1Password
Secure credential management
The Fastest Way: HeraClaw Cloud β‘
Skip the 1Password CLI setup, service account configuration, and vault permission management. HeraClaw Cloud comes with 1Password integration pre-configured and ready to use in 60 seconds.
Why HeraClaw Cloud for 1Password?
β Ready in 60 seconds - No 1Password CLI installation, no service account creation, no op://reference syntax β Secure by design - No master password exposure, no service account tokens in config files β Works immediately - Access secrets, credentials, and vault items from day one β Professional support - If anything breaks, we fix it for you β Always updated - We handle 1Password API changes and CLI updates automatically β Zero maintenance - No token rotation, no permission debugging, no vault access issues
How it works:
- Sign up at cloud.getopenclaw.ai (takes 60 seconds)
- Go to Integrations β 1Password
- Click 'Connect to 1Password'
- Authorize HeraClaw to access your vaults
- Done! Ask your AI assistant to retrieve credentials, rotate secrets, or audit access
Get Started: Start with HeraClaw Cloud β
Complete Guide to OpenClaw + 1Password
1Password is the gold standard for secrets management, trusted by over 100,000 businesses worldwide. With enterprise-grade security, intuitive vault organization, and powerful programmatic access, it's where modern teams store API keys, database credentials, SSH keys, and sensitive configuration.
OpenClaw's 1Password integration brings intelligent secrets management directly into your AI assistant workflow. No more context-switching between terminal, 1Password app, and your IDE. Ask your assistant to retrieve credentials, rotate API keys, audit access logs, or inject environment variablesβall with enterprise security and compliance built in.
Why Use 1Password with OpenClaw?
1Password's architecture makes it one of the most secure and versatile platforms for secrets management. Here's why the OpenClaw + 1Password combination is transformative:
1. Zero-Knowledge Security with AI Convenience
The holy grail: 1Password's zero-knowledge security model meets AI assistant convenience.
- No master password in config: HeraClaw Cloud never stores your master password or service account tokens
- Encrypted vault access: All secrets remain encrypted at rest, decrypted only when needed
- Secure credential retrieval: AI assistant can fetch credentials without exposing them in chat logs
- Audit trail: Every access logged with who, what, when, where
- Principle of least privilege: Grant assistant access only to specific vaults or items
- Temporary access: Time-limited credentials for contractors or deployments
This is a game-changer for DevOps teams: get secrets when you need them, without compromising security or adding friction.
2. Natural Language Secret Retrieval
Forget op://vault/item/field syntax. Just ask:
@OpenClaw get the GitHub API token for the production deployment@OpenClaw what's the AWS access key for the staging environment?@OpenClaw retrieve the database password for the analytics-db vault@OpenClaw show me all API keys that expire this monthYour assistant understands context, vault names, and item descriptions. It finds the right secret even with fuzzy queries.
3. Smart Environment Variable Injection
1Password's biggest pain point solved: environment variable management.
Traditional way:
# Step 1: Open 1Password app# Step 2: Find vault β item β field# Step 3: Copy secret# Step 4: Paste in terminal (exposed in history!)# Step 5: Repeat for 15 more env varsexport DATABASE_URL="postgresql://..."export STRIPE_API_KEY="sk_live_..."export SENDGRID_API_KEY="SG..."# etc.With OpenClaw:
@OpenClaw load environment variables for the production deploymentThe assistant:
- Identifies required secrets from your
.env.exampleor deployment config - Fetches from appropriate 1Password vaults
- Injects into your shell session or CI/CD pipeline
- Never exposes secrets in terminal history
- Logs access for compliance
Environment setup goes from 10 minutes to 10 seconds.
4. Automated Credential Rotation
Security best practice is rotating credentials every 90 days. Reality: teams rotate once a year (if ever) because it's painful.
OpenClaw automates it:
@OpenClaw rotate the Stripe API key and update all services@OpenClaw generate a new database password and update the connection strings@OpenClaw audit all API keys older than 90 days and create rotation tasksThe assistant:
- Generates new secure credentials (cryptographically random)
- Updates 1Password vault items
- Updates services that use the credential (via API or config files)
- Notifies team members of changes
- Logs rotation in audit trail
What used to take 2 hours now takes 30 seconds.
5. Team Vault Intelligence
1Password teams often have 20+ vaults (Engineering, DevOps, Marketing, Sales, etc.). Finding the right secret is hard.
OpenClaw provides vault intelligence:
- Smart search: "Find all AWS credentials" (searches across all accessible vaults)
- Duplicate detection: "Are there multiple Stripe API keys?" (finds duplicates across vaults)
- Access review: "Who has access to the production database password?" (lists users/teams)
- Expiration tracking: "What secrets expire in the next 30 days?" (proactive rotation)
- Vault organization: "Move this API key from Engineering to DevOps vault" (maintains structure)
Your 1Password organization stays clean and auditable.
6. Compliance and Audit Support
SOC 2, ISO 27001, and other compliance frameworks require:
- Audit logs of secret access
- Proof of credential rotation
- Access review documentation
- Incident response for leaked credentials
1Password provides the infrastructure. OpenClaw makes it actionable:
@OpenClaw generate an access audit report for the last quarter@OpenClaw who accessed the production API keys in January?@OpenClaw verify all team members have unique passwords (no sharing)@OpenClaw create an incident response plan for the leaked GitHub tokenCompliance audits go from weeks of spreadsheet work to minutes of AI-generated reports.
7. Emergency Access and Break-Glass Scenarios
It's 3 AM. Production is down. You need the database password. The engineer who knows it is on vacation.
Traditional emergency access:
- Find the 1Password emergency kit (is it up to date?)
- Locate the vault (which one?)
- Hope you have permission
- Hope the credential hasn't rotated
- Risk exposing it in terminal history
With OpenClaw:
@OpenClaw emergency: get production database credentialsThe assistant:
- Logs the emergency access (compliance!)
- Retrieves the credential securely
- Notifies security team (break-glass triggered)
- Provides credential without terminal exposure
- Creates follow-up task to rotate credential after incident
Mean time to resolution (MTTR) drops from 30 minutes to 30 seconds.
8. Developer Onboarding and Offboarding
Onboarding new developers:
Traditional process:
- Send 1Password invite (wait for acceptance)
- Grant vault access (which vaults?)
- Manually send setup instructions
- Answer 20 questions about "where is X?"
- Takes 2-3 days to be productive
With OpenClaw:
@OpenClaw onboard new developer sarah@company.com to the Engineering teamThe assistant:
- Sends 1Password invite
- Grants standard vault access (Engineering, Staging, Tools)
- Sends personalized onboarding doc with credential locations
- Logs the access grant for compliance
- New developer productive on day one
Offboarding:
When someone leaves, you need to:
- Remove 1Password access (done)
- Rotate all secrets they accessed (almost never doneβhuge security risk)
@OpenClaw offboard john@company.com and rotate all accessed credentialsThe assistant:
- Reviews audit log for all secrets John accessed
- Generates rotation plan (prioritizes production secrets)
- Executes rotation with team approval
- Logs the offboarding for compliance
What should take 4 hours now takes 15 minutes.
Real-World Use Cases
1. DevOps: Environment Variable Lookup for Deployments
Scenario: Your DevOps team deploys microservices to staging and production daily. Each service needs 10-15 environment variables (database URLs, API keys, feature flags). Engineers spend 10-15 minutes per deployment copying credentials from 1Password.
How OpenClaw helps:
Integrate 1Password with your deployment pipeline:
# Traditional way (manual, error-prone)op item get "Production Database" --fields passwordop item get "Stripe API Key" --fields credential# ... repeat 15 times, paste into .env# With OpenClaw@OpenClaw load environment variables for product-api production deploymentThe assistant:
- Reads your service's
.env.exampleor deployment manifest - Identifies required secrets (DATABASE_URL, STRIPE_KEY, etc.)
- Maps each to the correct 1Password vault and item
- Retrieves all secrets in one operation
- Injects into deployment pipeline (Kubernetes secrets, Docker env, etc.)
- Logs access for audit trail
- Never exposes secrets in terminal history or chat logs
Example conversation:
You: @OpenClaw deploy product-api to production
Assistant:
Deploying product-api to production...β Retrieved 12 secrets from 1Password: - Production/Database (DATABASE_URL) - Production/Stripe (STRIPE_API_KEY, STRIPE_WEBHOOK_SECRET) - Production/SendGrid (SENDGRID_API_KEY) - Production/AWS (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY) - Production/Redis (REDIS_URL) - Shared/OpenAI (OPENAI_API_KEY) - Production/GitHub (GITHUB_TOKEN) - Production/Sentry (SENTRY_DSN) - Production/Feature Flags (LAUNCH_DARKLY_KEY)β Injected into Kubernetes secret: product-api-prodβ Deployment rolling out (0/3 pods ready)β Deployment complete (3/3 pods ready)Production deployment successful!Audit log: https://1password.com/logs/deployment-abc123Impact:
- Deployment time drops from 15 minutes to 2 minutes
- Zero credential exposure in terminal history
- Full audit trail for compliance
- No more "which vault was that in?" questions
- Junior engineers can deploy confidently (no master password needed)
Advanced: CI/CD Integration
Integrate with GitHub Actions, GitLab CI, or Jenkins:
# .github/workflows/deploy.yml- name: Load secrets from 1Password run: | openclaw ask "Load production secrets for ${{ github.event.repository.name }}"The assistant injects secrets directly into CI/CD environment variables. No more hardcoded secrets in CI config.
2. Developer: API Key Retrieval During Development
Scenario: Your developers need API keys for Stripe, SendGrid, OpenAI, AWS, and 10 other services. They're constantly switching between projects, each with different keys (dev, staging, production). Opening 1Password, finding the vault, copying the key interrupts flow state.
How OpenClaw helps:
Developers stay in their terminal and editor:
# Working on user-service (needs Stripe)@OpenClaw get the Stripe test API key# Switching to email-service (needs SendGrid)@OpenClaw get SendGrid API key for staging# Debugging production issue (needs prod credentials)@OpenClaw get production database passwordThe assistant:
- Understands context ("test" vs "staging" vs "production")
- Knows which vault stores which service's credentials
- Retrieves securely without opening GUI
- Logs access (compliance!)
- Can inject directly into .env file or shell session
Example conversation:
You: @OpenClaw I'm working on the checkout flow, what credentials do I need?
Assistant:
For the checkout flow, you'll need:1. Stripe API Keys: - Test mode: sk_test_... (from Development/Stripe) - Webhook secret: whsec_... (from Development/Stripe)2. Database: - Staging DB: postgresql://... (from Development/Databases)3. Optional: - Sentry DSN for error tracking (from Development/Monitoring) - Feature flags (from Development/LaunchDarkly)Would you like me to:a) Load all into your .env fileb) Export to shell sessionc) Just show the valuesYou: a) load into .env
Assistant:
β Created .env.local with 6 secretsβ Added to .gitignore (safety check)β Ready to start development!Reminder: These are TEST credentials. Production keys are in Production vault.Impact:
- Context-switching eliminated (no more 1Password app interruptions)
- Faster development setup (new project ready in 30 seconds)
- Reduced mistakes (no more copy-pasting production key into dev .env)
- Improved security (credentials never in clipboard or terminal history)
- Better compliance (every retrieval logged)
3. Security Team: Credential Rotation and Audit
Scenario: Your security team needs to rotate credentials quarterly (SOC 2 requirement). Tracking which credentials need rotation, executing the rotation, and updating all services is a manual, error-prone process that takes days.
How OpenClaw helps:
Automate the entire rotation lifecycle:
Step 1: Identify credentials needing rotation
@OpenClaw audit all credentials and identify those older than 90 daysAssistant:
Credential Audit Report (Last 90 Days)β οΈ OVERDUE ROTATION (>90 days):1. Production/AWS (aws-root-access-key) - 127 days old2. Production/Stripe (stripe-live-api-key) - 103 days old3. Production/Database (postgres-admin-password) - 98 days old4. Production/GitHub (github-deploy-token) - 94 days oldβ COMPLIANT (<90 days):- Development/* (all keys <30 days)- Production/SendGrid (62 days)- Production/OpenAI (45 days)π Summary:- Total credentials: 47- Need rotation: 4 (9%)- Compliant: 43 (91%)- High risk: 2 (AWS root, Database admin)Recommendation: Rotate high-risk credentials immediately.Generate rotation plan? (yes/no)Step 2: Generate rotation plan
You: yes
Assistant:
Credential Rotation Planπ΄ PRIORITY 1 (Production Impact):1. AWS Root Access Key - Current: AKIA...OLD (127 days) - Services affected: * Terraform state backend (S3) * CI/CD deployments (GitHub Actions) * Infrastructure monitoring (CloudWatch) - Rotation steps: a) Generate new IAM key b) Update GitHub Actions secrets c) Update Terraform Cloud workspace d) Test deployment pipeline e) Deactivate old key (24hr grace period) - Estimated time: 45 minutes - Risk: Medium (deployments blocked if misconfigured) - Recommended: Friday 2pm (low traffic)2. Production Database Password - Current: [REDACTED] (98 days) - Services affected: * product-api (Kubernetes) * analytics-worker (Kubernetes) * admin-dashboard (Vercel) - Rotation steps: a) Generate new password (32 chars, high entropy) b) Update 1Password item c) Update Kubernetes secrets (3 services) d) Rolling restart pods (zero downtime) e) Verify connectivity - Estimated time: 20 minutes - Risk: Low (rolling restart, zero downtime) - Recommended: Any time[...continues for all 4 credentials...]Total time: ~2 hoursCan be parallelized: ~45 minutes with teamShall I create tasks in Linear/Jira? (yes/no)Step 3: Execute rotation (with approval)
You: @OpenClaw rotate the production database password
Assistant:
π Credential Rotation: Production Database Passwordβ οΈ This will affect 3 production services.β οΈ Requires approval from Security Team.Rotation plan:1. Generate new password (32 chars, bcrypt-compatible)2. Update 1Password: Production/Database/postgres-admin-password3. Update Kubernetes secrets: - product-api-prod - analytics-worker-prod - admin-dashboard-prod4. Rolling restart (zero downtime)5. Verify connections6. Notify #engineering channelApprove? Type ROTATE to confirm:You: ROTATE
Assistant:
β Generated new password: [REDACTED]β Updated 1Password (Production/Database)β Updated Kubernetes secret: product-api-prodβ Updated Kubernetes secret: analytics-worker-prod β Updated Kubernetes secret: admin-dashboard-prodβ Rolling restart: product-api (3/3 pods healthy)β Rolling restart: analytics-worker (2/2 pods healthy)β Rolling restart: admin-dashboard (redeploying...)β Connection test: All services connected successfullyβ Notified #engineering (3 people online)Rotation complete! Old password deactivated: No (24hr grace period)Audit log: https://1password.com/logs/rotation-xyz789Next rotation due: July 10, 2026 (90 days)Impact:
- Rotation time: 2 hours β 5 minutes (96% faster)
- Human errors eliminated (automated testing and rollback)
- Compliance improved (every rotation logged, dated, auditable)
- Team coordination simplified (assistant handles notifications)
- Zero downtime rotations (rolling restarts, health checks)
Advanced: Scheduled Rotations
Set up automatic rotation schedules:
@OpenClaw schedule automatic rotation for all production credentials every 60 daysThe assistant will:
- Create calendar reminders 7 days before rotation
- Generate rotation plan automatically
- Request approval before executing
- Execute rotation during maintenance windows
- Notify team of completion
4. Team Lead: Team Vault Organization
Scenario: Your engineering team has grown from 5 to 50 people. Your 1Password organization is chaos: duplicated credentials, unclear naming, overlapping vault permissions, orphaned items. New hires can't find credentials. Security can't audit access.
How OpenClaw helps:
AI-powered vault organization and cleanup:
Step 1: Audit current state
@OpenClaw audit our 1Password organization and identify issuesAssistant:
1Password Organization Auditπ Overview:- Vaults: 23- Items: 487- Users: 52- Teams: 8β οΈ ISSUES FOUND:1. Duplicate Credentials (12 found): - "Stripe API Key" in Engineering, DevOps, and Production vaults - "AWS Access Key" in Engineering and Infrastructure vaults - "GitHub Token" in Engineering and Deployment vaults - [9 more...]2. Unclear Naming (34 items): - "Password" (which password?) - "API Key" (which API?) - "Token" (which token?) - "Database" (which database?)3. Over-Permissioned Access (6 users): - john@company.com has access to 18/23 vaults (should be ~5) - sarah@company.com has access to 15/23 vaults - [4 more...]4. Orphaned Items (8 found): - "Heroku API Key" (Heroku account closed 2 years ago) - "Mailgun Password" (migrated to SendGrid) - [6 more...]5. Weak Passwords (3 found): - Production/Legacy App (password: "admin123") - Development/Test DB (password: "password") - [1 more...]6. Missing Metadata (47 items): - No URL field - No description - No tagsπ― Recommendations:1. Consolidate duplicates β Single source of truth2. Rename unclear items β Standardized naming3. Review access permissions β Principle of least privilege4. Archive orphaned items β Reduce clutter5. Rotate weak passwords β Security compliance6. Add metadata β Improve searchabilityShall I create a cleanup plan? (yes/no)Step 2: Generate cleanup plan
You: yes
Assistant:
Vault Cleanup Planπ PHASE 1: Consolidate Duplicates (Est: 30 min)Stripe API Keys:- Keep: Production/Stripe/api-key-live (most recent, properly tagged)- Merge from: Engineering/stripe-key, DevOps/stripe-api- Action: Update references, archive old items- Risk: Low (testing before deletion)AWS Access Keys:- Keep: Production/AWS/root-access-key- Merge from: Engineering/aws-key, Infrastructure/aws-access - Action: Verify all are same key, archive duplicates- Risk: Low (read-only verification)[...10 more duplicates...]π PHASE 2: Standardize Naming (Est: 45 min)Naming convention:- Format: [Service] [Environment] [Type]- Examples: * "AWS Production Access Key" * "Stripe Test API Key" * "PostgreSQL Staging Password"Renames needed:- "Password" β "PostgreSQL Production Admin Password"- "API Key" β "SendGrid Production API Key"- "Token" β "GitHub Production Deploy Token"[...31 more...]π PHASE 3: Right-Size Permissions (Est: 1 hour)User: john@company.com (Frontend Engineer)- Current access: 18 vaults- Needed access: 4 vaults (Engineering, Development, Staging, Shared)- Remove: Production, Infrastructure, DevOps, Sales, Marketing, [9 more]- Justification: Frontend engineers don't need production DB access[...5 more users...]π PHASE 4: Archive Orphaned Items (Est: 15 min)- Heroku API Key β Archive (migrated to Vercel 2 years ago)- Mailgun Password β Archive (migrated to SendGrid)[...6 more...]π PHASE 5: Rotate Weak Passwords (Est: 30 min)- Production/Legacy App ("admin123") β Generate secure password, update app- Development/Test DB ("password") β Generate secure password, update config[...1 more...]π PHASE 6: Enrich Metadata (Est: 1 hour)Add to all 47 items:- URL: Service login page- Description: What this credential is for- Tags: service-name, environment, team- Notes: Rotation schedule, owner, dependenciesβ±οΈ TOTAL TIME: ~4 hours (can be done over 1 week)π― OUTCOME:- Organized vaults (clear naming, no duplicates)- Right-sized permissions (security improved)- Updated credentials (no weak passwords)- Searchable metadata (new hires can find things)Shall I create tasks in Linear/Jira? (yes/no)Or execute automatically with approval? (auto/manual)Step 3: Execute cleanup (semi-automated)
You: auto
Assistant:
π€ Starting automated cleanup with approval gates...β Phase 1: Duplicate Consolidation β Verified Stripe keys are identical (hash match) β Updated 3 service configs to use Production/Stripe/api-key-live β Archived Engineering/stripe-key β Archived DevOps/stripe-api [Progress: 2/12 duplicates consolidated]β οΈ APPROVAL NEEDED: AWS Access Key Consolidation Found 3 AWS keys. Only 2 are identical. - Production/AWS/root-access-key (AKIA...ABC) - Engineering/aws-key (AKIA...ABC) [duplicate] - Infrastructure/aws-access (AKIA...XYZ) [DIFFERENT!] Recommendation: Keep both unique keys, archive duplicate. Approve? (yes/no/skip)You: yes
[...process continues with approval gates for risky changes...]
Final result:
β
Cleanup Complete!Results:β Consolidated 12 duplicates β 0 duplicatesβ Renamed 34 items β Standardized namingβ Adjusted permissions for 6 users β Right-sizedβ Archived 8 orphaned items β Removed clutterβ Rotated 3 weak passwords β Security improvedβ Enriched 47 items with metadata β SearchableBefore β After:- Items: 487 β 479 (8 archived)- Duplicates: 12 β 0- Unclear names: 34 β 0- Over-permissioned users: 6 β 0- Weak passwords: 3 β 0- Missing metadata: 47 β 0π Health Score: 62% β 98%Audit log: https://1password.com/logs/cleanup-202604Next review: July 1, 2026 (quarterly)Impact:
- Organization time: 2 weeks β 4 hours
- Security posture improved (no duplicates, no weak passwords)
- Compliance simplified (clear audit trail, proper permissions)
- New hire onboarding faster (can find credentials)
- Team productivity up (less time searching for secrets)
5. SRE: On-Call Emergency Access
Scenario: It's 2:47 AM. PagerDuty alerts: production database is down. You're the on-call SRE. You need the database admin password immediately. Problem: it's in 1Password, but you don't remember which vault, which item, or if you even have access.
How OpenClaw helps:
Emergency access with full audit trail:
Traditional emergency access:
- Wake up to PagerDuty (2:47 AM)
- Open 1Password app (if you remember master password)
- Search "database" (23 results, which one?)
- Try "production database" (3 vaults, which one?)
- Find the item (4:52 AM - 5 minutes wasted)
- Copy password (exposed in clipboard)
- Paste in terminal (exposed in shell history)
- Fix issue (5:15 AM)
- Forget to notify security team (compliance violation)
Total: 28 minutes to get credentials
With OpenClaw:
- Wake up to PagerDuty (2:47 AM)
- Open terminal:
@OpenClaw emergency: production database password - Receive credential (2:48 AM - 30 seconds)
- Fix issue (2:55 AM)
- Auto-notification sent to security team
Total: 30 seconds to get credentials
Example conversation:
You: @OpenClaw EMERGENCY: production database is down, need admin password NOW
Assistant:
π¨ EMERGENCY ACCESS ACTIVATEDCredential: Production PostgreSQL Admin PasswordVault: Production/DatabaseItem: postgres-admin-passwordπ Password: [REDACTED - click to reveal]π Connection details:- Host: prod-db.internal.company.com- Port: 5432- Username: admin- Database: productionβ‘ Quick actions:- [Copy password to clipboard]- [Open SSH session]- [Check database status]- [View recent logs]β οΈ Emergency access logged:- User: you@company.com- Time: 2:47 AM PST- Reason: PagerDuty alert #12345- Notified: #security-alerts, #on-callπ Post-incident:- Rotate this credential within 24 hours (security policy)- Document incident in postmortem- Review why on-call didn't have accessNeed help debugging? I can:- Check database logs- List active connections- Show recent queries- Verify backup statusYou click "Copy password to clipboard" and fix the issue.
After the incident (6:30 AM):
You: @OpenClaw create a postmortem for last night's database incident
Assistant:
Incident Postmortem Templateπ Incident Summary:- Date: April 10, 2026- Time: 2:47 AM - 2:55 AM PST (8 minutes)- Severity: P1 (Production database down)- Impact: All API requests failing (100% error rate)- MTTR: 8 minutesπ Timeline:- 2:47 AM: PagerDuty alert triggered- 2:48 AM: On-call accessed credentials via OpenClaw- 2:50 AM: Diagnosed issue (connection pool exhausted)- 2:52 AM: Restarted connection pool- 2:55 AM: Service recovered, monitoringβ
What Went Well:- Fast credential access (30 seconds vs typical 5+ minutes)- Clear audit trail (security compliance)- Automated notifications (security team alerted)β What Went Wrong:- On-call engineer didn't know which vault had credentials- No runbook linked from PagerDuty- Connection pool issue should have alerted earlierπ§ Action Items:- [ ] Update PagerDuty runbook with credential location- [ ] Add connection pool monitoring alert- [ ] Grant all on-call engineers emergency access to Production vault- [ ] Schedule credential rotation (24hr policy after emergency access)- [ ] Review connection pool settingsπ Metrics:- Detection time: <1 minute- Response time: 1 minute- Resolution time: 8 minutes- Total downtime: 8 minutesPostmortem created: [Link to Google Doc]Shared with: #engineering, #leadership, #securityImpact:
- MTTR improved: 28 minutes β 8 minutes (71% faster)
- Security maintained: Full audit trail despite emergency
- Compliance preserved: Auto-notification, credential rotation scheduled
- Postmortem automated: 30 minutes of writing β 2 minutes
- Process improved: Action items identified immediately
6. Contractor Management: Temporary Credential Access
Scenario: You hired a contractor to build a new feature. They need access to staging database, Stripe test API, and GitHub for 6 weeks. Problem: you don't want to give them permanent access, but manually removing access after the contract ends is always forgotten (security risk).
How OpenClaw helps:
Time-limited credential access with automatic cleanup:
Step 1: Grant temporary access
@OpenClaw grant contractor alex@contractor.com access to staging environment for 6 weeksAssistant:
π« Temporary Access RequestContractor: alex@contractor.comDuration: 6 weeks (expires June 22, 2026)Environment: Stagingπ Access Plan:1Password Vaults:β Grant access to: - Staging/Database (read-only credentials) - Staging/Stripe (test API keys) - Staging/GitHub (deploy tokens) β Block access to: - Production/* (all vaults) - Development/* (internal only) - Infrastructure/* (not needed)Specific Items:β PostgreSQL Staging Password (read-only user)β Stripe Test API Keyβ GitHub Staging Deploy Tokenβ Stripe Live API Key (blocked)β Production Database (blocked)β° Automatic Actions:- June 22, 2026: Remove all access- June 15, 2026: Reminder to manager (1 week warning)- June 22, 2026: Rotate accessed credentials (security policy)- June 22, 2026: Notify #security teamπ§ Onboarding:- Send 1Password invite to alex@contractor.com- Send staging environment setup guide- Add to #contractors Slack channel- Add to staging Vercel team (limited access)β οΈ Security:- Audit log: Track all accessed items- Weekly access review: Report to manager- Expire credentials: Auto-revoke after 6 weeksApprove? (yes/no)You: yes
Assistant:
β
Temporary Access Grantedβ Sent 1Password invite to alex@contractor.comβ Granted access to 3 staging vaultsβ Created calendar reminder for June 15 (1-week warning)β Created calendar reminder for June 22 (auto-revoke)β Sent onboarding email with setup guideβ Added to #contractors channelβ Logged in audit trailContractor can start work immediately.Access expires: June 22, 2026 (automatic)Tracking: https://app.cloud.getopenclaw.ai/access/contractor-alex-202604Step 2: Weekly access review (automated)
Every Monday, you receive:
π Contractor Access Report (Week of April 14, 2026)Active Contractors: 1Contractor: alex@contractor.com- Access granted: April 10, 2026- Expires: June 22, 2026 (10 weeks remaining)- Items accessed this week: * Staging/Database/postgres-staging-ro (14 times) * Staging/Stripe/test-api-key (6 times) * Staging/GitHub/deploy-token (3 times)- Suspicious activity: None- Compliance: β All access within approved scopeβ οΈ Upcoming Expirations:- alex@contractor.com (10 weeks remaining)- No other contractorsAction needed: None (automatic cleanup scheduled)Step 3: Automatic cleanup (June 22, 2026)
At 9:00 AM on June 22:
π Automatic Access RevocationContractor: alex@contractor.comContract ended: June 22, 2026Actions completed:β Removed access to Staging/Database vaultβ Removed access to Staging/Stripe vaultβ Removed access to Staging/GitHub vaultβ Rotated PostgreSQL Staging password (accessed 89 times)β Rotated Stripe Test API key (accessed 34 times)β Rotated GitHub Deploy token (accessed 12 times)β Removed from #contractors Slack channelβ Removed from Vercel staging teamβ Notified security teamβ Generated final access reportFinal Access Report:- Total access duration: 73 days (6 weeks + 3 days)- Items accessed: 3- Total accesses: 135- Anomalies detected: 0- Security incidents: 0Audit trail: https://1password.com/reports/contractor-alex-finalContractor offboarding complete.Impact:
- Security risk eliminated: No forgotten contractor access
- Compliance improved: Full audit trail of temporary access
- Manager time saved: 2 hours of manual cleanup β 0 hours (automated)
- Credential rotation automated: Would normally be forgotten
- Clean access reports: For audits and compliance reviews
7. Compliance Officer: Audit Trail and Access Review
Scenario: Your company is undergoing SOC 2 audit. Auditors need proof of:
- Who accessed which production credentials
- Credential rotation schedule and compliance
- Access review documentation
- Incident response for leaked credentials
Manually generating these reports from 1Password audit logs takes days of spreadsheet work.
How OpenClaw helps:
AI-generated compliance reports in minutes:
Q1 2026 Access Review:
@OpenClaw generate a SOC 2 access review report for Q1 2026Assistant:
SOC 2 Access Review Report - Q1 2026Generated: April 10, 2026Period: January 1 - March 31, 2026π EXECUTIVE SUMMARYβ Compliance Status: 94% (Target: >90%)β Credential Rotation: 89% on schedule (Target: >85%)β Access Reviews: 100% completed (Target: 100%)β οΈ Policy Violations: 3 (Target: 0)---π PRODUCTION ACCESS AUDITProduction Vault Access:- Authorized users: 12- Unauthorized access attempts: 0- Emergency access events: 2 (both documented)Access by User (Production vaults only):1. john@company.com (DevOps Lead) - Accesses: 47 - Items: Production/AWS (23), Production/Database (18), Production/GitHub (6) - Anomalies: None - Last review: March 15, 2026 β2. sarah@company.com (Senior SRE) - Accesses: 34 - Items: Production/Database (28), Production/Redis (6) - Anomalies: None - Last review: March 15, 2026 β3. alex@company.com (CTO) - Accesses: 2 - Items: Production/AWS (2) [Emergency access on Jan 15] - Anomalies: None - Last review: March 15, 2026 β[...9 more users...]---π CREDENTIAL ROTATION COMPLIANCERotation Policy: Every 90 days for production credentialsCompliant (Rotated on schedule):β Production/Database/postgres-admin (Jan 15, 2026)β Production/AWS/root-access-key (Feb 3, 2026)β Production/Stripe/live-api-key (Feb 20, 2026)β Production/GitHub/deploy-token (Mar 8, 2026)β Production/SendGrid/api-key (Mar 22, 2026)[...12 more...]Overdue (Need rotation):β οΈ Production/Redis/password (Last rotated: Oct 10, 2025 - 182 days ago)β οΈ Production/OpenAI/api-key (Last rotated: Nov 5, 2025 - 156 days ago)Scheduled (Next 30 days):π
Production/Database/postgres-admin (Due: Apr 15, 2026)π
Production/AWS/root-access-key (Due: May 3, 2026)Compliance Rate: 89% (17/19 credentials on schedule)---β οΈ POLICY VIOLATIONS1. Shared Credential Usage (Policy: No sharing) - Incident: "Stripe Live API Key" accessed from 3 different IP addresses simultaneously - Date: February 12, 2026 - Users: john@company.com, sarah@company.com, mike@company.com - Resolution: Reminded team of policy, rotated credential - Status: Resolved β2. Weak Password Detected (Policy: Minimum 16 chars, high entropy) - Item: Production/Legacy App/admin-password - Password: "admin123" (detected Jan 20, 2026) - Resolution: Rotated to secure password Jan 22, 2026 - Status: Resolved β3. Overdue Rotation (Policy: Max 90 days) - Item: Production/Redis/password - Last rotation: Oct 10, 2025 (182 days ago) - Resolution: Rotation scheduled for Apr 12, 2026 - Status: In Progress π---π¨ EMERGENCY ACCESS EVENTS1. Database Incident (January 15, 2026) - User: alex@company.com (CTO) - Credential: Production/Database/postgres-admin - Reason: PagerDuty P1 (database connection pool exhausted) - Time: 2:47 AM PST - Duration: 8 minutes - Post-incident: Credential rotated within 24 hours β - Postmortem: https://docs.company.com/incidents/2026-01-152. AWS Incident (March 8, 2026) - User: sarah@company.com (Senior SRE) - Credential: Production/AWS/root-access-key - Reason: S3 bucket misconfiguration (public exposure detected) - Time: 10:23 AM PST - Duration: 15 minutes - Post-incident: Credential rotated within 24 hours β - Postmortem: https://docs.company.com/incidents/2026-03-08Emergency Access Compliance: 100% (both events documented, credentials rotated)---π₯ ACCESS REVIEW DOCUMENTATIONQuarterly access review completed: March 15, 2026Reviewer: alex@company.com (CTO)Approver: board@company.com (Board of Directors)Review Results:β All production access justified and approvedβ No orphaned accounts (all users active)β No over-privileged users (principle of least privilege verified)β Contractor access properly time-limited (1 active contractor)Access Changes:- Removed: mike@company.com from Production/Marketing (role change)- Added: jane@company.com to Production/Database (new SRE hire)- No other changes---π METRICS| Metric | Q1 2026 | Q4 2025 | Trend ||--------|---------|---------|-------|| Production accesses | 183 | 156 | β 17% || Emergency accesses | 2 | 1 | β 100% || Rotation compliance | 89% | 94% | β 5% || Policy violations | 3 | 1 | β 200% || Access reviews completed | 100% | 100% | β || Avg. credential age | 45 days | 38 days | β 18% |Recommendations:1. Rotate overdue credentials immediately (Redis, OpenAI)2. Investigate increase in policy violations (training needed?)3. Review emergency access procedures (2 incidents in Q1)4. Consider automated rotation for all production credentials---β
AUDITOR ATTESTATIONThis report satisfies SOC 2 requirements:- CC6.1: Logical and physical access controls β- CC6.2: Prior to issuing credentials, registration and authorization β- CC6.3: Removals and modifications of access β- CC7.2: Detection of security events βAudit Trail: https://1password.com/reports/q1-2026-access-reviewGenerated by: OpenClaw AI (verified by alex@company.com)Next Review: July 1, 2026 (Q2 2026)---Export options:- [Download as PDF]- [Export to Excel]- [Share with auditor]- [Create remediation tasks]Impact:
- Report generation time: 3 days β 5 minutes (99% faster)
- Auditor satisfaction: Higher (comprehensive, automated, real-time)
- Compliance violations detected: 3 (would have been missed manually)
- Remediation tracking: Automated tasks created
- Board reporting: Professional, data-driven reports
8. DevOps Lead: Secret Sprawl Prevention
Scenario: Your engineering team keeps accidentally committing secrets to Git (API keys in .env files, passwords in config files). You've set up pre-commit hooks, but developers bypass them with --no-verify. Secrets keep leaking to public repos.
How OpenClaw helps:
Prevent secret sprawl with AI-powered secret detection and remediation:
Step 1: Detect secret sprawl
@OpenClaw scan our codebase for hardcoded secrets and credentialsAssistant:
π Secret Sprawl Scan ResultsScanned:- Repositories: 23- Files: 4,782- Lines of code: 287,493β οΈ SECRETS FOUND: 12π¨ HIGH RISK (Public repos):1. product-api/config/database.yml - Secret: PostgreSQL password (production) - Value: "prod_db_pass_2024" (hardcoded) - Line: 12 - Risk: High (public repo, 47 commits since added) - Added by: john@company.com on Feb 3, 2026 - 1Password equivalent: Production/Database/postgres-admin - Recommendation: Rotate immediately, use 1Password reference2. frontend-app/.env.production - Secret: Stripe Live API Key - Value: sk_live_51A... (exposed) - Line: 8 - Risk: Critical (public repo, commit to main) - Added by: sarah@company.com on Mar 15, 2026 - 1Password equivalent: Production/Stripe/live-api-key - Recommendation: Rotate immediately, revoke in Stripe dashboardβ οΈ MEDIUM RISK (Private repos):3. analytics-worker/src/config.ts - Secret: OpenAI API Key - Value: sk-proj-... (hardcoded) - Line: 45 - Risk: Medium (private repo, but accessible to all engineers) - Added by: mike@company.com on Jan 20, 2026 - 1Password equivalent: Production/OpenAI/api-key - Recommendation: Use 1Password reference[...9 more secrets...]π Summary:- Critical: 2 (public repos, need immediate rotation)- High: 3 (production secrets, hardcoded)- Medium: 7 (dev secrets, should use 1Password)- Total exposed secrets: 12- Estimated blast radius: 47 commits, 12 developersπ§ Remediation Plan:1. Rotate critical secrets immediately (2 items)2. Replace hardcoded secrets with 1Password references (12 items)3. Add pre-commit hooks (prevent future leaks)4. Train team on 1Password CLI usage5. Monitor for future secret commits (GitHub Actions)Shall I create remediation tasks? (yes/no)Or execute automatic remediation? (auto/manual)Step 2: Automatic remediation
You: auto
Assistant:
π€ Automatic Secret Remediationβ‘ PHASE 1: Rotate Critical Secrets1. PostgreSQL Production Password: β Generated new password (32 chars, high entropy) β Updated 1Password: Production/Database/postgres-admin β Updated Kubernetes secrets (3 services) β Tested connections (all healthy) β Notified #engineering2. Stripe Live API Key: β Created new Stripe API key via API β Updated 1Password: Production/Stripe/live-api-key β Updated frontend-app environment variables (Vercel) β Revoked old key in Stripe dashboard β Tested payment processing (working) β Notified #engineering and #securityβ‘ PHASE 2: Replace Hardcoded SecretsReplacing hardcoded secrets with 1Password references...Before (product-api/config/database.yml):```yamlproduction: password: "prod_db_pass_2024"After:
production: password: op://Production/Database/postgres-adminChanges: β product-api/config/database.yml (1 secret) β frontend-app/.env.production (1 secret) β analytics-worker/src/config.ts (1 secret) β email-service/.env (2 secrets) β admin-dashboard/config/production.js (1 secret) [...6 more files...]
β‘ PHASE 3: Add Pre-Commit Hooks
β Created .pre-commit-config.yaml β Added detect-secrets hook β Added 1Password reference validator β Configured to block commits with hardcoded secrets β Added to all 23 repositories
β‘ PHASE 4: GitHub Actions Monitoring
β Created secret-detection.yml workflow β Scans all commits for leaked secrets β Notifies #security if secrets detected β Auto-creates remediation issues β Deployed to all repositories
β‘ PHASE 5: Team Training
β Created documentation: docs/secrets-management.md β Scheduled training session (April 15, 2pm) β Sent Slack message to #engineering:
π Secret Management Update
We've detected and remediated 12 hardcoded secrets in our codebase.
Going forward:
- Use 1Password CLI:
op read "op://vault/item/field" - Use 1Password references in config files
- Pre-commit hooks will block hardcoded secrets
- GitHub Actions will alert on leaked secrets
Training: April 15, 2pm (calendar invite sent) Docs: https://docs.company.com/secrets-management
Questions? Ask in #security or DM alex@company.com
β Remediation Complete!
Results: β Rotated 2 critical secrets β Replaced 12 hardcoded secrets with 1Password references β Added pre-commit hooks to 23 repositories β Deployed GitHub Actions monitoring β Scheduled team training
Security posture improved:
- Before: 12 exposed secrets
- After: 0 exposed secrets
- Future prevention: Pre-commit hooks + monitoring
Audit trail: https://1password.com/reports/remediation-202604 Next scan: April 17, 2026 (weekly)
**Impact:**- Secret sprawl eliminated: 12 β 0 hardcoded secrets- Remediation time: 2 days β 30 minutes (96% faster)- Future prevention: Pre-commit hooks + monitoring- Security incidents avoided: Untold number (proactive fix)- Team education: Training and documentation created---### Features Deep Dive**Natural Language Secret Retrieval**Forget memorizing vault names, item names, and field names. Just describe what you need:@OpenClaw get the production database password @OpenClaw what's the Stripe API key for testing? @OpenClaw retrieve AWS credentials for the staging environment @OpenClaw show me all GitHub tokens
The assistant understands:- Fuzzy matching ("db password" = "database password")- Environment context ("production" vs "staging" vs "test")- Service names ("Stripe", "AWS", "GitHub")- Credential types ("password", "API key", "token")**Secure Credential Display**Credentials are displayed securely:- Redacted by default (click to reveal)- Auto-expire after 60 seconds (clipboard cleared)- Never logged in chat history- Access logged for audit trail**Environment Variable Injection**Load all secrets for a service at once:@OpenClaw load environment variables for product-api production
The assistant:1. Reads your `.env.example` or deployment config2. Maps each variable to 1Password vault items3. Retrieves all secrets in parallel4. Injects into shell session, .env file, or CI/CD5. Logs access for complianceSupported targets:- Shell session (`export VAR=value`)- .env file (creates `.env.local`)- Kubernetes secrets (updates existing secret)- Docker compose (updates docker-compose.override.yml)- CI/CD variables (GitHub Actions, GitLab CI)**Credential Rotation**Manual or automated:@OpenClaw rotate the Stripe API key @OpenClaw schedule automatic rotation for all production credentials every 90 days
Rotation process:1. Generate new credential (secure random or via API)2. Update 1Password item3. Update all services using the credential4. Test connectivity5. Deactivate old credential (24hr grace period)6. Notify team7. Log rotation**Vault Search and Organization**Find secrets across all vaults:@OpenClaw search for "stripe" across all vaults @OpenClaw find duplicate API keys @OpenClaw list all credentials that expire this month @OpenClaw organize vault items by service and environment
**Access Audit and Review**Generate compliance reports:@OpenClaw who accessed production secrets last week? @OpenClaw generate SOC 2 access review for Q1 2026 @OpenClaw audit credential rotation compliance @OpenClaw create an access report for the security team
**Emergency Access**Break-glass scenarios:@OpenClaw EMERGENCY: production database password
Emergency access:- Logs access with reason (compliance)- Notifies security team- Provides credential without clipboard exposure- Creates follow-up task to rotate credential- Generates incident timeline**Team Management**Onboard and offboard users:@OpenClaw onboard new engineer sarah@company.com @OpenClaw offboard contractor john@contractor.com and rotate accessed credentials @OpenClaw grant temporary access to staging vaults for 2 weeks
**Secret Sprawl Detection**Scan code for hardcoded secrets:@OpenClaw scan codebase for hardcoded secrets @OpenClaw detect leaked credentials in Git history @OpenClaw replace hardcoded secrets with 1Password references
**1Password CLI Integration**For advanced users, the assistant can execute 1Password CLI commands:@OpenClaw run: op item list --vault Production @OpenClaw run: op item get "Stripe API Key" --fields credential @OpenClaw run: op vault list
**Service Account Management**Manage 1Password service accounts:@OpenClaw create service account for CI/CD pipeline @OpenClaw grant service account access to Deployment vault @OpenClaw rotate service account token @OpenClaw audit service account access
**Compliance Reporting**Generate reports for auditors:@OpenClaw generate SOC 2 access report @OpenClaw create ISO 27001 credential rotation report @OpenClaw export audit trail for last quarter @OpenClaw document access review process
**Incident Response**Handle leaked credentials:@OpenClaw INCIDENT: GitHub token leaked in public repo @OpenClaw create incident response plan @OpenClaw rotate all affected credentials @OpenClaw notify security team and stakeholders
---## Setup Option 1: HeraClaw Cloud (Recommended)**Time required:** 60 seconds**Technical skill:** None**Cost:** Included in HeraClaw Cloud subscription**Best for:** 95% of users, all team sizes**Why HeraClaw Cloud?**- No 1Password CLI installation required- No service account creation- No token management or rotation- No vault permission debugging- No op://reference syntax to learn- Professional support included- Automatic updates and security patches- 99.9% uptime SLA- Enterprise-grade security (SOC 2, GDPR)**Steps:****1. Sign up for HeraClaw Cloud**- Visit cloud.getopenclaw.ai- Click "Sign In" (no credit card required)- Create your account (takes 60 seconds)**2. Navigate to Integrations**- Click "Integrations" in the left sidebar- Find "1Password" in the list- Click "Connect to 1Password"**3. Authorize 1Password Access**- 1Password OAuth screen appears- Select your 1Password account- Choose which vaults to grant access to- Click "Allow"**4. Test the Integration**- In HeraClaw chat: `@OpenClaw list my 1Password vaults`- You should see your vaults listed- Try: `@OpenClaw get my GitHub API token`**That's it!** You're up and running.**What You Get with HeraClaw Cloud:**β
**Instant Setup** - No CLI installation, no service accountsβ
**Secure by Default** - No master password exposure, no token managementβ
**Automatic Updates** - We handle 1Password CLI and API changesβ
**Professional Support** - Email, chat, and phone supportβ
**99.9% Uptime** - SLA-backed reliabilityβ
**Enterprise Security** - SOC 2, GDPR, HIPAA availableβ
**Advanced Features** - Rotation automation, audit reports, compliance toolsβ
**No Maintenance** - We manage everything**Pricing:** See cloud.getopenclaw.ai/pricing (starts with affordable team plans)**Get Started:** [Start with HeraClaw Cloud β](https://cloud.getopenclaw.ai/auth/signin)---## Setup Option 2: Self-Hosted (Advanced)**Time required:** 30-45 minutes (first time), 15-20 minutes (if experienced)**Technical skill:** Intermediate to Advanced**Cost:** 1Password account + your time**Best for:** DevOps engineers, technical teams, compliance requirements**Who should self-host?**β
DevOps engineers comfortable with CLI toolsβ
Organizations with strict data residency requirementsβ
Teams already using 1Password CLIβ
Technical enthusiasts who want full controlβ
Companies that cannot use third-party SaaS**Who should NOT self-host?**β Small teams without DevOps expertiseβ Anyone who values time over cost savingsβ Teams without security expertiseβ Organizations without compliance teams**Prerequisites:**- OpenClaw installed and running (Mac/Linux/VPS)- 1Password account (Team, Business, or Enterprise)- 1Password CLI installed- Terminal access- Understanding of service accounts and OAuth### Detailed Self-Hosted Setup**Step 1: Install 1Password CLI****macOS (Homebrew):**```bashbrew install 1password-cli# Verify installationop --version# Should output: 2.x.xLinux:
# Debian/Ubuntucurl -sS https://downloads.1password.com/linux/keys/1password.asc | \ sudo gpg --dearmor --output /usr/share/keyrings/1password-archive-keyring.gpgecho "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/1password-archive-keyring.gpg] https://downloads.1password.com/linux/debian/$(dpkg --print-architecture) stable main" | \ sudo tee /etc/apt/sources.list.d/1password.listsudo apt update && sudo apt install 1password-cli# Verifyop --versionDocker:
docker run -it 1password/op:2 --versionStep 2: Create a Service Account
1Password service accounts provide programmatic access without master password.
- Go to 1Password.com
- Sign in to your account
- Go to Settings β Service Accounts (Business/Enterprise only)
- Click "Create Service Account"
- Name: "OpenClaw Integration"
- Grant access to vaults:
- β Development (read-only)
- β Staging (read-only)
- β Production (read-only if needed)
- β Sensitive vaults (HR, Finance)
- Click "Create"
- Copy the service account token (starts with
ops_) - Save it securely - you'll only see it once
Alternative: Personal Access Token (deprecated)
If you don't have service accounts:
# Sign in to 1Password CLIop account add# Follow prompts:# - Enter your 1password.com URL# - Enter your email# - Enter your Secret Key# - Enter your Master Password# Create a sessionexport OP_SESSION_my=$(op signin --raw)Step 3: Configure OpenClaw
Edit your OpenClaw config file (~/.openclaw/config.yaml):
integrations: onepassword: enabled: true # Service account token (recommended) serviceAccountToken: "ops_your_service_account_token_here" # Or use CLI session (less secure) # useSession: true # sessionEnvVar: "OP_SESSION_my" # Default vault for retrievals defaultVault: "Development" # Vaults accessible to AI assistant allowedVaults: - "Development" - "Staging" - "Production" # Only if approved by security # Block sensitive vaults blockedVaults: - "HR" - "Finance" - "Executive" # Cache retrieved secrets for N seconds (reduces API calls) cacheTTL: 300 # 5 minutes # Security: redact secrets in chat logs redactSecrets: true # Audit: log all secret accesses auditLog: true auditLogPath: "/var/log/openclaw/1password-audit.log"Step 4: Test the Integration
Start OpenClaw:
openclaw gateway start# Check logsopenclaw gateway logs --followLook for:
β 1Password CLI detected (version 2.x.x)β Service account authenticatedβ Vaults accessible: Development, Staging, Productionβ 1Password integration enabledTest retrieval:
# In OpenClaw chat@OpenClaw list my 1Password vaults# Should show:# - Development# - Staging # - Production# Try retrieving a secret@OpenClaw get the GitHub API token from Development vaultStep 5: Configure Vault Permissions
Fine-tune access control:
integrations: onepassword: # Per-vault permissions vaultPermissions: Development: read: true write: false # Read-only rotate: false Staging: read: true write: false rotate: true # Can rotate credentials Production: read: true write: false rotate: true # Require approval for access requireApproval: true approvers: - "security-team@company.com" - "cto@company.com"Step 6: Set Up Environment Variable Injection
Configure environment variable mapping:
integrations: onepassword: # Map environment variables to 1Password items envMapping: DATABASE_URL: vault: "Production" item: "PostgreSQL Production" field: "connection_string" STRIPE_API_KEY: vault: "Production" item: "Stripe Live" field: "api_key" AWS_ACCESS_KEY_ID: vault: "Production" item: "AWS Root" field: "access_key_id" AWS_SECRET_ACCESS_KEY: vault: "Production" item: "AWS Root" field: "secret_access_key"Now you can:
@OpenClaw load environment variables for production# The assistant will:# 1. Read the envMapping config# 2. Retrieve all secrets from 1Password# 3. Inject into shell session or .env fileStep 7: Enable Rotation Automation (Optional)
integrations: onepassword: rotation: enabled: true # Rotation schedule schedules: - name: "Production credentials" vault: "Production" items: - "PostgreSQL Production" - "Stripe Live" - "AWS Root" frequency: "90 days" notify: - "#security" - "devops@company.com" - name: "Staging credentials" vault: "Staging" items: "*" # All items frequency: "30 days" notify: - "#engineering" # Rotation actions postRotation: - type: "update_kubernetes" secrets: - "product-api-prod" - "analytics-worker-prod" - type: "notify_slack" channel: "#engineering" message: "Production credentials rotated"Step 8: Configure Audit Logging
integrations: onepassword: audit: enabled: true logFile: "/var/log/openclaw/1password-audit.log" # What to log logEvents: - "retrieve" # Secret retrievals - "rotate" # Credential rotations - "search" # Vault searches - "emergency" # Emergency access # Include in logs includeMetadata: user: true timestamp: true vault: true item: true field: true reason: true # Never log actual secret values redactValues: true # Compliance: export to SIEM export: enabled: true format: "json" destination: "syslog://siem.company.com:514"Audit log format:
{ "timestamp": "2026-04-10T14:23:45Z", "event": "retrieve", "user": "john@company.com", "vault": "Production", "item": "PostgreSQL Production", "field": "password", "reason": "Deployment to staging", "ip_address": "192.168.1.100", "user_agent": "OpenClaw/1.0"}Advanced Self-Hosted Configuration
Service Account Best Practices
-
Principle of Least Privilege:
- Grant access only to needed vaults
- Use read-only access when possible
- Create separate service accounts per environment
-
Token Rotation:
- Rotate service account tokens every 90 days
- Automate rotation with calendar reminders
- Store tokens in environment variables, not config files
-
Monitoring:
- Monitor service account usage
- Alert on unusual access patterns
- Review audit logs weekly
Environment Variable Security
Store service account token securely:
# Option 1: Environment variable (less secure)export OP_SERVICE_ACCOUNT_TOKEN="ops_..."# Option 2: 1Password reference (more secure, recursive!)export OP_SERVICE_ACCOUNT_TOKEN=$(op read "op://Infrastructure/OpenClaw/service_account_token")# Option 3: Kubernetes secret (for cloud deployments)kubectl create secret generic openclaw-1password \ --from-literal=token="ops_..."# Reference in config:integrations: onepassword: serviceAccountToken: ${OP_SERVICE_ACCOUNT_TOKEN}Multi-Account Setup
Manage multiple 1Password accounts:
integrations: onepassword: accounts: company: serviceAccountToken: "ops_company_token" vaults: - "Development" - "Staging" - "Production" client_acme: serviceAccountToken: "ops_acme_token" vaults: - "Acme Production" - "Acme Staging" personal: useSession: true sessionEnvVar: "OP_SESSION_personal" vaults: - "Personal"Now you can:
@OpenClaw get database password from company account@OpenClaw get API key from client_acme account @OpenClaw list vaults in personal accountCustom Field Mapping
Map custom 1Password fields:
integrations: onepassword: fieldMapping: # Standard fields (work automatically) password: ["password", "credential"] username: ["username", "email", "user"] url: ["website", "url", "link"] # Custom fields (your organization) api_key: ["api_key", "apikey", "key"] secret_key: ["secret_key", "secret"] connection_string: ["connection_string", "conn_str", "url"] ssh_key: ["ssh_private_key", "private_key"]Credential Rotation Workflows
Define custom rotation logic:
integrations: onepassword: rotationWorkflows: stripe_api_key: steps: - name: "Generate new Stripe key" action: "stripe_api_create_key" params: name: "Production API Key {{date}}" - name: "Update 1Password" action: "1password_update_item" params: vault: "Production" item: "Stripe Live" field: "api_key" value: "{{new_key}}" - name: "Update Vercel env" action: "vercel_update_env" params: project: "product-api" key: "STRIPE_API_KEY" value: "{{new_key}}" - name: "Redeploy services" action: "vercel_redeploy" params: project: "product-api" - name: "Test payment" action: "http_request" params: url: "https://api.company.com/health/stripe" expect: 200 - name: "Revoke old key" action: "stripe_api_revoke_key" params: key: "{{old_key}}" - name: "Notify team" action: "slack_message" params: channel: "#engineering" text: "Stripe API key rotated successfully"Emergency Access Configuration
Break-glass scenarios:
integrations: onepassword: emergencyAccess: enabled: true # Require keyword to trigger keyword: "EMERGENCY" # Grant temporary access to normally blocked vaults grantAccess: - "Production" - "Infrastructure" # Notifications notify: slack: - "#security-alerts" - "#engineering-alerts" email: - "security@company.com" - "cto@company.com" pagerduty: service: "security-incidents" # Post-emergency actions postAccess: - action: "create_incident_ticket" system: "jira" project: "SEC" - action: "schedule_credential_rotation" delay: "24 hours" reason: "Emergency access granted" - action: "create_postmortem" template: "emergency-access"Usage:
@OpenClaw EMERGENCY: production database password# Triggers:# 1. Grant access# 2. Log event# 3. Notify security team# 4. Create incident ticket# 5. Schedule rotationTroubleshooting Self-Hosted Setup
1Password CLI Not Found
Symptoms: Error: "1Password CLI not found"
Fix:
# Verify installationwhich op# Should output: /usr/local/bin/op (or similar)# If not found, install:brew install 1password-cli # macOS# or follow Linux installation steps above# Verify OpenClaw can find itopenclaw config test --integration onepasswordService Account Authentication Failed
Symptoms: Error: "Authentication failed" or "Invalid token"
Potential causes:
- Incorrect service account token
- Token revoked or expired
- Insufficient vault permissions
Fix:
# Test token manuallyexport OP_SERVICE_ACCOUNT_TOKEN="ops_your_token"op vault list# Should list vaults. If error:# - Verify token is correct (copy-paste error?)# - Check token hasn't been revoked in 1Password settings# - Verify token has access to at least one vault# Update OpenClaw config with correct tokenvim ~/.openclaw/config.yaml# Update serviceAccountToken field# Restart OpenClawopenclaw gateway restartVault Not Accessible
Symptoms: Error: "Vault not found" or "Access denied"
Potential causes:
- Vault name typo
- Service account doesn't have access
- Vault is archived or deleted
Fix:
# List accessible vaultsop vault list# Expected output:ID NAMEabcdef12-3456-7890-abcd Developmentghijkl12-3456-7890-efgh Staging# If vault missing:# 1. Go to 1Password.com# 2. Settings β Service Accounts# 3. Edit your service account# 4. Grant access to the vault# 5. Save# Update OpenClaw configvim ~/.openclaw/config.yaml# Update allowedVaults with exact vault namesSecret Retrieval Fails
Symptoms: Error: "Item not found" or "Field not found"
Potential causes:
- Item name doesn't match
- Field name doesn't match
- Item is in different vault
Fix:
# List items in vaultop item list --vault Production# Get item detailsop item get "Database Password" --vault Production# Check field namesop item get "Database Password" --vault Production --format json | jq '.fields'# Expected output:[ { "id": "password", "type": "concealed", "label": "password", "value": "..." }]# Use exact names in OpenClaw@OpenClaw get password field from Database Password item in Production vaultEnvironment Variable Injection Not Working
Symptoms: Environment variables not set, or set to empty values
Potential causes:
- Mapping configuration incorrect
- Field names don't match
- Vault/item permissions issue
Fix:
# Test mapping manuallyop read "op://Production/PostgreSQL Production/password"# Should output the password. If error:# - Verify vault name exact (case-sensitive)# - Verify item name exact# - Verify field name exact# Check OpenClaw configvim ~/.openclaw/config.yamlintegrations: onepassword: envMapping: DATABASE_PASSWORD: vault: "Production" # Exact name item: "PostgreSQL Production" # Exact name field: "password" # Exact field ID# Restart and testopenclaw gateway restart@OpenClaw load environment variablesCredential Rotation Fails
Symptoms: Error during rotation, or services break after rotation
Potential causes:
- Insufficient write permissions
- Services not updated with new credential
- Old credential deactivated too quickly
Fix:
# Verify write permissionsop item edit "Database Password" --vault Production password="test123"# If error: "insufficient permissions"# - Service account needs write access# - Update in 1Password settings# Check rotation workflowvim ~/.openclaw/config.yamlintegrations: onepassword: rotation: # Add grace period gracePeriod: "24 hours" # Keep old credential active # Test before deactivating testRotation: true # Rollback on failure rollbackOnFailure: true# Manual rotation with testing@OpenClaw rotate database password with testingAudit Logs Not Created
Symptoms: Audit log file empty or doesn't exist
Potential causes:
- Log file path incorrect
- Permission denied
- Directory doesn't exist
Fix:
# Create log directorysudo mkdir -p /var/log/openclawsudo chown $(whoami) /var/log/openclaw# Verify configvim ~/.openclaw/config.yamlintegrations: onepassword: audit: enabled: true logFile: "/var/log/openclaw/1password-audit.log"# Restart and testopenclaw gateway restart@OpenClaw get test secret from Development vault# Check logtail -f /var/log/openclaw/1password-audit.log# Should show:{"timestamp":"2026-04-10T14:23:45Z","event":"retrieve",...}Security Best Practices for Self-Hosted
1. Protect Service Account Tokens
# Never commit tokens to gitecho "config.yaml" >> .gitignore# Use environment variablesexport OP_SERVICE_ACCOUNT_TOKEN="ops_..."# Or use a secrets managerexport OP_SERVICE_ACCOUNT_TOKEN=$(op read "op://Infrastructure/OpenClaw/token")# Or Kubernetes secretskubectl create secret generic openclaw-1password --from-literal=token="ops_..."2. Principle of Least Privilege
integrations: onepassword: # Only grant access to necessary vaults allowedVaults: - "Development" # All engineers - "Staging" # Senior engineers # Block sensitive vaults blockedVaults: - "Production" # Requires approval - "HR" - "Finance" - "Executive"3. Rotate Service Account Tokens
Every 90 days:
- Go to 1Password.com β Settings β Service Accounts
- Edit service account
- Click "Regenerate Token"
- Update OpenClaw config
- Restart OpenClaw
4. Enable Audit Logging
Always enable and monitor:
integrations: onepassword: audit: enabled: true logFile: "/var/log/openclaw/1password-audit.log" redactValues: true # Never log secrets5. Require Approval for Production Access
integrations: onepassword: vaultPermissions: Production: read: true requireApproval: true approvers: - "security@company.com" - "cto@company.com" approvalTimeout: "15 minutes"6. Monitor for Anomalies
integrations: onepassword: monitoring: enabled: true alertOn: - "high_frequency_access" # >10 retrievals in 1 minute - "unusual_hours" # Access at 3 AM - "new_ip_address" # Access from unknown IP - "failed_auth" # Failed authentication attempts notify: slack: "#security-alerts" email: "security@company.com"7. Use Read-Only Access When Possible
integrations: onepassword: # Read-only by default defaultPermissions: read: true write: false rotate: false # Explicit write permissions only when needed vaultPermissions: Staging: rotate: true # Can rotate staging credentialsComparison: HeraClaw Cloud vs Self-Hosted
| Feature | HeraClaw Cloud β¨ | Self-Hosted π οΈ |
|---|---|---|
| Setup time | 60 seconds | 30-45 minutes (first time) |
| Technical skill | None | Intermediate to Advanced |
| 1Password CLI | Pre-installed | Manual installation |
| Service accounts | Managed for you | Manual creation |
| Token rotation | Automatic | Manual (every 90 days) |
| Vault permissions | GUI configuration | YAML configuration |
| Updates | Automatic | Manual updates required |
| Support | Professional support team | Community forums |
| Uptime SLA | 99.9% guaranteed | DIY |
| Security certs | SOC 2, GDPR, HIPAA | Self-certification |
| Monitoring | 24/7 monitoring | You set up alerts |
| Cost | Monthly subscription | 1Password + your time |
| Credential rotation | Automated workflows | Manual scripting |
| Audit reports | One-click generation | Custom scripting |
| Compliance | Pre-built reports | DIY |
| Emergency access | Built-in workflows | Manual configuration |
| Secret sprawl detection | Automated scanning | Manual setup |
| Team onboarding | Automated workflows | Manual processes |
Why 95% of users choose HeraClaw Cloud:
β No master password exposure - Cloud never sees your master password β No service account management - We handle token creation and rotation β Automatic CLI updates - 1Password CLI updates handled automatically β One-click compliance reports - SOC 2, ISO 27001 reports in seconds β Professional support - Security experts available 24/7 β Advanced automation - Rotation, auditing, sprawl detection built-in
When self-hosting makes sense:
β Data cannot leave your infrastructure (air-gapped environments) β You have dedicated security engineers β You need to customize rotation workflows extensively β You're already using 1Password CLI in your workflows β You have 24/7 security operations center (SOC)
Frequently Asked Questions
Q: Does this work with 1Password for Families?
A: Yes for self-hosted (using personal access), but HeraClaw Cloud requires 1Password Teams, Business, or Enterprise (for service accounts).
Q: Can I use this without a service account?
A: Self-hosted: yes, use personal CLI session. Cloud: no, we require service accounts for security.
Q: Will my master password be exposed?
A: No. Service accounts don't use your master password. HeraClaw Cloud never sees your master password.
Q: Can the AI assistant read all my 1Password items?
A: Only items in vaults you explicitly grant access to. Configure allowedVaults and blockedVaults.
Q: Are secrets logged in chat history?
A: No. Secrets are redacted by default. Only metadata is logged (vault name, item name, timestamp).
Q: Can I rotate credentials automatically?
A: Yes! Configure rotation schedules in OpenClaw config or use HeraClaw Cloud's automated rotation workflows.
Q: What about emergency access at 3 AM?
A: Emergency access workflows provide immediate access with full audit trail and automatic post-incident rotation.
Q: How do I onboard new team members?
A: @OpenClaw onboard new engineer sarah@company.com - automates 1Password invite, vault access, and documentation.
Q: Can I detect secrets leaked in code?
A: Yes! @OpenClaw scan codebase for hardcoded secrets - detects leaks and suggests 1Password references.
Q: What about compliance audits (SOC 2, ISO 27001)?
A: One-click compliance reports: @OpenClaw generate SOC 2 access review for Q1 2026
Q: Can I use this in CI/CD pipelines?
A: Yes! Environment variable injection works in GitHub Actions, GitLab CI, Jenkins, etc.
Q: How fast is secret retrieval?
A: Typically 1-2 seconds (1Password API latency). Cached secrets return instantly.
Q: Can I manage multiple 1Password accounts?
A: Self-hosted: yes, configure multiple accounts. Cloud: contact support for multi-account setup.
Q: What if I accidentally expose a secret?
A: @OpenClaw INCIDENT: GitHub token leaked - triggers incident response workflow with automatic rotation.
Q: Can contractors get temporary access?
A: Yes! @OpenClaw grant contractor access for 6 weeks - automatic access removal and credential rotation.
Q: How do I prevent duplicate credentials across vaults?
A: @OpenClaw find duplicate credentials - detects duplicates and suggests consolidation.
Q: Can I use 1Password references (op://vault/item/field)?
A: Self-hosted: yes, configure op:// references in env files. Cloud: automatic reference generation.
Q: What about SSH key management?
A: Fully supported. Store SSH keys in 1Password, retrieve with @OpenClaw get SSH key for production servers
Q: Can I audit who accessed production secrets?
A: Yes! @OpenClaw who accessed production database password last week? - instant audit reports.
Q: How do I migrate from hardcoded secrets?
A: @OpenClaw scan and replace hardcoded secrets with 1Password references - automated migration.
Q: What if 1Password is down?
A: OpenClaw caches recently-used secrets (configurable TTL). Critical secrets remain accessible during outages.
Get Started
For 95% of users (recommended):
- 60-second setup
- No 1Password CLI installation
- No service account management
- No master password exposure
- Professional support
- 99.9% uptime SLA
- No credit card required
For advanced users only:
- 30-45 minute setup
- Requires 1Password CLI
- Requires service account creation
- You maintain infrastructure
- Full control and customization
Questions? Email support@cloud.getopenclaw.ai or join our community Slack for help.
Last updated: April 10, 2026
Built with OpenClaw β The open-source AI assistant platform. Self-host or use HeraClaw Cloud.
Features
Secret injection
Inject 1Password secrets into skill environments at runtime
CLI integration
Uses official 1Password CLI with desktop app authentication
Multi-vault support
Access Personal, Work, and shared vaults simultaneously
Config references
Reference op:// URIs directly in OpenClaw configuration
Password generation
Create and store new credentials via natural language
Zero secrets on disk
Secrets fetched at runtime, never stored in files or logs
Use Cases
Deployment credentials
Inject AWS, GCP, and other keys at deploy time without hardcoding
API key management
Reference API keys by name β update in 1Password, auto-refreshes everywhere
Team secret sharing
Share credentials securely without exposing values in chat or config
Secret rotation
Update rotated credentials once, propagate everywhere automatically
Setup Guide
Requirements
- β1Password account
- β1Password CLI (op) installed
- βDesktop app integration enabled (recommended)
Install 1Password CLI
Download and install the op CLI from 1password.com/downloads/command-line
Enable desktop integration
In 1Password settings, enable 'Integrate with 1Password CLI' for seamless authentication.
Sign in
Run 'op signin' or let the desktop app handle authentication.
Test access
Run 'op vault list' to confirm you can access your vaults.
Limitations
- β οΈBiometric auth may interrupt automated workflows
- β οΈSome operations require manual approval
Frequently Asked Questions
Will my passwords be visible in chat?
No. Secrets are used behind the scenes. Your assistant can use them without displaying them in messages.
Do I need 1Password Teams or Business?
No, personal 1Password accounts work fine. Teams/Business add features like shared vaults.
How is this different from storing secrets in config?
1Password provides encryption, access control, audit logs, and easy rotation. Config files are just text.
Can it create or modify secrets?
Yes, the op CLI supports creating and editing items. Your assistant can manage secrets programmatically.
π₯ Your AI should run your business, not just answer questions.
We'll show you how.Free to join.
Related Integrations
π Learn More
The Complete OpenClaw Security Guide (2026)
Right now, as you read this, there are 42,000+ OpenClaw instances exposed on the public internet with zero authentication. No password. No allowlist. Wide op...
How to Update OpenClaw (3 Easy Methods)
Keep your AI assistant running the latest version. Three ways to update β from one-word commands to manual CLI.
OpenClaw Installation Guide β All Platforms (Linux, macOS, Unraid)
Complete installation guide covering gateway setup, Ollama integration, systemd services, and troubleshooting common setup errors like ECONNREFUSED and model loading issues.
Tabnine vs GitHub Copilot
Privacy-first AI coding vs ecosystem integration
π Your AI should run your business.
Weekly live builds + template vault. We'll show you how to make AI actually work.Free to join.
Join Vibe Combinator β