Install
openclaw skills install archon-vaultEncrypted distributed storage using Archon DID vaults. Manage vaults, backup and restore workspace/config/memory with multi-party access control. Use for cre...
openclaw skills install archon-vaultManage DID vaults and backup/restore files. Data is encrypted client-side before transmission — only you (or vault members) can decrypt.
~/.archon.env with wallet path and passphrase)archon-keymaster first to create your DID if you don't have one./scripts/backup/backup-to-vault.sh [vault-did]
Archives ~/clawd and ~/.openclaw to your encrypted vault. Respects .backup-ignore files.
./scripts/backup/restore-from-vault.sh <backup-did> [target-dir]
./scripts/backup/verify-backup.sh <backup-did>
./scripts/backup/disaster-recovery.sh
Full recovery procedure with mnemonic.
./scripts/vaults/create-vault.sh <vault-name>
./scripts/vaults/add-vault-item.sh <vault-did> <item-did>
./scripts/vaults/remove-vault-item.sh <vault-did> <item-did>
./scripts/vaults/get-vault-item.sh <vault-did> <item-did>
./scripts/vaults/list-vault-items.sh <vault-did>
./scripts/vaults/add-vault-member.sh <vault-did> <member-did>
./scripts/vaults/remove-vault-member.sh <vault-did> <member-did>
./scripts/vaults/list-vault-members.sh <vault-did>
Backup scope: Archives ~/clawd and ~/.openclaw by default. Review .backup-ignore to exclude sensitive items.
Encryption: All data encrypted before transmission to Archon gatekeeper/hyperswarm.
Vault members: Adding a member grants them decrypt access to vault contents.
Recovery: Your 12-word mnemonic is the master key. Store it offline.