Integration Guide
Your OpenClaw agent manages credentials, rotates API keys, and completes 2FA — all from a single MCP tool call. Personal data stays sealed behind your biometric.
Your agent reads these to authenticate, deploy, and automate.
Encrypted client-side with your biometric. The server stores ciphertext. No key, no access.
Create a token in the clavitor web UI, then set it in your OpenClaw config:
claw config set clavitor.url "http://localhost:1984/mcp" claw config set clavitor.token "clavitor_your_token_here"
# In any OpenClaw skill:
result = clavitor.get_credential("github")
totp = clavitor.get_totp("aws")
keys = clavitor.search_vault("ssh")Your MCP URL includes your unique vault identifier. You can find the exact URL in your Account Information page after signing up.
It looks like: https://clavitor.com/your_vault_id/mcp
Once connected, your OpenClaw agent handles credentials automatically. It looks up what it needs, generates 2FA codes, and authenticates — you just describe what you want done.
Your agent looks up server credentials, SSH key, and any required API tokens — then does the deployment.
get_credential("aws-production")
get_totp("aws") → 283941 (expires in 22s)Your agent finds the credential, generates a live TOTP code, and completes the 2FA flow. No phone needed.
get_credential("github")
get_totp("github") → 847203 (expires in 14s)Full-text search across all entries — titles, URLs, usernames, notes.
Check for credentials, cards, or documents expiring within any timeframe.
List all entries the agent has access to. Useful for inventory or onboarding.
Your agent stores new credentials, notes, and configuration directly in your vault. Sign up for a service, generate an API key — it saves it immediately.
License keys, server configs, migration plans, recovery instructions — anything your agent needs to remember goes straight into your vault, encrypted and searchable.
Running a swarm of OpenClaw agents? Each gets its own API key.
Its own API key for SSH keys, server creds, and API tokens
Its own API key for Stripe, payment gateways, and invoicing
Its own API key for GitHub, CI/CD, and database credentials
The audit log records which agent accessed which credential, when, and from where.
TIME ACTION ENTRY ACTOR
2026-03-08 10:23:14 read github.com mcp:claw-deploy
2026-03-08 10:23:15 totp github.com mcp:claw-deploy
2026-03-08 11:45:02 read aws-production mcp:claw-billing
2026-03-08 14:12:33 search "database" mcp:claw-dev