Install
openclaw skills install ravi-secretsStore and retrieve key-value secrets — encrypted secret store for API keys and env vars. Do NOT use for website passwords (use ravi-passwords) or reading mes...
openclaw skills install ravi-secretsStore and retrieve key-value secrets (API keys, environment variables, tokens). All values are server-side encrypted — you send and receive plaintext. Keys are stored in plaintext for lookup/filtering.
# Store a secret
ravi secrets set OPENAI_API_KEY "sk-abc123..."
# List all secrets
ravi secrets list
# Retrieve a secret by key name
ravi secrets get OPENAI_API_KEY
# Delete a secret by UUID
ravi secrets delete <uuid>
ravi secrets list:
[
{
"uuid": "...",
"identity": 1,
"key": "OPENAI_API_KEY",
"value": "sk-abc123...",
"notes": "",
"created_dt": "2026-02-25T10:30:00Z",
"updated_dt": "2026-02-25T10:30:00Z"
}
]
ravi secrets get OPENAI_API_KEY:
{
"uuid": "...",
"identity": 1,
"key": "OPENAI_API_KEY",
"value": "sk-abc123...",
"notes": "",
"created_dt": "2026-02-25T10:30:00Z",
"updated_dt": "2026-02-25T10:30:00Z"
}
# Store a key
ravi secrets set OPENAI_API_KEY "sk-abc123..."
# Retrieve the key value
API_KEY=$(ravi secrets get OPENAI_API_KEY | jq -r '.value')
# List all available key names
ravi secrets list | jq -r '.[].key'
ravi secrets set ANTHROPIC_API_KEY "sk-ant-..."
ravi secrets set GITHUB_TOKEN "ghp_..."
ravi secrets set again (it will upsert). Creating a duplicate key name will return a validation error.test_key becomes TEST_KEY). Keys must match ^[A-Z][A-Z0-9_]*$ after uppercasing.OPENAI_API_KEY, STRIPE_SECRET_KEY.For complete endpoint details, request/response schemas, and parameters: Secrets