Install
openclaw skills install vault-clientHashicorp Vault client for OpenClaw agents. Read and write secrets from a Vault server without raw curl commands or hardcoded tokens. Use when reading API keys, DB credentials, or any secret stored in Hashicorp Vault; checking token expiry; rotating secrets; or configuring Vault access for the first time. NOT for the zuiho-kai local Vault skill (that is a different, local-only tool).
openclaw skills install vault-clientGives OpenClaw agents clean, cached access to Hashicorp Vault. No curl, no hardcoded tokens in transcripts.
Run once after installing:
node ~/.openclaw/workspace/skills/vault-client/scripts/vault.js setup
Prompts for address, token, and mount. Saves to ~/.openclaw/vault.json and appends a startup block to AGENTS.md.
node ~/.openclaw/workspace/skills/vault-client/scripts/vault.js check
token-renew# Read all keys at a path
node vault.js get shopwalk/r2
# Read a single key (returns just the value — pipe-friendly)
node vault.js get shopwalk/database uri
# Write / update a secret (merges with existing keys)
node vault.js put shopwalk/r2 secret_access_key=newvalue
# List paths
node vault.js list shopwalk/
# Token management
node vault.js token-info
node vault.js token-renew
~/.openclaw/vault.json){
"address": "https://vault.example.com:8200",
"mount": "secret",
"auth": { "method": "token", "token": "hvs.xxx" },
"cache_ttl_seconds": 300,
"tls": { "verify": true }
}
Set tls.verify: false for internal Vault with self-signed certs.
Secrets are cached in ~/.openclaw/vault-cache.json for cache_ttl_seconds (default 5 min) to avoid repeated API calls.
Token auth is the default. For AppRole and Kubernetes auth, see references/auth-methods.md.
Uses Node.js stdlib only (https, fs, readline). No npm install required.