Install
openclaw skills install binance-fiatClawHub Security found sensitive or high-impact capabilities. Review the scan results before using.
Binance Fiat request using the Binance API. Authentication requires API key and secret key.
openclaw skills install binance-fiatFiat request on Binance using authenticated API endpoints. Requires API key and secret key for certain endpoints. Return the result in JSON format.
| Endpoint | Description | Required | Optional | Authentication |
|---|---|---|---|---|
/sapi/v1/fiat/deposit (POST) | Deposit(TRADE) | None | recvWindow | Yes |
/sapi/v2/fiat/withdraw (POST) | Fiat Withdraw(WITHDRAW) | None | recvWindow | Yes |
/sapi/v1/fiat/orders (GET) | Get Fiat Deposit/Withdraw History (USER_DATA) | transactionType | beginTime, endTime, page, rows, recvWindow | Yes |
/sapi/v1/fiat/payments (GET) | Get Fiat Payments History (USER_DATA) | transactionType | beginTime, endTime, page, rows, recvWindow | Yes |
/sapi/v1/fiat/get-order-detail (GET) | Get Order Detail(USER_DATA) | orderNo | recvWindow | Yes |
For endpoints that require authentication, you will need to provide Binance API credentials. Required credentials:
Base URLs:
Users can provide Binance API credentials in different ways. The agent will try to retrieve automatically with the two first ways the credentials, but users can also explicitly tell the agent that they have set the credentials or stored them in a .env file, and the agent should re-read that file when they do. The agent can also make http requests with the two first methods without user confirmation.
Search for the following specific variables only (never dump the full environment):
Authorized environment variables
BINANCE_API_KEY and BINANCE_SECRET_KEYRead and use in a single exec call so the raw key never enters the agent's context:
KEY="$BINANCE_API_KEY"
SECRET="$BINANCE_SECRET_KEY"
response=$(curl -s -X GET "$URL" \
-H "X-MBX-APIKEY: $KEY" \
--data-urlencode "param1=value1")
echo "$response"
Environment variables must be set before OpenClaw starts. They are inherited at process startup and cannot be injected into a running instance. If you need to add or update credentials without restarting, use a secrets file (see option 2).
Check ~/.openclaw/secrets.env , ~/.env, or a .env file in the workspace. Read individual keys with grep, never source the full file:
# Try all credential locations in order
API_KEY=$(grep '^BINANCE_API_KEY=' ~/.openclaw/secrets.env 2>/dev/null | cut -d= -f2-)
SECRET_KEY=$(grep '^BINANCE_SECRET_KEY=' ~/.openclaw/secrets.env 2>/dev/null | cut -d= -f2-)
# Fallback: search .env in known directories (KEY=VALUE then raw line format)
for dir in ~/.openclaw ~; do
[ -n "$API_KEY" ] && break
env_file="$dir/.env"
[ -f "$env_file" ] || continue
# Read first two lines
line1=$(sed -n '1p' "$env_file")
line2=$(sed -n '2p' "$env_file")
# Check if lines contain '=' indicating KEY=VALUE format
if [[ "$line1" == *=* && "$line2" == *=* ]]; then
API_KEY=$(grep '^BINANCE_API_KEY=' "$env_file" 2>/dev/null | cut -d= -f2-)
SECRET_KEY=$(grep '^BINANCE_SECRET_KEY=' "$env_file" 2>/dev/null | cut -d= -f2-)
else
# Treat lines as raw values
API_KEY="$line1"
SECRET_KEY="$line2"
fi
done
This file can be updated at any time without restarting OpenClaw, keys are read fresh on each invocation. Users can tell you the variables are now set or stored in a .env file, and you should re-read that file when they do.
Sending a file where the content is in the following format:
abc123...xyz
secret123...key
printenv, env, export, or set without a specific variable namegrep on env files without anchoring to a specific key ('^VARNAME=')source .env or . .env)TOOLS.md to version control if it contains real credentials — add it to .gitignoreNever disclose the location of the API key and secret file.
Never send the API key and secret to any website other than Mainnet and Testnet.
When showing credentials to users:
su1Qc...8akf***...aws1Example response when asked for credentials: Account: main API Key: su1Qc...8akf Secret: ***...aws1
When listing accounts, show names and environment only — never keys: Binance Accounts:
When performing transactions in mainnet, always confirm with the user before proceeding by asking them to write "CONFIRM" to proceed.
## Binance Accounts
### main
- API Key: abc123...xyz
- Secret: secret123...key
- Description: Primary trading account
### futures-keys
- API Key: futures789...def
- Secret: futuressecret...uvw
- Description: Futures trading account
When user provides new credentials by Inline file or message:
TOOLS.md with masked display confirmationFor trading endpoints that require a signature:
X-MBX-APIKEY header.Otherwise, do not perform steps 4–6.
Include User-Agent header with the following string: binance-fiat/1.1.0 (Skill)
See references/authentication.md for implementation details.