🦞OpenClaw Guide
← All Integrations
πŸ”

1Password

Medium⏱️ 10-15 minutes

Secure credential management

The Fastest Way: HeraClaw Cloud ⚑

Skip the 1Password CLI setup, service account configuration, and vault permission management. HeraClaw Cloud comes with 1Password integration pre-configured and ready to use in 60 seconds.

Why HeraClaw Cloud for 1Password?

βœ… Ready in 60 seconds - No 1Password CLI installation, no service account creation, no op://reference syntax βœ… Secure by design - No master password exposure, no service account tokens in config files βœ… Works immediately - Access secrets, credentials, and vault items from day one βœ… Professional support - If anything breaks, we fix it for you βœ… Always updated - We handle 1Password API changes and CLI updates automatically βœ… Zero maintenance - No token rotation, no permission debugging, no vault access issues

How it works:

  1. Sign up at cloud.getopenclaw.ai (takes 60 seconds)
  2. Go to Integrations β†’ 1Password
  3. Click 'Connect to 1Password'
  4. Authorize HeraClaw to access your vaults
  5. Done! Ask your AI assistant to retrieve credentials, rotate secrets, or audit access

Get Started: Start with HeraClaw Cloud β†’


Complete Guide to OpenClaw + 1Password

1Password is the gold standard for secrets management, trusted by over 100,000 businesses worldwide. With enterprise-grade security, intuitive vault organization, and powerful programmatic access, it's where modern teams store API keys, database credentials, SSH keys, and sensitive configuration.

OpenClaw's 1Password integration brings intelligent secrets management directly into your AI assistant workflow. No more context-switching between terminal, 1Password app, and your IDE. Ask your assistant to retrieve credentials, rotate API keys, audit access logs, or inject environment variablesβ€”all with enterprise security and compliance built in.

Why Use 1Password with OpenClaw?

1Password's architecture makes it one of the most secure and versatile platforms for secrets management. Here's why the OpenClaw + 1Password combination is transformative:

1. Zero-Knowledge Security with AI Convenience

The holy grail: 1Password's zero-knowledge security model meets AI assistant convenience.

  • No master password in config: HeraClaw Cloud never stores your master password or service account tokens
  • Encrypted vault access: All secrets remain encrypted at rest, decrypted only when needed
  • Secure credential retrieval: AI assistant can fetch credentials without exposing them in chat logs
  • Audit trail: Every access logged with who, what, when, where
  • Principle of least privilege: Grant assistant access only to specific vaults or items
  • Temporary access: Time-limited credentials for contractors or deployments

This is a game-changer for DevOps teams: get secrets when you need them, without compromising security or adding friction.

2. Natural Language Secret Retrieval

Forget op://vault/item/field syntax. Just ask:

bash
@OpenClaw get the GitHub API token for the production deployment@OpenClaw what's the AWS access key for the staging environment?@OpenClaw retrieve the database password for the analytics-db vault@OpenClaw show me all API keys that expire this month

Your assistant understands context, vault names, and item descriptions. It finds the right secret even with fuzzy queries.

3. Smart Environment Variable Injection

1Password's biggest pain point solved: environment variable management.

Traditional way:

bash
# Step 1: Open 1Password app# Step 2: Find vault β†’ item β†’ field# Step 3: Copy secret# Step 4: Paste in terminal (exposed in history!)# Step 5: Repeat for 15 more env varsexport DATABASE_URL="postgresql://..."export STRIPE_API_KEY="sk_live_..."export SENDGRID_API_KEY="SG..."# etc.

With OpenClaw:

bash
@OpenClaw load environment variables for the production deployment

The assistant:

  1. Identifies required secrets from your .env.example or deployment config
  2. Fetches from appropriate 1Password vaults
  3. Injects into your shell session or CI/CD pipeline
  4. Never exposes secrets in terminal history
  5. Logs access for compliance

Environment setup goes from 10 minutes to 10 seconds.

4. Automated Credential Rotation

Security best practice is rotating credentials every 90 days. Reality: teams rotate once a year (if ever) because it's painful.

OpenClaw automates it:

bash
@OpenClaw rotate the Stripe API key and update all services@OpenClaw generate a new database password and update the connection strings@OpenClaw audit all API keys older than 90 days and create rotation tasks

The assistant:

  • Generates new secure credentials (cryptographically random)
  • Updates 1Password vault items
  • Updates services that use the credential (via API or config files)
  • Notifies team members of changes
  • Logs rotation in audit trail

What used to take 2 hours now takes 30 seconds.

5. Team Vault Intelligence

1Password teams often have 20+ vaults (Engineering, DevOps, Marketing, Sales, etc.). Finding the right secret is hard.

OpenClaw provides vault intelligence:

  • Smart search: "Find all AWS credentials" (searches across all accessible vaults)
  • Duplicate detection: "Are there multiple Stripe API keys?" (finds duplicates across vaults)
  • Access review: "Who has access to the production database password?" (lists users/teams)
  • Expiration tracking: "What secrets expire in the next 30 days?" (proactive rotation)
  • Vault organization: "Move this API key from Engineering to DevOps vault" (maintains structure)

Your 1Password organization stays clean and auditable.

6. Compliance and Audit Support

SOC 2, ISO 27001, and other compliance frameworks require:

  • Audit logs of secret access
  • Proof of credential rotation
  • Access review documentation
  • Incident response for leaked credentials

1Password provides the infrastructure. OpenClaw makes it actionable:

bash
@OpenClaw generate an access audit report for the last quarter@OpenClaw who accessed the production API keys in January?@OpenClaw verify all team members have unique passwords (no sharing)@OpenClaw create an incident response plan for the leaked GitHub token

Compliance audits go from weeks of spreadsheet work to minutes of AI-generated reports.

7. Emergency Access and Break-Glass Scenarios

It's 3 AM. Production is down. You need the database password. The engineer who knows it is on vacation.

Traditional emergency access:

  • Find the 1Password emergency kit (is it up to date?)
  • Locate the vault (which one?)
  • Hope you have permission
  • Hope the credential hasn't rotated
  • Risk exposing it in terminal history

With OpenClaw:

bash
@OpenClaw emergency: get production database credentials

The assistant:

  • Logs the emergency access (compliance!)
  • Retrieves the credential securely
  • Notifies security team (break-glass triggered)
  • Provides credential without terminal exposure
  • Creates follow-up task to rotate credential after incident

Mean time to resolution (MTTR) drops from 30 minutes to 30 seconds.

8. Developer Onboarding and Offboarding

Onboarding new developers:

Traditional process:

  1. Send 1Password invite (wait for acceptance)
  2. Grant vault access (which vaults?)
  3. Manually send setup instructions
  4. Answer 20 questions about "where is X?"
  5. Takes 2-3 days to be productive

With OpenClaw:

bash
@OpenClaw onboard new developer sarah@company.com to the Engineering team

The assistant:

  • Sends 1Password invite
  • Grants standard vault access (Engineering, Staging, Tools)
  • Sends personalized onboarding doc with credential locations
  • Logs the access grant for compliance
  • New developer productive on day one

Offboarding:

When someone leaves, you need to:

  • Remove 1Password access (done)
  • Rotate all secrets they accessed (almost never doneβ€”huge security risk)
bash
@OpenClaw offboard john@company.com and rotate all accessed credentials

The assistant:

  • Reviews audit log for all secrets John accessed
  • Generates rotation plan (prioritizes production secrets)
  • Executes rotation with team approval
  • Logs the offboarding for compliance

What should take 4 hours now takes 15 minutes.

Real-World Use Cases

1. DevOps: Environment Variable Lookup for Deployments

Scenario: Your DevOps team deploys microservices to staging and production daily. Each service needs 10-15 environment variables (database URLs, API keys, feature flags). Engineers spend 10-15 minutes per deployment copying credentials from 1Password.

How OpenClaw helps:

Integrate 1Password with your deployment pipeline:

bash
# Traditional way (manual, error-prone)op item get "Production Database" --fields passwordop item get "Stripe API Key" --fields credential# ... repeat 15 times, paste into .env# With OpenClaw@OpenClaw load environment variables for product-api production deployment

The assistant:

  1. Reads your service's .env.example or deployment manifest
  2. Identifies required secrets (DATABASE_URL, STRIPE_KEY, etc.)
  3. Maps each to the correct 1Password vault and item
  4. Retrieves all secrets in one operation
  5. Injects into deployment pipeline (Kubernetes secrets, Docker env, etc.)
  6. Logs access for audit trail
  7. Never exposes secrets in terminal history or chat logs

Example conversation:

You: @OpenClaw deploy product-api to production

Assistant:

bash
Deploying product-api to production...βœ“ Retrieved 12 secrets from 1Password:  - Production/Database (DATABASE_URL)  - Production/Stripe (STRIPE_API_KEY, STRIPE_WEBHOOK_SECRET)  - Production/SendGrid (SENDGRID_API_KEY)  - Production/AWS (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)  - Production/Redis (REDIS_URL)  - Shared/OpenAI (OPENAI_API_KEY)  - Production/GitHub (GITHUB_TOKEN)  - Production/Sentry (SENTRY_DSN)  - Production/Feature Flags (LAUNCH_DARKLY_KEY)βœ“ Injected into Kubernetes secret: product-api-prodβœ“ Deployment rolling out (0/3 pods ready)βœ“ Deployment complete (3/3 pods ready)Production deployment successful!Audit log: https://1password.com/logs/deployment-abc123

Impact:

  • Deployment time drops from 15 minutes to 2 minutes
  • Zero credential exposure in terminal history
  • Full audit trail for compliance
  • No more "which vault was that in?" questions
  • Junior engineers can deploy confidently (no master password needed)

Advanced: CI/CD Integration

Integrate with GitHub Actions, GitLab CI, or Jenkins:

yaml
# .github/workflows/deploy.yml- name: Load secrets from 1Password  run: |    openclaw ask "Load production secrets for ${{ github.event.repository.name }}"

The assistant injects secrets directly into CI/CD environment variables. No more hardcoded secrets in CI config.

2. Developer: API Key Retrieval During Development

Scenario: Your developers need API keys for Stripe, SendGrid, OpenAI, AWS, and 10 other services. They're constantly switching between projects, each with different keys (dev, staging, production). Opening 1Password, finding the vault, copying the key interrupts flow state.

How OpenClaw helps:

Developers stay in their terminal and editor:

bash
# Working on user-service (needs Stripe)@OpenClaw get the Stripe test API key# Switching to email-service (needs SendGrid)@OpenClaw get SendGrid API key for staging# Debugging production issue (needs prod credentials)@OpenClaw get production database password

The assistant:

  • Understands context ("test" vs "staging" vs "production")
  • Knows which vault stores which service's credentials
  • Retrieves securely without opening GUI
  • Logs access (compliance!)
  • Can inject directly into .env file or shell session

Example conversation:

You: @OpenClaw I'm working on the checkout flow, what credentials do I need?

Assistant:

bash
For the checkout flow, you'll need:1. Stripe API Keys:   - Test mode: sk_test_... (from Development/Stripe)   - Webhook secret: whsec_... (from Development/Stripe)2. Database:   - Staging DB: postgresql://... (from Development/Databases)3. Optional:   - Sentry DSN for error tracking (from Development/Monitoring)   - Feature flags (from Development/LaunchDarkly)Would you like me to:a) Load all into your .env fileb) Export to shell sessionc) Just show the values

You: a) load into .env

Assistant:

bash
βœ“ Created .env.local with 6 secretsβœ“ Added to .gitignore (safety check)βœ“ Ready to start development!Reminder: These are TEST credentials. Production keys are in Production vault.

Impact:

  • Context-switching eliminated (no more 1Password app interruptions)
  • Faster development setup (new project ready in 30 seconds)
  • Reduced mistakes (no more copy-pasting production key into dev .env)
  • Improved security (credentials never in clipboard or terminal history)
  • Better compliance (every retrieval logged)

3. Security Team: Credential Rotation and Audit

Scenario: Your security team needs to rotate credentials quarterly (SOC 2 requirement). Tracking which credentials need rotation, executing the rotation, and updating all services is a manual, error-prone process that takes days.

How OpenClaw helps:

Automate the entire rotation lifecycle:

Step 1: Identify credentials needing rotation

bash
@OpenClaw audit all credentials and identify those older than 90 days

Assistant:

bash
Credential Audit Report (Last 90 Days)⚠️  OVERDUE ROTATION (>90 days):1. Production/AWS (aws-root-access-key) - 127 days old2. Production/Stripe (stripe-live-api-key) - 103 days old3. Production/Database (postgres-admin-password) - 98 days old4. Production/GitHub (github-deploy-token) - 94 days oldβœ“ COMPLIANT (<90 days):- Development/* (all keys <30 days)- Production/SendGrid (62 days)- Production/OpenAI (45 days)πŸ“Š Summary:- Total credentials: 47- Need rotation: 4 (9%)- Compliant: 43 (91%)- High risk: 2 (AWS root, Database admin)Recommendation: Rotate high-risk credentials immediately.Generate rotation plan? (yes/no)

Step 2: Generate rotation plan

You: yes

Assistant:

bash
Credential Rotation PlanπŸ”΄ PRIORITY 1 (Production Impact):1. AWS Root Access Key   - Current: AKIA...OLD (127 days)   - Services affected:      * Terraform state backend (S3)     * CI/CD deployments (GitHub Actions)     * Infrastructure monitoring (CloudWatch)   - Rotation steps:     a) Generate new IAM key     b) Update GitHub Actions secrets     c) Update Terraform Cloud workspace     d) Test deployment pipeline     e) Deactivate old key (24hr grace period)   - Estimated time: 45 minutes   - Risk: Medium (deployments blocked if misconfigured)   - Recommended: Friday 2pm (low traffic)2. Production Database Password   - Current: [REDACTED] (98 days)   - Services affected:     * product-api (Kubernetes)     * analytics-worker (Kubernetes)     * admin-dashboard (Vercel)   - Rotation steps:     a) Generate new password (32 chars, high entropy)     b) Update 1Password item     c) Update Kubernetes secrets (3 services)     d) Rolling restart pods (zero downtime)     e) Verify connectivity   - Estimated time: 20 minutes   - Risk: Low (rolling restart, zero downtime)   - Recommended: Any time[...continues for all 4 credentials...]Total time: ~2 hoursCan be parallelized: ~45 minutes with teamShall I create tasks in Linear/Jira? (yes/no)

Step 3: Execute rotation (with approval)

You: @OpenClaw rotate the production database password

Assistant:

bash
πŸ” Credential Rotation: Production Database Password⚠️  This will affect 3 production services.⚠️  Requires approval from Security Team.Rotation plan:1. Generate new password (32 chars, bcrypt-compatible)2. Update 1Password: Production/Database/postgres-admin-password3. Update Kubernetes secrets:   - product-api-prod   - analytics-worker-prod   - admin-dashboard-prod4. Rolling restart (zero downtime)5. Verify connections6. Notify #engineering channelApprove? Type ROTATE to confirm:

You: ROTATE

Assistant:

bash
βœ“ Generated new password: [REDACTED]βœ“ Updated 1Password (Production/Database)βœ“ Updated Kubernetes secret: product-api-prodβœ“ Updated Kubernetes secret: analytics-worker-prod  βœ“ Updated Kubernetes secret: admin-dashboard-prodβœ“ Rolling restart: product-api (3/3 pods healthy)βœ“ Rolling restart: analytics-worker (2/2 pods healthy)βœ“ Rolling restart: admin-dashboard (redeploying...)βœ“ Connection test: All services connected successfullyβœ“ Notified #engineering (3 people online)Rotation complete! Old password deactivated: No (24hr grace period)Audit log: https://1password.com/logs/rotation-xyz789Next rotation due: July 10, 2026 (90 days)

Impact:

  • Rotation time: 2 hours β†’ 5 minutes (96% faster)
  • Human errors eliminated (automated testing and rollback)
  • Compliance improved (every rotation logged, dated, auditable)
  • Team coordination simplified (assistant handles notifications)
  • Zero downtime rotations (rolling restarts, health checks)

Advanced: Scheduled Rotations

Set up automatic rotation schedules:

bash
@OpenClaw schedule automatic rotation for all production credentials every 60 days

The assistant will:

  • Create calendar reminders 7 days before rotation
  • Generate rotation plan automatically
  • Request approval before executing
  • Execute rotation during maintenance windows
  • Notify team of completion

4. Team Lead: Team Vault Organization

Scenario: Your engineering team has grown from 5 to 50 people. Your 1Password organization is chaos: duplicated credentials, unclear naming, overlapping vault permissions, orphaned items. New hires can't find credentials. Security can't audit access.

How OpenClaw helps:

AI-powered vault organization and cleanup:

Step 1: Audit current state

bash
@OpenClaw audit our 1Password organization and identify issues

Assistant:

bash
1Password Organization AuditπŸ“Š Overview:- Vaults: 23- Items: 487- Users: 52- Teams: 8⚠️  ISSUES FOUND:1. Duplicate Credentials (12 found):   - "Stripe API Key" in Engineering, DevOps, and Production vaults   - "AWS Access Key" in Engineering and Infrastructure vaults   - "GitHub Token" in Engineering and Deployment vaults   - [9 more...]2. Unclear Naming (34 items):   - "Password" (which password?)   - "API Key" (which API?)   - "Token" (which token?)   - "Database" (which database?)3. Over-Permissioned Access (6 users):   - john@company.com has access to 18/23 vaults (should be ~5)   - sarah@company.com has access to 15/23 vaults   - [4 more...]4. Orphaned Items (8 found):   - "Heroku API Key" (Heroku account closed 2 years ago)   - "Mailgun Password" (migrated to SendGrid)   - [6 more...]5. Weak Passwords (3 found):   - Production/Legacy App (password: "admin123")   - Development/Test DB (password: "password")   - [1 more...]6. Missing Metadata (47 items):   - No URL field   - No description   - No tags🎯 Recommendations:1. Consolidate duplicates β†’ Single source of truth2. Rename unclear items β†’ Standardized naming3. Review access permissions β†’ Principle of least privilege4. Archive orphaned items β†’ Reduce clutter5. Rotate weak passwords β†’ Security compliance6. Add metadata β†’ Improve searchabilityShall I create a cleanup plan? (yes/no)

Step 2: Generate cleanup plan

You: yes

Assistant:

bash
Vault Cleanup PlanπŸ“‹ PHASE 1: Consolidate Duplicates (Est: 30 min)Stripe API Keys:- Keep: Production/Stripe/api-key-live (most recent, properly tagged)- Merge from: Engineering/stripe-key, DevOps/stripe-api- Action: Update references, archive old items- Risk: Low (testing before deletion)AWS Access Keys:- Keep: Production/AWS/root-access-key- Merge from: Engineering/aws-key, Infrastructure/aws-access  - Action: Verify all are same key, archive duplicates- Risk: Low (read-only verification)[...10 more duplicates...]πŸ“‹ PHASE 2: Standardize Naming (Est: 45 min)Naming convention:- Format: [Service] [Environment] [Type]- Examples:  * "AWS Production Access Key"  * "Stripe Test API Key"  * "PostgreSQL Staging Password"Renames needed:- "Password" β†’ "PostgreSQL Production Admin Password"- "API Key" β†’ "SendGrid Production API Key"- "Token" β†’ "GitHub Production Deploy Token"[...31 more...]πŸ“‹ PHASE 3: Right-Size Permissions (Est: 1 hour)User: john@company.com (Frontend Engineer)- Current access: 18 vaults- Needed access: 4 vaults (Engineering, Development, Staging, Shared)- Remove: Production, Infrastructure, DevOps, Sales, Marketing, [9 more]- Justification: Frontend engineers don't need production DB access[...5 more users...]πŸ“‹ PHASE 4: Archive Orphaned Items (Est: 15 min)- Heroku API Key β†’ Archive (migrated to Vercel 2 years ago)- Mailgun Password β†’ Archive (migrated to SendGrid)[...6 more...]πŸ“‹ PHASE 5: Rotate Weak Passwords (Est: 30 min)- Production/Legacy App ("admin123") β†’ Generate secure password, update app- Development/Test DB ("password") β†’ Generate secure password, update config[...1 more...]πŸ“‹ PHASE 6: Enrich Metadata (Est: 1 hour)Add to all 47 items:- URL: Service login page- Description: What this credential is for- Tags: service-name, environment, team- Notes: Rotation schedule, owner, dependencies⏱️  TOTAL TIME: ~4 hours (can be done over 1 week)🎯 OUTCOME:- Organized vaults (clear naming, no duplicates)- Right-sized permissions (security improved)- Updated credentials (no weak passwords)- Searchable metadata (new hires can find things)Shall I create tasks in Linear/Jira? (yes/no)Or execute automatically with approval? (auto/manual)

Step 3: Execute cleanup (semi-automated)

You: auto

Assistant:

bash
πŸ€– Starting automated cleanup with approval gates...βœ“ Phase 1: Duplicate Consolidation  βœ“ Verified Stripe keys are identical (hash match)  βœ“ Updated 3 service configs to use Production/Stripe/api-key-live  βœ“ Archived Engineering/stripe-key  βœ“ Archived DevOps/stripe-api  [Progress: 2/12 duplicates consolidated]⚠️  APPROVAL NEEDED: AWS Access Key Consolidation  Found 3 AWS keys. Only 2 are identical.  - Production/AWS/root-access-key (AKIA...ABC)  - Engineering/aws-key (AKIA...ABC) [duplicate]  - Infrastructure/aws-access (AKIA...XYZ) [DIFFERENT!]    Recommendation: Keep both unique keys, archive duplicate.  Approve? (yes/no/skip)

You: yes

[...process continues with approval gates for risky changes...]

Final result:

bash
βœ… Cleanup Complete!Results:βœ“ Consolidated 12 duplicates β†’ 0 duplicatesβœ“ Renamed 34 items β†’ Standardized namingβœ“ Adjusted permissions for 6 users β†’ Right-sizedβœ“ Archived 8 orphaned items β†’ Removed clutterβœ“ Rotated 3 weak passwords β†’ Security improvedβœ“ Enriched 47 items with metadata β†’ SearchableBefore β†’ After:- Items: 487 β†’ 479 (8 archived)- Duplicates: 12 β†’ 0- Unclear names: 34 β†’ 0- Over-permissioned users: 6 β†’ 0- Weak passwords: 3 β†’ 0- Missing metadata: 47 β†’ 0πŸ“Š Health Score: 62% β†’ 98%Audit log: https://1password.com/logs/cleanup-202604Next review: July 1, 2026 (quarterly)

Impact:

  • Organization time: 2 weeks β†’ 4 hours
  • Security posture improved (no duplicates, no weak passwords)
  • Compliance simplified (clear audit trail, proper permissions)
  • New hire onboarding faster (can find credentials)
  • Team productivity up (less time searching for secrets)

5. SRE: On-Call Emergency Access

Scenario: It's 2:47 AM. PagerDuty alerts: production database is down. You're the on-call SRE. You need the database admin password immediately. Problem: it's in 1Password, but you don't remember which vault, which item, or if you even have access.

How OpenClaw helps:

Emergency access with full audit trail:

Traditional emergency access:

  1. Wake up to PagerDuty (2:47 AM)
  2. Open 1Password app (if you remember master password)
  3. Search "database" (23 results, which one?)
  4. Try "production database" (3 vaults, which one?)
  5. Find the item (4:52 AM - 5 minutes wasted)
  6. Copy password (exposed in clipboard)
  7. Paste in terminal (exposed in shell history)
  8. Fix issue (5:15 AM)
  9. Forget to notify security team (compliance violation)

Total: 28 minutes to get credentials

With OpenClaw:

  1. Wake up to PagerDuty (2:47 AM)
  2. Open terminal: @OpenClaw emergency: production database password
  3. Receive credential (2:48 AM - 30 seconds)
  4. Fix issue (2:55 AM)
  5. Auto-notification sent to security team

Total: 30 seconds to get credentials

Example conversation:

You: @OpenClaw EMERGENCY: production database is down, need admin password NOW

Assistant:

bash
🚨 EMERGENCY ACCESS ACTIVATEDCredential: Production PostgreSQL Admin PasswordVault: Production/DatabaseItem: postgres-admin-passwordπŸ” Password: [REDACTED - click to reveal]πŸ“‹ Connection details:- Host: prod-db.internal.company.com- Port: 5432- Username: admin- Database: production⚑ Quick actions:- [Copy password to clipboard]- [Open SSH session]- [Check database status]- [View recent logs]⚠️  Emergency access logged:- User: you@company.com- Time: 2:47 AM PST- Reason: PagerDuty alert #12345- Notified: #security-alerts, #on-callπŸ“Œ Post-incident:- Rotate this credential within 24 hours (security policy)- Document incident in postmortem- Review why on-call didn't have accessNeed help debugging? I can:- Check database logs- List active connections- Show recent queries- Verify backup status

You click "Copy password to clipboard" and fix the issue.

After the incident (6:30 AM):

You: @OpenClaw create a postmortem for last night's database incident

Assistant:

bash
Incident Postmortem TemplateπŸ“‹ Incident Summary:- Date: April 10, 2026- Time: 2:47 AM - 2:55 AM PST (8 minutes)- Severity: P1 (Production database down)- Impact: All API requests failing (100% error rate)- MTTR: 8 minutesπŸ” Timeline:- 2:47 AM: PagerDuty alert triggered- 2:48 AM: On-call accessed credentials via OpenClaw- 2:50 AM: Diagnosed issue (connection pool exhausted)- 2:52 AM: Restarted connection pool- 2:55 AM: Service recovered, monitoringβœ… What Went Well:- Fast credential access (30 seconds vs typical 5+ minutes)- Clear audit trail (security compliance)- Automated notifications (security team alerted)❌ What Went Wrong:- On-call engineer didn't know which vault had credentials- No runbook linked from PagerDuty- Connection pool issue should have alerted earlierπŸ”§ Action Items:- [ ] Update PagerDuty runbook with credential location- [ ] Add connection pool monitoring alert- [ ] Grant all on-call engineers emergency access to Production vault- [ ] Schedule credential rotation (24hr policy after emergency access)- [ ] Review connection pool settingsπŸ“Š Metrics:- Detection time: <1 minute- Response time: 1 minute- Resolution time: 8 minutes- Total downtime: 8 minutesPostmortem created: [Link to Google Doc]Shared with: #engineering, #leadership, #security

Impact:

  • MTTR improved: 28 minutes β†’ 8 minutes (71% faster)
  • Security maintained: Full audit trail despite emergency
  • Compliance preserved: Auto-notification, credential rotation scheduled
  • Postmortem automated: 30 minutes of writing β†’ 2 minutes
  • Process improved: Action items identified immediately

6. Contractor Management: Temporary Credential Access

Scenario: You hired a contractor to build a new feature. They need access to staging database, Stripe test API, and GitHub for 6 weeks. Problem: you don't want to give them permanent access, but manually removing access after the contract ends is always forgotten (security risk).

How OpenClaw helps:

Time-limited credential access with automatic cleanup:

Step 1: Grant temporary access

bash
@OpenClaw grant contractor alex@contractor.com access to staging environment for 6 weeks

Assistant:

bash
🎫 Temporary Access RequestContractor: alex@contractor.comDuration: 6 weeks (expires June 22, 2026)Environment: StagingπŸ“‹ Access Plan:1Password Vaults:βœ“ Grant access to:  - Staging/Database (read-only credentials)  - Staging/Stripe (test API keys)  - Staging/GitHub (deploy tokens)  βœ— Block access to:  - Production/* (all vaults)  - Development/* (internal only)  - Infrastructure/* (not needed)Specific Items:βœ“ PostgreSQL Staging Password (read-only user)βœ“ Stripe Test API Keyβœ“ GitHub Staging Deploy Tokenβœ— Stripe Live API Key (blocked)βœ— Production Database (blocked)⏰ Automatic Actions:- June 22, 2026: Remove all access- June 15, 2026: Reminder to manager (1 week warning)- June 22, 2026: Rotate accessed credentials (security policy)- June 22, 2026: Notify #security teamπŸ“§ Onboarding:- Send 1Password invite to alex@contractor.com- Send staging environment setup guide- Add to #contractors Slack channel- Add to staging Vercel team (limited access)⚠️  Security:- Audit log: Track all accessed items- Weekly access review: Report to manager- Expire credentials: Auto-revoke after 6 weeksApprove? (yes/no)

You: yes

Assistant:

bash
βœ… Temporary Access Grantedβœ“ Sent 1Password invite to alex@contractor.comβœ“ Granted access to 3 staging vaultsβœ“ Created calendar reminder for June 15 (1-week warning)βœ“ Created calendar reminder for June 22 (auto-revoke)βœ“ Sent onboarding email with setup guideβœ“ Added to #contractors channelβœ“ Logged in audit trailContractor can start work immediately.Access expires: June 22, 2026 (automatic)Tracking: https://app.cloud.getopenclaw.ai/access/contractor-alex-202604

Step 2: Weekly access review (automated)

Every Monday, you receive:

bash
πŸ“Š Contractor Access Report (Week of April 14, 2026)Active Contractors: 1Contractor: alex@contractor.com- Access granted: April 10, 2026- Expires: June 22, 2026 (10 weeks remaining)- Items accessed this week:  * Staging/Database/postgres-staging-ro (14 times)  * Staging/Stripe/test-api-key (6 times)  * Staging/GitHub/deploy-token (3 times)- Suspicious activity: None- Compliance: βœ“ All access within approved scope⚠️  Upcoming Expirations:- alex@contractor.com (10 weeks remaining)- No other contractorsAction needed: None (automatic cleanup scheduled)

Step 3: Automatic cleanup (June 22, 2026)

At 9:00 AM on June 22:

bash
πŸ”’ Automatic Access RevocationContractor: alex@contractor.comContract ended: June 22, 2026Actions completed:βœ“ Removed access to Staging/Database vaultβœ“ Removed access to Staging/Stripe vaultβœ“ Removed access to Staging/GitHub vaultβœ“ Rotated PostgreSQL Staging password (accessed 89 times)βœ“ Rotated Stripe Test API key (accessed 34 times)βœ“ Rotated GitHub Deploy token (accessed 12 times)βœ“ Removed from #contractors Slack channelβœ“ Removed from Vercel staging teamβœ“ Notified security teamβœ“ Generated final access reportFinal Access Report:- Total access duration: 73 days (6 weeks + 3 days)- Items accessed: 3- Total accesses: 135- Anomalies detected: 0- Security incidents: 0Audit trail: https://1password.com/reports/contractor-alex-finalContractor offboarding complete.

Impact:

  • Security risk eliminated: No forgotten contractor access
  • Compliance improved: Full audit trail of temporary access
  • Manager time saved: 2 hours of manual cleanup β†’ 0 hours (automated)
  • Credential rotation automated: Would normally be forgotten
  • Clean access reports: For audits and compliance reviews

7. Compliance Officer: Audit Trail and Access Review

Scenario: Your company is undergoing SOC 2 audit. Auditors need proof of:

  • Who accessed which production credentials
  • Credential rotation schedule and compliance
  • Access review documentation
  • Incident response for leaked credentials

Manually generating these reports from 1Password audit logs takes days of spreadsheet work.

How OpenClaw helps:

AI-generated compliance reports in minutes:

Q1 2026 Access Review:

bash
@OpenClaw generate a SOC 2 access review report for Q1 2026

Assistant:

bash
SOC 2 Access Review Report - Q1 2026Generated: April 10, 2026Period: January 1 - March 31, 2026πŸ“Š EXECUTIVE SUMMARYβœ“ Compliance Status: 94% (Target: >90%)βœ“ Credential Rotation: 89% on schedule (Target: >85%)βœ“ Access Reviews: 100% completed (Target: 100%)⚠️  Policy Violations: 3 (Target: 0)---πŸ“‹ PRODUCTION ACCESS AUDITProduction Vault Access:- Authorized users: 12- Unauthorized access attempts: 0- Emergency access events: 2 (both documented)Access by User (Production vaults only):1. john@company.com (DevOps Lead)   - Accesses: 47   - Items: Production/AWS (23), Production/Database (18), Production/GitHub (6)   - Anomalies: None   - Last review: March 15, 2026 βœ“2. sarah@company.com (Senior SRE)   - Accesses: 34   - Items: Production/Database (28), Production/Redis (6)   - Anomalies: None   - Last review: March 15, 2026 βœ“3. alex@company.com (CTO)   - Accesses: 2   - Items: Production/AWS (2) [Emergency access on Jan 15]   - Anomalies: None   - Last review: March 15, 2026 βœ“[...9 more users...]---πŸ”„ CREDENTIAL ROTATION COMPLIANCERotation Policy: Every 90 days for production credentialsCompliant (Rotated on schedule):βœ“ Production/Database/postgres-admin (Jan 15, 2026)βœ“ Production/AWS/root-access-key (Feb 3, 2026)βœ“ Production/Stripe/live-api-key (Feb 20, 2026)βœ“ Production/GitHub/deploy-token (Mar 8, 2026)βœ“ Production/SendGrid/api-key (Mar 22, 2026)[...12 more...]Overdue (Need rotation):⚠️  Production/Redis/password (Last rotated: Oct 10, 2025 - 182 days ago)⚠️  Production/OpenAI/api-key (Last rotated: Nov 5, 2025 - 156 days ago)Scheduled (Next 30 days):πŸ“… Production/Database/postgres-admin (Due: Apr 15, 2026)πŸ“… Production/AWS/root-access-key (Due: May 3, 2026)Compliance Rate: 89% (17/19 credentials on schedule)---⚠️  POLICY VIOLATIONS1. Shared Credential Usage (Policy: No sharing)   - Incident: "Stripe Live API Key" accessed from 3 different IP addresses simultaneously   - Date: February 12, 2026   - Users: john@company.com, sarah@company.com, mike@company.com   - Resolution: Reminded team of policy, rotated credential   - Status: Resolved βœ“2. Weak Password Detected (Policy: Minimum 16 chars, high entropy)   - Item: Production/Legacy App/admin-password   - Password: "admin123" (detected Jan 20, 2026)   - Resolution: Rotated to secure password Jan 22, 2026   - Status: Resolved βœ“3. Overdue Rotation (Policy: Max 90 days)   - Item: Production/Redis/password   - Last rotation: Oct 10, 2025 (182 days ago)   - Resolution: Rotation scheduled for Apr 12, 2026   - Status: In Progress πŸ”„---🚨 EMERGENCY ACCESS EVENTS1. Database Incident (January 15, 2026)   - User: alex@company.com (CTO)   - Credential: Production/Database/postgres-admin   - Reason: PagerDuty P1 (database connection pool exhausted)   - Time: 2:47 AM PST   - Duration: 8 minutes   - Post-incident: Credential rotated within 24 hours βœ“   - Postmortem: https://docs.company.com/incidents/2026-01-152. AWS Incident (March 8, 2026)   - User: sarah@company.com (Senior SRE)   - Credential: Production/AWS/root-access-key   - Reason: S3 bucket misconfiguration (public exposure detected)   - Time: 10:23 AM PST   - Duration: 15 minutes   - Post-incident: Credential rotated within 24 hours βœ“   - Postmortem: https://docs.company.com/incidents/2026-03-08Emergency Access Compliance: 100% (both events documented, credentials rotated)---πŸ‘₯ ACCESS REVIEW DOCUMENTATIONQuarterly access review completed: March 15, 2026Reviewer: alex@company.com (CTO)Approver: board@company.com (Board of Directors)Review Results:βœ“ All production access justified and approvedβœ“ No orphaned accounts (all users active)βœ“ No over-privileged users (principle of least privilege verified)βœ“ Contractor access properly time-limited (1 active contractor)Access Changes:- Removed: mike@company.com from Production/Marketing (role change)- Added: jane@company.com to Production/Database (new SRE hire)- No other changes---πŸ“ˆ METRICS| Metric | Q1 2026 | Q4 2025 | Trend ||--------|---------|---------|-------|| Production accesses | 183 | 156 | ↑ 17% || Emergency accesses | 2 | 1 | ↑ 100% || Rotation compliance | 89% | 94% | ↓ 5% || Policy violations | 3 | 1 | ↑ 200% || Access reviews completed | 100% | 100% | β†’ || Avg. credential age | 45 days | 38 days | ↑ 18% |Recommendations:1. Rotate overdue credentials immediately (Redis, OpenAI)2. Investigate increase in policy violations (training needed?)3. Review emergency access procedures (2 incidents in Q1)4. Consider automated rotation for all production credentials---βœ… AUDITOR ATTESTATIONThis report satisfies SOC 2 requirements:- CC6.1: Logical and physical access controls βœ“- CC6.2: Prior to issuing credentials, registration and authorization βœ“- CC6.3: Removals and modifications of access βœ“- CC7.2: Detection of security events βœ“Audit Trail: https://1password.com/reports/q1-2026-access-reviewGenerated by: OpenClaw AI (verified by alex@company.com)Next Review: July 1, 2026 (Q2 2026)---Export options:- [Download as PDF]- [Export to Excel]- [Share with auditor]- [Create remediation tasks]

Impact:

  • Report generation time: 3 days β†’ 5 minutes (99% faster)
  • Auditor satisfaction: Higher (comprehensive, automated, real-time)
  • Compliance violations detected: 3 (would have been missed manually)
  • Remediation tracking: Automated tasks created
  • Board reporting: Professional, data-driven reports

8. DevOps Lead: Secret Sprawl Prevention

Scenario: Your engineering team keeps accidentally committing secrets to Git (API keys in .env files, passwords in config files). You've set up pre-commit hooks, but developers bypass them with --no-verify. Secrets keep leaking to public repos.

How OpenClaw helps:

Prevent secret sprawl with AI-powered secret detection and remediation:

Step 1: Detect secret sprawl

bash
@OpenClaw scan our codebase for hardcoded secrets and credentials

Assistant:

bash
πŸ” Secret Sprawl Scan ResultsScanned:- Repositories: 23- Files: 4,782- Lines of code: 287,493⚠️  SECRETS FOUND: 12🚨 HIGH RISK (Public repos):1. product-api/config/database.yml   - Secret: PostgreSQL password (production)   - Value: "prod_db_pass_2024" (hardcoded)   - Line: 12   - Risk: High (public repo, 47 commits since added)   - Added by: john@company.com on Feb 3, 2026   - 1Password equivalent: Production/Database/postgres-admin   - Recommendation: Rotate immediately, use 1Password reference2. frontend-app/.env.production   - Secret: Stripe Live API Key   - Value: sk_live_51A... (exposed)   - Line: 8   - Risk: Critical (public repo, commit to main)   - Added by: sarah@company.com on Mar 15, 2026   - 1Password equivalent: Production/Stripe/live-api-key   - Recommendation: Rotate immediately, revoke in Stripe dashboard⚠️  MEDIUM RISK (Private repos):3. analytics-worker/src/config.ts   - Secret: OpenAI API Key   - Value: sk-proj-... (hardcoded)   - Line: 45   - Risk: Medium (private repo, but accessible to all engineers)   - Added by: mike@company.com on Jan 20, 2026   - 1Password equivalent: Production/OpenAI/api-key   - Recommendation: Use 1Password reference[...9 more secrets...]πŸ“Š Summary:- Critical: 2 (public repos, need immediate rotation)- High: 3 (production secrets, hardcoded)- Medium: 7 (dev secrets, should use 1Password)- Total exposed secrets: 12- Estimated blast radius: 47 commits, 12 developersπŸ”§ Remediation Plan:1. Rotate critical secrets immediately (2 items)2. Replace hardcoded secrets with 1Password references (12 items)3. Add pre-commit hooks (prevent future leaks)4. Train team on 1Password CLI usage5. Monitor for future secret commits (GitHub Actions)Shall I create remediation tasks? (yes/no)Or execute automatic remediation? (auto/manual)

Step 2: Automatic remediation

You: auto

Assistant:

bash
πŸ€– Automatic Secret Remediation⚑ PHASE 1: Rotate Critical Secrets1. PostgreSQL Production Password:   βœ“ Generated new password (32 chars, high entropy)   βœ“ Updated 1Password: Production/Database/postgres-admin   βœ“ Updated Kubernetes secrets (3 services)   βœ“ Tested connections (all healthy)   βœ“ Notified #engineering2. Stripe Live API Key:   βœ“ Created new Stripe API key via API   βœ“ Updated 1Password: Production/Stripe/live-api-key   βœ“ Updated frontend-app environment variables (Vercel)   βœ“ Revoked old key in Stripe dashboard   βœ“ Tested payment processing (working)   βœ“ Notified #engineering and #security⚑ PHASE 2: Replace Hardcoded SecretsReplacing hardcoded secrets with 1Password references...Before (product-api/config/database.yml):```yamlproduction:  password: "prod_db_pass_2024"

After:

yaml
production:  password: op://Production/Database/postgres-admin

Changes: βœ“ product-api/config/database.yml (1 secret) βœ“ frontend-app/.env.production (1 secret) βœ“ analytics-worker/src/config.ts (1 secret) βœ“ email-service/.env (2 secrets) βœ“ admin-dashboard/config/production.js (1 secret) [...6 more files...]

⚑ PHASE 3: Add Pre-Commit Hooks

βœ“ Created .pre-commit-config.yaml βœ“ Added detect-secrets hook βœ“ Added 1Password reference validator βœ“ Configured to block commits with hardcoded secrets βœ“ Added to all 23 repositories

⚑ PHASE 4: GitHub Actions Monitoring

βœ“ Created secret-detection.yml workflow βœ“ Scans all commits for leaked secrets βœ“ Notifies #security if secrets detected βœ“ Auto-creates remediation issues βœ“ Deployed to all repositories

⚑ PHASE 5: Team Training

βœ“ Created documentation: docs/secrets-management.md βœ“ Scheduled training session (April 15, 2pm) βœ“ Sent Slack message to #engineering:


πŸ” Secret Management Update

We've detected and remediated 12 hardcoded secrets in our codebase.

Going forward:

  • Use 1Password CLI: op read "op://vault/item/field"
  • Use 1Password references in config files
  • Pre-commit hooks will block hardcoded secrets
  • GitHub Actions will alert on leaked secrets

Training: April 15, 2pm (calendar invite sent) Docs: https://docs.company.com/secrets-management

Questions? Ask in #security or DM alex@company.com

βœ… Remediation Complete!

Results: βœ“ Rotated 2 critical secrets βœ“ Replaced 12 hardcoded secrets with 1Password references βœ“ Added pre-commit hooks to 23 repositories βœ“ Deployed GitHub Actions monitoring βœ“ Scheduled team training

Security posture improved:

  • Before: 12 exposed secrets
  • After: 0 exposed secrets
  • Future prevention: Pre-commit hooks + monitoring

Audit trail: https://1password.com/reports/remediation-202604 Next scan: April 17, 2026 (weekly)

bash
**Impact:**- Secret sprawl eliminated: 12 β†’ 0 hardcoded secrets- Remediation time: 2 days β†’ 30 minutes (96% faster)- Future prevention: Pre-commit hooks + monitoring- Security incidents avoided: Untold number (proactive fix)- Team education: Training and documentation created---### Features Deep Dive**Natural Language Secret Retrieval**Forget memorizing vault names, item names, and field names. Just describe what you need:

@OpenClaw get the production database password @OpenClaw what's the Stripe API key for testing? @OpenClaw retrieve AWS credentials for the staging environment @OpenClaw show me all GitHub tokens

bash
The assistant understands:- Fuzzy matching ("db password" = "database password")- Environment context ("production" vs "staging" vs "test")- Service names ("Stripe", "AWS", "GitHub")- Credential types ("password", "API key", "token")**Secure Credential Display**Credentials are displayed securely:- Redacted by default (click to reveal)- Auto-expire after 60 seconds (clipboard cleared)- Never logged in chat history- Access logged for audit trail**Environment Variable Injection**Load all secrets for a service at once:

@OpenClaw load environment variables for product-api production

bash
The assistant:1. Reads your `.env.example` or deployment config2. Maps each variable to 1Password vault items3. Retrieves all secrets in parallel4. Injects into shell session, .env file, or CI/CD5. Logs access for complianceSupported targets:- Shell session (`export VAR=value`)- .env file (creates `.env.local`)- Kubernetes secrets (updates existing secret)- Docker compose (updates docker-compose.override.yml)- CI/CD variables (GitHub Actions, GitLab CI)**Credential Rotation**Manual or automated:

@OpenClaw rotate the Stripe API key @OpenClaw schedule automatic rotation for all production credentials every 90 days

bash
Rotation process:1. Generate new credential (secure random or via API)2. Update 1Password item3. Update all services using the credential4. Test connectivity5. Deactivate old credential (24hr grace period)6. Notify team7. Log rotation**Vault Search and Organization**Find secrets across all vaults:

@OpenClaw search for "stripe" across all vaults @OpenClaw find duplicate API keys @OpenClaw list all credentials that expire this month @OpenClaw organize vault items by service and environment

bash
**Access Audit and Review**Generate compliance reports:

@OpenClaw who accessed production secrets last week? @OpenClaw generate SOC 2 access review for Q1 2026 @OpenClaw audit credential rotation compliance @OpenClaw create an access report for the security team

bash
**Emergency Access**Break-glass scenarios:

@OpenClaw EMERGENCY: production database password

bash
Emergency access:- Logs access with reason (compliance)- Notifies security team- Provides credential without clipboard exposure- Creates follow-up task to rotate credential- Generates incident timeline**Team Management**Onboard and offboard users:

@OpenClaw onboard new engineer sarah@company.com @OpenClaw offboard contractor john@contractor.com and rotate accessed credentials @OpenClaw grant temporary access to staging vaults for 2 weeks

bash
**Secret Sprawl Detection**Scan code for hardcoded secrets:

@OpenClaw scan codebase for hardcoded secrets @OpenClaw detect leaked credentials in Git history @OpenClaw replace hardcoded secrets with 1Password references

bash
**1Password CLI Integration**For advanced users, the assistant can execute 1Password CLI commands:

@OpenClaw run: op item list --vault Production @OpenClaw run: op item get "Stripe API Key" --fields credential @OpenClaw run: op vault list

bash
**Service Account Management**Manage 1Password service accounts:

@OpenClaw create service account for CI/CD pipeline @OpenClaw grant service account access to Deployment vault @OpenClaw rotate service account token @OpenClaw audit service account access

bash
**Compliance Reporting**Generate reports for auditors:

@OpenClaw generate SOC 2 access report @OpenClaw create ISO 27001 credential rotation report @OpenClaw export audit trail for last quarter @OpenClaw document access review process

bash
**Incident Response**Handle leaked credentials:

@OpenClaw INCIDENT: GitHub token leaked in public repo @OpenClaw create incident response plan @OpenClaw rotate all affected credentials @OpenClaw notify security team and stakeholders

bash
---## Setup Option 1: HeraClaw Cloud (Recommended)**Time required:** 60 seconds**Technical skill:** None**Cost:** Included in HeraClaw Cloud subscription**Best for:** 95% of users, all team sizes**Why HeraClaw Cloud?**- No 1Password CLI installation required- No service account creation- No token management or rotation- No vault permission debugging- No op://reference syntax to learn- Professional support included- Automatic updates and security patches- 99.9% uptime SLA- Enterprise-grade security (SOC 2, GDPR)**Steps:****1. Sign up for HeraClaw Cloud**- Visit cloud.getopenclaw.ai- Click "Sign In" (no credit card required)- Create your account (takes 60 seconds)**2. Navigate to Integrations**- Click "Integrations" in the left sidebar- Find "1Password" in the list- Click "Connect to 1Password"**3. Authorize 1Password Access**- 1Password OAuth screen appears- Select your 1Password account- Choose which vaults to grant access to- Click "Allow"**4. Test the Integration**- In HeraClaw chat: `@OpenClaw list my 1Password vaults`- You should see your vaults listed- Try: `@OpenClaw get my GitHub API token`**That's it!** You're up and running.**What You Get with HeraClaw Cloud:**βœ… **Instant Setup** - No CLI installation, no service accountsβœ… **Secure by Default** - No master password exposure, no token managementβœ… **Automatic Updates** - We handle 1Password CLI and API changesβœ… **Professional Support** - Email, chat, and phone supportβœ… **99.9% Uptime** - SLA-backed reliabilityβœ… **Enterprise Security** - SOC 2, GDPR, HIPAA availableβœ… **Advanced Features** - Rotation automation, audit reports, compliance toolsβœ… **No Maintenance** - We manage everything**Pricing:** See cloud.getopenclaw.ai/pricing (starts with affordable team plans)**Get Started:** [Start with HeraClaw Cloud β†’](https://cloud.getopenclaw.ai/auth/signin)---## Setup Option 2: Self-Hosted (Advanced)**Time required:** 30-45 minutes (first time), 15-20 minutes (if experienced)**Technical skill:** Intermediate to Advanced**Cost:** 1Password account + your time**Best for:** DevOps engineers, technical teams, compliance requirements**Who should self-host?**βœ… DevOps engineers comfortable with CLI toolsβœ… Organizations with strict data residency requirementsβœ… Teams already using 1Password CLIβœ… Technical enthusiasts who want full controlβœ… Companies that cannot use third-party SaaS**Who should NOT self-host?**❌ Small teams without DevOps expertise❌ Anyone who values time over cost savings❌ Teams without security expertise❌ Organizations without compliance teams**Prerequisites:**- OpenClaw installed and running (Mac/Linux/VPS)- 1Password account (Team, Business, or Enterprise)- 1Password CLI installed- Terminal access- Understanding of service accounts and OAuth### Detailed Self-Hosted Setup**Step 1: Install 1Password CLI****macOS (Homebrew):**```bashbrew install 1password-cli# Verify installationop --version# Should output: 2.x.x

Linux:

bash
# Debian/Ubuntucurl -sS https://downloads.1password.com/linux/keys/1password.asc | \  sudo gpg --dearmor --output /usr/share/keyrings/1password-archive-keyring.gpgecho "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/1password-archive-keyring.gpg] https://downloads.1password.com/linux/debian/$(dpkg --print-architecture) stable main" | \  sudo tee /etc/apt/sources.list.d/1password.listsudo apt update && sudo apt install 1password-cli# Verifyop --version

Docker:

bash
docker run -it 1password/op:2 --version

Step 2: Create a Service Account

1Password service accounts provide programmatic access without master password.

  1. Go to 1Password.com
  2. Sign in to your account
  3. Go to Settings β†’ Service Accounts (Business/Enterprise only)
  4. Click "Create Service Account"
  5. Name: "OpenClaw Integration"
  6. Grant access to vaults:
    • βœ“ Development (read-only)
    • βœ“ Staging (read-only)
    • βœ“ Production (read-only if needed)
    • βœ— Sensitive vaults (HR, Finance)
  7. Click "Create"
  8. Copy the service account token (starts with ops_)
  9. Save it securely - you'll only see it once

Alternative: Personal Access Token (deprecated)

If you don't have service accounts:

bash
# Sign in to 1Password CLIop account add# Follow prompts:# - Enter your 1password.com URL# - Enter your email# - Enter your Secret Key# - Enter your Master Password# Create a sessionexport OP_SESSION_my=$(op signin --raw)

Step 3: Configure OpenClaw

Edit your OpenClaw config file (~/.openclaw/config.yaml):

yaml
integrations:  onepassword:    enabled: true        # Service account token (recommended)    serviceAccountToken: "ops_your_service_account_token_here"        # Or use CLI session (less secure)    # useSession: true    # sessionEnvVar: "OP_SESSION_my"        # Default vault for retrievals    defaultVault: "Development"        # Vaults accessible to AI assistant    allowedVaults:      - "Development"      - "Staging"      - "Production"  # Only if approved by security        # Block sensitive vaults    blockedVaults:      - "HR"      - "Finance"      - "Executive"        # Cache retrieved secrets for N seconds (reduces API calls)    cacheTTL: 300  # 5 minutes        # Security: redact secrets in chat logs    redactSecrets: true        # Audit: log all secret accesses    auditLog: true    auditLogPath: "/var/log/openclaw/1password-audit.log"

Step 4: Test the Integration

Start OpenClaw:

bash
openclaw gateway start# Check logsopenclaw gateway logs --follow

Look for:

bash
βœ“ 1Password CLI detected (version 2.x.x)βœ“ Service account authenticatedβœ“ Vaults accessible: Development, Staging, Productionβœ“ 1Password integration enabled

Test retrieval:

bash
# In OpenClaw chat@OpenClaw list my 1Password vaults# Should show:# - Development# - Staging  # - Production# Try retrieving a secret@OpenClaw get the GitHub API token from Development vault

Step 5: Configure Vault Permissions

Fine-tune access control:

yaml
integrations:  onepassword:    # Per-vault permissions    vaultPermissions:      Development:        read: true        write: false  # Read-only        rotate: false            Staging:        read: true        write: false        rotate: true  # Can rotate credentials            Production:        read: true        write: false        rotate: true        # Require approval for access        requireApproval: true        approvers:          - "security-team@company.com"          - "cto@company.com"

Step 6: Set Up Environment Variable Injection

Configure environment variable mapping:

yaml
integrations:  onepassword:    # Map environment variables to 1Password items    envMapping:      DATABASE_URL:        vault: "Production"        item: "PostgreSQL Production"        field: "connection_string"            STRIPE_API_KEY:        vault: "Production"        item: "Stripe Live"        field: "api_key"            AWS_ACCESS_KEY_ID:        vault: "Production"        item: "AWS Root"        field: "access_key_id"            AWS_SECRET_ACCESS_KEY:        vault: "Production"        item: "AWS Root"        field: "secret_access_key"

Now you can:

bash
@OpenClaw load environment variables for production# The assistant will:# 1. Read the envMapping config# 2. Retrieve all secrets from 1Password# 3. Inject into shell session or .env file

Step 7: Enable Rotation Automation (Optional)

yaml
integrations:  onepassword:    rotation:      enabled: true            # Rotation schedule      schedules:        - name: "Production credentials"          vault: "Production"          items:            - "PostgreSQL Production"            - "Stripe Live"            - "AWS Root"          frequency: "90 days"          notify:            - "#security"            - "devops@company.com"                - name: "Staging credentials"          vault: "Staging"          items: "*"  # All items          frequency: "30 days"          notify:            - "#engineering"            # Rotation actions      postRotation:        - type: "update_kubernetes"          secrets:            - "product-api-prod"            - "analytics-worker-prod"                - type: "notify_slack"          channel: "#engineering"          message: "Production credentials rotated"

Step 8: Configure Audit Logging

yaml
integrations:  onepassword:    audit:      enabled: true      logFile: "/var/log/openclaw/1password-audit.log"            # What to log      logEvents:        - "retrieve"   # Secret retrievals        - "rotate"     # Credential rotations        - "search"     # Vault searches        - "emergency"  # Emergency access            # Include in logs      includeMetadata:        user: true        timestamp: true        vault: true        item: true        field: true        reason: true            # Never log actual secret values      redactValues: true            # Compliance: export to SIEM      export:        enabled: true        format: "json"        destination: "syslog://siem.company.com:514"

Audit log format:

json
{  "timestamp": "2026-04-10T14:23:45Z",  "event": "retrieve",  "user": "john@company.com",  "vault": "Production",  "item": "PostgreSQL Production",  "field": "password",  "reason": "Deployment to staging",  "ip_address": "192.168.1.100",  "user_agent": "OpenClaw/1.0"}

Advanced Self-Hosted Configuration

Service Account Best Practices

  1. Principle of Least Privilege:

    • Grant access only to needed vaults
    • Use read-only access when possible
    • Create separate service accounts per environment
  2. Token Rotation:

    • Rotate service account tokens every 90 days
    • Automate rotation with calendar reminders
    • Store tokens in environment variables, not config files
  3. Monitoring:

    • Monitor service account usage
    • Alert on unusual access patterns
    • Review audit logs weekly

Environment Variable Security

Store service account token securely:

bash
# Option 1: Environment variable (less secure)export OP_SERVICE_ACCOUNT_TOKEN="ops_..."# Option 2: 1Password reference (more secure, recursive!)export OP_SERVICE_ACCOUNT_TOKEN=$(op read "op://Infrastructure/OpenClaw/service_account_token")# Option 3: Kubernetes secret (for cloud deployments)kubectl create secret generic openclaw-1password \  --from-literal=token="ops_..."# Reference in config:integrations:  onepassword:    serviceAccountToken: ${OP_SERVICE_ACCOUNT_TOKEN}

Multi-Account Setup

Manage multiple 1Password accounts:

yaml
integrations:  onepassword:    accounts:      company:        serviceAccountToken: "ops_company_token"        vaults:          - "Development"          - "Staging"          - "Production"            client_acme:        serviceAccountToken: "ops_acme_token"        vaults:          - "Acme Production"          - "Acme Staging"            personal:        useSession: true        sessionEnvVar: "OP_SESSION_personal"        vaults:          - "Personal"

Now you can:

bash
@OpenClaw get database password from company account@OpenClaw get API key from client_acme account  @OpenClaw list vaults in personal account

Custom Field Mapping

Map custom 1Password fields:

yaml
integrations:  onepassword:    fieldMapping:      # Standard fields (work automatically)      password: ["password", "credential"]      username: ["username", "email", "user"]      url: ["website", "url", "link"]            # Custom fields (your organization)      api_key: ["api_key", "apikey", "key"]      secret_key: ["secret_key", "secret"]      connection_string: ["connection_string", "conn_str", "url"]      ssh_key: ["ssh_private_key", "private_key"]

Credential Rotation Workflows

Define custom rotation logic:

yaml
integrations:  onepassword:    rotationWorkflows:      stripe_api_key:        steps:          - name: "Generate new Stripe key"            action: "stripe_api_create_key"            params:              name: "Production API Key {{date}}"                    - name: "Update 1Password"            action: "1password_update_item"            params:              vault: "Production"              item: "Stripe Live"              field: "api_key"              value: "{{new_key}}"                    - name: "Update Vercel env"            action: "vercel_update_env"            params:              project: "product-api"              key: "STRIPE_API_KEY"              value: "{{new_key}}"                    - name: "Redeploy services"            action: "vercel_redeploy"            params:              project: "product-api"                    - name: "Test payment"            action: "http_request"            params:              url: "https://api.company.com/health/stripe"              expect: 200                    - name: "Revoke old key"            action: "stripe_api_revoke_key"            params:              key: "{{old_key}}"                    - name: "Notify team"            action: "slack_message"            params:              channel: "#engineering"              text: "Stripe API key rotated successfully"

Emergency Access Configuration

Break-glass scenarios:

yaml
integrations:  onepassword:    emergencyAccess:      enabled: true            # Require keyword to trigger      keyword: "EMERGENCY"            # Grant temporary access to normally blocked vaults      grantAccess:        - "Production"        - "Infrastructure"            # Notifications      notify:        slack:          - "#security-alerts"          - "#engineering-alerts"        email:          - "security@company.com"          - "cto@company.com"        pagerduty:          service: "security-incidents"            # Post-emergency actions      postAccess:        - action: "create_incident_ticket"          system: "jira"          project: "SEC"                - action: "schedule_credential_rotation"          delay: "24 hours"          reason: "Emergency access granted"                - action: "create_postmortem"          template: "emergency-access"

Usage:

bash
@OpenClaw EMERGENCY: production database password# Triggers:# 1. Grant access# 2. Log event# 3. Notify security team# 4. Create incident ticket# 5. Schedule rotation

Troubleshooting Self-Hosted Setup

1Password CLI Not Found

Symptoms: Error: "1Password CLI not found"

Fix:

bash
# Verify installationwhich op# Should output: /usr/local/bin/op (or similar)# If not found, install:brew install 1password-cli  # macOS# or follow Linux installation steps above# Verify OpenClaw can find itopenclaw config test --integration onepassword

Service Account Authentication Failed

Symptoms: Error: "Authentication failed" or "Invalid token"

Potential causes:

  1. Incorrect service account token
  2. Token revoked or expired
  3. Insufficient vault permissions

Fix:

bash
# Test token manuallyexport OP_SERVICE_ACCOUNT_TOKEN="ops_your_token"op vault list# Should list vaults. If error:# - Verify token is correct (copy-paste error?)# - Check token hasn't been revoked in 1Password settings# - Verify token has access to at least one vault# Update OpenClaw config with correct tokenvim ~/.openclaw/config.yaml# Update serviceAccountToken field# Restart OpenClawopenclaw gateway restart

Vault Not Accessible

Symptoms: Error: "Vault not found" or "Access denied"

Potential causes:

  1. Vault name typo
  2. Service account doesn't have access
  3. Vault is archived or deleted

Fix:

bash
# List accessible vaultsop vault list# Expected output:ID                            NAMEabcdef12-3456-7890-abcd      Developmentghijkl12-3456-7890-efgh      Staging# If vault missing:# 1. Go to 1Password.com# 2. Settings β†’ Service Accounts# 3. Edit your service account# 4. Grant access to the vault# 5. Save# Update OpenClaw configvim ~/.openclaw/config.yaml# Update allowedVaults with exact vault names

Secret Retrieval Fails

Symptoms: Error: "Item not found" or "Field not found"

Potential causes:

  1. Item name doesn't match
  2. Field name doesn't match
  3. Item is in different vault

Fix:

bash
# List items in vaultop item list --vault Production# Get item detailsop item get "Database Password" --vault Production# Check field namesop item get "Database Password" --vault Production --format json | jq '.fields'# Expected output:[  {    "id": "password",    "type": "concealed",    "label": "password",    "value": "..."  }]# Use exact names in OpenClaw@OpenClaw get password field from Database Password item in Production vault

Environment Variable Injection Not Working

Symptoms: Environment variables not set, or set to empty values

Potential causes:

  1. Mapping configuration incorrect
  2. Field names don't match
  3. Vault/item permissions issue

Fix:

bash
# Test mapping manuallyop read "op://Production/PostgreSQL Production/password"# Should output the password. If error:# - Verify vault name exact (case-sensitive)# - Verify item name exact# - Verify field name exact# Check OpenClaw configvim ~/.openclaw/config.yamlintegrations:  onepassword:    envMapping:      DATABASE_PASSWORD:        vault: "Production"  # Exact name        item: "PostgreSQL Production"  # Exact name        field: "password"  # Exact field ID# Restart and testopenclaw gateway restart@OpenClaw load environment variables

Credential Rotation Fails

Symptoms: Error during rotation, or services break after rotation

Potential causes:

  1. Insufficient write permissions
  2. Services not updated with new credential
  3. Old credential deactivated too quickly

Fix:

bash
# Verify write permissionsop item edit "Database Password" --vault Production password="test123"# If error: "insufficient permissions"# - Service account needs write access# - Update in 1Password settings# Check rotation workflowvim ~/.openclaw/config.yamlintegrations:  onepassword:    rotation:      # Add grace period      gracePeriod: "24 hours"  # Keep old credential active            # Test before deactivating      testRotation: true            # Rollback on failure      rollbackOnFailure: true# Manual rotation with testing@OpenClaw rotate database password with testing

Audit Logs Not Created

Symptoms: Audit log file empty or doesn't exist

Potential causes:

  1. Log file path incorrect
  2. Permission denied
  3. Directory doesn't exist

Fix:

bash
# Create log directorysudo mkdir -p /var/log/openclawsudo chown $(whoami) /var/log/openclaw# Verify configvim ~/.openclaw/config.yamlintegrations:  onepassword:    audit:      enabled: true      logFile: "/var/log/openclaw/1password-audit.log"# Restart and testopenclaw gateway restart@OpenClaw get test secret from Development vault# Check logtail -f /var/log/openclaw/1password-audit.log# Should show:{"timestamp":"2026-04-10T14:23:45Z","event":"retrieve",...}

Security Best Practices for Self-Hosted

1. Protect Service Account Tokens

bash
# Never commit tokens to gitecho "config.yaml" >> .gitignore# Use environment variablesexport OP_SERVICE_ACCOUNT_TOKEN="ops_..."# Or use a secrets managerexport OP_SERVICE_ACCOUNT_TOKEN=$(op read "op://Infrastructure/OpenClaw/token")# Or Kubernetes secretskubectl create secret generic openclaw-1password --from-literal=token="ops_..."

2. Principle of Least Privilege

yaml
integrations:  onepassword:    # Only grant access to necessary vaults    allowedVaults:      - "Development"   # All engineers      - "Staging"       # Senior engineers        # Block sensitive vaults    blockedVaults:      - "Production"  # Requires approval      - "HR"      - "Finance"      - "Executive"

3. Rotate Service Account Tokens

Every 90 days:

  1. Go to 1Password.com β†’ Settings β†’ Service Accounts
  2. Edit service account
  3. Click "Regenerate Token"
  4. Update OpenClaw config
  5. Restart OpenClaw

4. Enable Audit Logging

Always enable and monitor:

yaml
integrations:  onepassword:    audit:      enabled: true      logFile: "/var/log/openclaw/1password-audit.log"      redactValues: true  # Never log secrets

5. Require Approval for Production Access

yaml
integrations:  onepassword:    vaultPermissions:      Production:        read: true        requireApproval: true        approvers:          - "security@company.com"          - "cto@company.com"        approvalTimeout: "15 minutes"

6. Monitor for Anomalies

yaml
integrations:  onepassword:    monitoring:      enabled: true      alertOn:        - "high_frequency_access"  # >10 retrievals in 1 minute        - "unusual_hours"           # Access at 3 AM        - "new_ip_address"          # Access from unknown IP        - "failed_auth"             # Failed authentication attempts            notify:        slack: "#security-alerts"        email: "security@company.com"

7. Use Read-Only Access When Possible

yaml
integrations:  onepassword:    # Read-only by default    defaultPermissions:      read: true      write: false      rotate: false        # Explicit write permissions only when needed    vaultPermissions:      Staging:        rotate: true  # Can rotate staging credentials

Comparison: HeraClaw Cloud vs Self-Hosted

FeatureHeraClaw Cloud ✨Self-Hosted πŸ› οΈ
Setup time60 seconds30-45 minutes (first time)
Technical skillNoneIntermediate to Advanced
1Password CLIPre-installedManual installation
Service accountsManaged for youManual creation
Token rotationAutomaticManual (every 90 days)
Vault permissionsGUI configurationYAML configuration
UpdatesAutomaticManual updates required
SupportProfessional support teamCommunity forums
Uptime SLA99.9% guaranteedDIY
Security certsSOC 2, GDPR, HIPAASelf-certification
Monitoring24/7 monitoringYou set up alerts
CostMonthly subscription1Password + your time
Credential rotationAutomated workflowsManual scripting
Audit reportsOne-click generationCustom scripting
CompliancePre-built reportsDIY
Emergency accessBuilt-in workflowsManual configuration
Secret sprawl detectionAutomated scanningManual setup
Team onboardingAutomated workflowsManual processes

Why 95% of users choose HeraClaw Cloud:

βœ… No master password exposure - Cloud never sees your master password βœ… No service account management - We handle token creation and rotation βœ… Automatic CLI updates - 1Password CLI updates handled automatically βœ… One-click compliance reports - SOC 2, ISO 27001 reports in seconds βœ… Professional support - Security experts available 24/7 βœ… Advanced automation - Rotation, auditing, sprawl detection built-in

When self-hosting makes sense:

βœ… Data cannot leave your infrastructure (air-gapped environments) βœ… You have dedicated security engineers βœ… You need to customize rotation workflows extensively βœ… You're already using 1Password CLI in your workflows βœ… You have 24/7 security operations center (SOC)


Frequently Asked Questions

Q: Does this work with 1Password for Families?

A: Yes for self-hosted (using personal access), but HeraClaw Cloud requires 1Password Teams, Business, or Enterprise (for service accounts).

Q: Can I use this without a service account?

A: Self-hosted: yes, use personal CLI session. Cloud: no, we require service accounts for security.

Q: Will my master password be exposed?

A: No. Service accounts don't use your master password. HeraClaw Cloud never sees your master password.

Q: Can the AI assistant read all my 1Password items?

A: Only items in vaults you explicitly grant access to. Configure allowedVaults and blockedVaults.

Q: Are secrets logged in chat history?

A: No. Secrets are redacted by default. Only metadata is logged (vault name, item name, timestamp).

Q: Can I rotate credentials automatically?

A: Yes! Configure rotation schedules in OpenClaw config or use HeraClaw Cloud's automated rotation workflows.

Q: What about emergency access at 3 AM?

A: Emergency access workflows provide immediate access with full audit trail and automatic post-incident rotation.

Q: How do I onboard new team members?

A: @OpenClaw onboard new engineer sarah@company.com - automates 1Password invite, vault access, and documentation.

Q: Can I detect secrets leaked in code?

A: Yes! @OpenClaw scan codebase for hardcoded secrets - detects leaks and suggests 1Password references.

Q: What about compliance audits (SOC 2, ISO 27001)?

A: One-click compliance reports: @OpenClaw generate SOC 2 access review for Q1 2026

Q: Can I use this in CI/CD pipelines?

A: Yes! Environment variable injection works in GitHub Actions, GitLab CI, Jenkins, etc.

Q: How fast is secret retrieval?

A: Typically 1-2 seconds (1Password API latency). Cached secrets return instantly.

Q: Can I manage multiple 1Password accounts?

A: Self-hosted: yes, configure multiple accounts. Cloud: contact support for multi-account setup.

Q: What if I accidentally expose a secret?

A: @OpenClaw INCIDENT: GitHub token leaked - triggers incident response workflow with automatic rotation.

Q: Can contractors get temporary access?

A: Yes! @OpenClaw grant contractor access for 6 weeks - automatic access removal and credential rotation.

Q: How do I prevent duplicate credentials across vaults?

A: @OpenClaw find duplicate credentials - detects duplicates and suggests consolidation.

Q: Can I use 1Password references (op://vault/item/field)?

A: Self-hosted: yes, configure op:// references in env files. Cloud: automatic reference generation.

Q: What about SSH key management?

A: Fully supported. Store SSH keys in 1Password, retrieve with @OpenClaw get SSH key for production servers

Q: Can I audit who accessed production secrets?

A: Yes! @OpenClaw who accessed production database password last week? - instant audit reports.

Q: How do I migrate from hardcoded secrets?

A: @OpenClaw scan and replace hardcoded secrets with 1Password references - automated migration.

Q: What if 1Password is down?

A: OpenClaw caches recently-used secrets (configurable TTL). Critical secrets remain accessible during outages.


Get Started

For 95% of users (recommended):

Start with HeraClaw Cloud β†’

  • 60-second setup
  • No 1Password CLI installation
  • No service account management
  • No master password exposure
  • Professional support
  • 99.9% uptime SLA
  • No credit card required

For advanced users only:

Self-Hosting Setup Guide β†’

  • 30-45 minute setup
  • Requires 1Password CLI
  • Requires service account creation
  • You maintain infrastructure
  • Full control and customization

Questions? Email support@cloud.getopenclaw.ai or join our community Slack for help.

Last updated: April 10, 2026

Built with OpenClaw β€” The open-source AI assistant platform. Self-host or use HeraClaw Cloud.

Features

Secret injection

Inject 1Password secrets into skill environments at runtime

CLI integration

Uses official 1Password CLI with desktop app authentication

Multi-vault support

Access Personal, Work, and shared vaults simultaneously

Config references

Reference op:// URIs directly in OpenClaw configuration

Password generation

Create and store new credentials via natural language

Zero secrets on disk

Secrets fetched at runtime, never stored in files or logs

Use Cases

β†’

Deployment credentials

Inject AWS, GCP, and other keys at deploy time without hardcoding

β†’

API key management

Reference API keys by name β€” update in 1Password, auto-refreshes everywhere

β†’

Team secret sharing

Share credentials securely without exposing values in chat or config

β†’

Secret rotation

Update rotated credentials once, propagate everywhere automatically

Setup Guide

Requirements

  • βœ“1Password account
  • βœ“1Password CLI (op) installed
  • βœ“Desktop app integration enabled (recommended)
1

Install 1Password CLI

Download and install the op CLI from 1password.com/downloads/command-line

2

Enable desktop integration

In 1Password settings, enable 'Integrate with 1Password CLI' for seamless authentication.

3

Sign in

Run 'op signin' or let the desktop app handle authentication.

4

Test access

Run 'op vault list' to confirm you can access your vaults.

Limitations

  • ⚠️Biometric auth may interrupt automated workflows
  • ⚠️Some operations require manual approval

Frequently Asked Questions

Will my passwords be visible in chat?

No. Secrets are used behind the scenes. Your assistant can use them without displaying them in messages.

Do I need 1Password Teams or Business?

No, personal 1Password accounts work fine. Teams/Business add features like shared vaults.

How is this different from storing secrets in config?

1Password provides encryption, access control, audit logs, and easy rotation. Config files are just text.

Can it create or modify secrets?

Yes, the op CLI supports creating and editing items. Your assistant can manage secrets programmatically.

πŸ”₯ Your AI should run your business, not just answer questions.

We'll show you how.Free to join.

Join Vibe Combinator β†’

πŸ™ Your AI should run your business.

Weekly live builds + template vault. We'll show you how to make AI actually work.Free to join.

Join Vibe Combinator β†’