--- summary: "CLI reference for `openclaw secrets` (reload, audit, configure, apply)" read_when: - Re-resolving secret refs at runtime - Auditing plaintext residues and unresolved refs - Configuring SecretRefs and applying one-way scrub changes title: "secrets" --- # `openclaw secrets` Secrets runtime controls. Related: - Secrets guide: [Secrets Management](/gateway/secrets) - Security guide: [Security](/gateway/security) ## Reload runtime snapshot Re-resolve secret refs and atomically swap runtime snapshot. ```bash openclaw secrets reload openclaw secrets reload --json ``` Notes: - Uses gateway RPC method `secrets.reload`. - If resolution fails, gateway keeps last-known-good snapshot. - JSON response includes `warningCount`. ## Audit Scan OpenClaw state for: - plaintext secret storage - unresolved refs - precedence drift (`auth-profiles` shadowing config refs) - legacy residues (`auth.json`, OAuth out-of-scope notes) ```bash openclaw secrets audit openclaw secrets audit --check openclaw secrets audit --json ``` Exit behavior: - `--check` exits non-zero on findings. - unresolved refs exit with a higher-priority non-zero code. ## Configure (interactive helper) Build provider + SecretRef changes interactively, run preflight, and optionally apply: ```bash openclaw secrets configure openclaw secrets configure --plan-out /tmp/openclaw-secrets-plan.json openclaw secrets configure --apply --yes openclaw secrets configure --providers-only openclaw secrets configure --skip-provider-setup openclaw secrets configure --json ``` Flow: - Provider setup first (`add/edit/remove` for `secrets.providers` aliases). - Credential mapping second (select fields and assign `{source, provider, id}` refs). - Preflight and optional apply last. Flags: - `--providers-only`: configure `secrets.providers` only, skip credential mapping. - `--skip-provider-setup`: skip provider setup and map credentials to existing providers. Notes: - `configure` targets secret-bearing fields in `openclaw.json`. - It performs preflight resolution before apply. - Apply path is one-way for migrated plaintext values. ## Apply a saved plan Apply or preflight a plan generated previously: ```bash openclaw secrets apply --from /tmp/openclaw-secrets-plan.json openclaw secrets apply --from /tmp/openclaw-secrets-plan.json --dry-run openclaw secrets apply --from /tmp/openclaw-secrets-plan.json --json ``` ## Why no rollback backups `secrets apply` intentionally does not write rollback backups containing old plaintext values. Safety comes from strict preflight + atomic-ish apply with best-effort in-memory restore on failure. ## Example ```bash # Audit first, then configure, then confirm clean: openclaw secrets audit --check openclaw secrets configure openclaw secrets audit --check ```