openclawbrain-site

Secrets and Capabilities Registry

This is the canonical policy for secrets in OpenClaw/OpenClawBrain workspaces.

Policy

Safe setup (no value printing):

mkdir -p ~/.openclaw/credentials/env ~/.openclaw/credentials

repo_dir=~/path/to/repo
project_env=~/.openclaw/credentials/env/<project>.env

# Backup and move an existing local .env into centralized storage.
if [ -f "$repo_dir/.env" ] && [ ! -L "$repo_dir/.env" ]; then
  cp "$repo_dir/.env" "$repo_dir/.env.backup.$(date +%Y%m%d%H%M%S)"
  mv "$repo_dir/.env" "$project_env"
fi

chmod 600 "$project_env"
[ -L "$repo_dir/.env" ] && rm "$repo_dir/.env"
ln -s "$project_env" "$repo_dir/.env"
chmod 600 ~/.openclaw/credentials/*.token 2>/dev/null || true

Minimal Schema

Each registry entry should track:

Canonical Capability Entries

Mapbox

Perplexity

Polygon

NewsAPI

OpenAI

SEC/EDGAR

ClinicalTrials.gov

FDA open data

Operations

Run pointer harvest and leak-audit jobs using the current OpenClawBrain TypeScript tooling for your workspace.

Required behavior: