Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Secure local password storage tool with AES-256-GCM encryption. Store, retrieve, and manage passwords with CLI commands.
Secure local password storage tool with AES-256-GCM encryption. Store, retrieve, and manage passwords with CLI commands.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Use when you need secure local storage for passwords, API keys, or credentials. ๐ AES-256-GCM encryption - This plugin stores passwords encrypted using industry-standard AES-256-GCM encryption with a master key.
๐ AES-256-GCM encryption for all stored passwords ๐ Simple command-line interface ๐๏ธ Key management and listing ๐พ JSON-based local storage (encrypted) ๐ Automatic timestamp tracking ๐ Master key protection
clawhub install vault
vault gemini sk-abc123xyz
vault gemini show
vault gemini remove
vault list
Set your master encryption key via environment variable: export VAULT_MASTER_KEY="your-secure-master-key-here" Or in your OpenClaw config: { "plugins": { "vault": { "masterKey": "your-secure-master-key-here", "storageFile": ".vault/passwords.json" } } } Options: masterKey - Master encryption key (can also use VAULT_MASTER_KEY env var) storageFile (default: .vault/passwords.json) - Storage file path relative to home directory โ ๏ธ Important: Keep your master key secure! Without it, you cannot decrypt stored passwords.
๐ Encryption Details: Algorithm: AES-256-GCM (Galois/Counter Mode) Key Derivation: scrypt with random salt per password IV: Random 12-byte initialization vector per password (GCM recommended size) Salt: Random 32-byte salt per password, stored with encrypted data Authentication: GCM authentication tag for integrity verification Security Best Practices: Use a strong, unique master key (minimum 32 characters recommended) Store master key securely (environment variable or secure config) Set strict file permissions: chmod 600 ~/.vault/passwords.json Add .vault/ to your .gitignore Never commit your master key to version control Use system-level disk encryption for additional protection Backup your master key securely - lost keys mean lost passwords Suitable for: Development/testing credentials API keys and tokens Personal passwords Team shared credentials (with secure key distribution)
# Save API keys vault openai sk-proj-abc123 vault anthropic sk-ant-xyz789 # View a key vault openai show # Output: Password for 'openai': sk-proj-abc123 # List all keys vault list # Output: # Stored passwords: # โข openai (created: 2026-02-17T..., updated: 2026-02-17T...) # โข anthropic (created: 2026-02-17T..., updated: 2026-02-17T...) # Remove a key vault openai remove
GitHub: https://github.com/zuiho-kai/openclaw-vault Issues: https://github.com/zuiho-kai/openclaw-vault/issues
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.