Credential Manager

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill is openly a credential-migration tool, but it handles and can delete broad, high-value local credentials while using forceful “mandatory” language, so it needs careful manual review before use.

Only install or run this if you deliberately want to migrate credentials into `~/.openclaw/.env`. Start with `scan.py`, review the exact files and keys, avoid `--yes` until you are sure, check backup permissions, and do not consolidate crypto wallet, payment, production cloud, or unrelated service secrets unless OpenClaw truly needs them.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If run as documented, the skill may copy high-value API keys, cloud tokens, wallet keys, and other account secrets into one OpenClaw file.

Why it was flagged

The skill is designed to collect broad local credentials, not just a narrow OpenClaw service credential. Centralizing all of them gives any process or skill that can read the OpenClaw .env access to many accounts.

Skill content
ALL credentials MUST be consolidated to `/home/phan_harry/.openclaw/.env` ... `~/.config/*/credentials.json` ... Any scattered API key files
Recommendation

Run the scan first, review every file and key, and only consolidate credentials you intentionally want OpenClaw skills to access. Consider excluding wallet, payment, production cloud, or unrelated service credentials.

What this means

Old credential copies may remain in the backup directory with weaker permissions than the new .env, leaving sensitive keys exposed locally.

Why it was flagged

The main .env is chmodded to 600, but backups are copied without an explicit backup-file or backup-directory permission hardening step. copy2 can preserve insecure source permissions.

Skill content
backup_dir.mkdir(parents=True, exist_ok=True) ... shutil.copy2(file, backup_path) ... os.chmod(env_file, 0o600)
Recommendation

After running, check `~/.openclaw/backups` permissions, chmod backup directories to 700 and backup files to 600, or encrypt/delete backups once migration is verified.

What this means

A user or agent may run broad credential migration and cleanup steps without enough review because the skill frames them as non-optional.

Why it was flagged

The documentation pressures the user or agent to treat this third-party skill as mandatory infrastructure, despite its high-impact credential access and mutation behavior.

Skill content
This Is Not Optional ... stop and consolidate them now ... All credentials MUST be in `~/.openclaw/.env` ONLY. No workspace, no skills, no scripts directories.
Recommendation

Treat the skill as optional tooling. Require explicit user approval before consolidation, auto-confirm, validation fixes, or cleanup.

What this means

Deleting old credential files can break other applications or cause credential loss if backups are incomplete or the new .env was not tested.

Why it was flagged

Cleanup is user-confirmed and purpose-aligned, but it permanently deletes credential files found by the scanner.

Skill content
Type 'DELETE' to confirm ... f.unlink()
Recommendation

Use the cleanup dry run first, verify backups and the new .env, test dependent applications, and only then type the final deletion confirmation.

What this means

Users have less provenance information to decide whether to trust this credential-handling code.

Why it was flagged

The artifact has no clear upstream source or homepage, which matters more for a tool that handles broad local credentials.

Skill content
Source: unknown; Homepage: none
Recommendation

Inspect the scripts before running, prefer a known-source version, and avoid granting it access to credentials you cannot rotate.