Install
openclaw skills install github-private-repo-ssh-routingDiagnose and manage SSH keys, host aliases, and Git remotes for GitHub private repositories in multi-repo environments. Use when deploy keys collide, a machi...
openclaw skills install github-private-repo-ssh-routingTreat GitHub private repo access as a routing problem, not just a Git problem.
Host github.com when multiple deploy keys exist.Host github.com-backup
HostName github.com
User git
IdentityFile ~/.ssh/openclaw_backup_ed25519
IdentitiesOnly yes
git remote set-url origin git@github.com-backup:OWNER/REPO.git
Use this skill when the machine has more than one private GitHub repo, more than one SSH key, or any recurring GitHub automation.
If you need the fastest route:
references/symptoms.md and match the exact error.references/patterns.md and compare the current alias + remote layout.references/decision-guide.md only if the identity model itself is still undecided.references/openclaw-automation.md only when a script, backup flow, or config value may be rewriting the remote.Check the local repo path, current remotes, and whether the failing action came from:
If the repo path and the config source differ, do not treat them as the same fix.
Read references/patterns.md for the standard alias layout.
Read references/key-storage-by-system.md when OS-specific key locations or mixed Windows/WSL/macOS behavior may matter.
Ask:
Host github.com rule hijacking traffic?Read references/symptoms.md and match the exact failure string before changing anything.
Read references/decision-guide.md when the user is deciding between:
Read references/identity-model-boundaries.md when the question is really about where SSH routing ends and GitHub API authority begins — especially for PR merge automation, release creation, or fine-grained PAT vs deploy key decisions.
Read references/openclaw-automation.md when the repo is used by OpenClaw backup/restore, plugins, cron jobs, or config-driven workflows.
ssh -G <alias>.ssh -T git@<alias>.git ls-remote origin.ls -la ~/.ssh
sed -n '1,200p' ~/.ssh/config
git remote -v
ssh -G <host-alias> | sed -n '1,40p'
ssh -T git@<host-alias>
git ls-remote origin
For a read-only audit of one local repo, run:
scripts/audit-routing.sh /path/to/repo
The script summarizes:
origin~/.ssh files and permissions~/.ssh/config previewssh -G summary for the detected aliasUse the script to inspect before editing.