Install
openclaw skills install openclaw-skill-bitwardenBitwarden & Vaultwarden password manager integration. Use when storing, retrieving, generating, or managing passwords and credentials. Wraps the Bitwarden CLI (bw) with automatic session management. Works with both official Bitwarden and self-hosted Vaultwarden servers.
openclaw skills install openclaw-skill-bitwardenBitwarden/Vaultwarden CLI (bw) wrapper with automatic login, session caching, and convenient commands. Works seamlessly with both official Bitwarden (vault.bitwarden.com) and self-hosted Vaultwarden instances.
bw) installed: npm install -g @bitwarden/cliSet credentials via environment variables or a credentials file:
# Environment variables (preferred)
export BW_SERVER="https://vault.bitwarden.com" # Official Bitwarden
# OR
export BW_SERVER="https://your-vaultwarden-instance.example.com" # Vaultwarden
export BW_EMAIL="your-email@example.com"
export BW_MASTER_PASSWORD="your-master-password"
# Or use a credentials file (default: secrets/bitwarden.env)
export CREDS_FILE="/path/to/your/bitwarden.env"
The credentials file should contain:
BW_SERVER=https://vault.bitwarden.com
BW_EMAIL=your-email@example.com
BW_MASTER_PASSWORD=your-master-password
bash skills/bitwarden/bw.sh <command> [args...]
| Command | Description | Example |
|---|---|---|
register [email] [pass] [name] | Register new account | bw.sh register user@example.com pass123 "My Name" |
login | Login & unlock vault | bw.sh login |
status | Show vault status | bw.sh status |
list [search] | List/search items | bw.sh list github |
get <name|id> | Get full item JSON | bw.sh get "GitHub" |
get-password <name|id> | Get password only | bw.sh get-password "GitHub" |
get-username <name|id> | Get username only | bw.sh get-username "GitHub" |
create <name> <user> <pass> [uri] [notes] | Create login | bw.sh create "GitHub" user pass https://github.com |
generate [length] | Generate password | bw.sh generate 32 |
delete <id> | Delete item | bw.sh delete <uuid> |
lock | Lock vault | bw.sh lock |
bw.sh login (auto-authenticates from configured credentials)/tmp/.bw_sessionlogin again# Generate + store
PASS=$(bash skills/bitwarden/bw.sh generate 32)
bash skills/bitwarden/bw.sh create "New Service" "user@email.com" "$PASS" "https://service.com"
Register a new account on your Bitwarden/Vaultwarden server directly from the CLI:
# Register using configured credentials (from env/credentials file)
bash skills/bitwarden/bw.sh register
# Register with explicit credentials
bash skills/bitwarden/bw.sh register "user@example.com" "SecurePass123!" "Display Name"
How it works:
/api/accounts/register endpointRequirements: Python 3 with cryptography and requests packages.
Note: The master password must be at least 12 characters. Works with both official Bitwarden and Vaultwarden servers.
bitwarden.env out of version control.chmod 600 on credential files./tmp and cleared on lock/logout.| Endpoint | Purpose | Data Sent |
|---|---|---|
| User-configured BW_SERVER | Bitwarden/Vaultwarden API | Encrypted vault data, authentication credentials |
Note: The skill communicates with the Bitwarden server you configure via BW_SERVER. For official Bitwarden, this is https://vault.bitwarden.com. For Vaultwarden, this is your self-hosted instance URL.
What leaves your machine:
What stays local:
/tmp/.bw_session)bitwarden.env)Trust statement: By using this skill, you are sending authentication credentials and vault data to the Bitwarden server you configure. Only install this skill if you trust your Bitwarden/Vaultwarden instance.
This skill can be invoked autonomously by your OpenClaw agent when it needs to:
If you prefer manual approval before password operations, configure your OpenClaw agent's tool policy accordingly.
chmod 600 on secrets/bitwarden.envbw.sh lock when done.gitignore excludes all secrets (secrets/, *.env, .bw_session)