <name> This creates a two-layer sharing model: extensions for model types (Swamp registry), skills for agent workflows (ClawHub).
"Model the JSONPlaceholder API so I can list and create posts" swamp model create command/shell jsonplaceholder Edit to add methods: list-posts (GET /posts), create-post (POST /posts) swamp model method run jsonplaceholder list-posts Verify output, iterate
"Create a weather model that fetches forecasts by city" swamp model create command/shell weather Edit to add a forecast method using curl -s "wttr.in/{city}?format=j1" Test with swamp model method run weather forecast
"Create a workflow that fetches GitHub issues, summarizes them, and posts to Slack" Create models: github-issues, slack-webhook Create workflow: swamp workflow create issue-digest Define jobs with dependencies: fetch issues -> format summary -> post to Slack swamp workflow run issue-digest
"Turn my working weather model into a skill others can install" swamp model get weather --json to export Create a new SKILL.md wrapping the weather model commands clawhub publish ./weather-skill
"Publish my custom Stripe model type so the team can use it" swamp auth login to authenticate with swamp-club swamp extension push ./stripe-models/manifest.yaml --dry-run to verify swamp extension push ./stripe-models/manifest.yaml to publish Team members install: swamp extension pull stripe-models
Always use --json flag when you need to parse Swamp output programmatically Use swamp model validate before running to catch definition errors early Store all credentials in vaults, never in model definitions Use -v (verbose) flag when debugging unexpected behavior All Swamp operations run locally — credentials stay on the user's machine Authenticate with swamp auth login before pushing extensions to the registry Use swamp extension push --dry-run to verify an extension before publishing Use swamp auth whoami to confirm your identity before registry operations
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.