✓ Verified 📱 Social Media ✓ Enhanced Data

Key Expiry Tracker

Track **only expiry dates** (metadata) for API keys/client secrets/certificates and alert before the

Rating
4.5 (420 reviews)
Downloads
2,645 downloads
Version
1.0.0

Overview

Track **only expiry dates** (metadata) for API keys/client secrets/certificates and alert before they expire.

Complete Documentation

View Source →

Key Expiry Tracker

Track only expiry dates (metadata) for API keys/client secrets/certificates and alert before they expire.

Description

Key Expiry Tracker helps you avoid outages by tracking only the expiry dates of credentials (API keys, client secrets, certificates) and reminding you ahead of time.

It never stores, reads, or transmits any credential values — you maintain a local JSON list with labels and expiry timestamps.

Token cost: ~200-500 tokens per run (cron + simple JSON parsing).

Usage

Add a new credential

Edit ~/.openclaw/workspace/.credentials.json:

json
{
  "credentials": [
    {
      "name": "Azure OpenClaw Calendar",
      "type": "client-secret",
      "expires": "2026-03-15T00:00:00Z",
      "provider": "Microsoft Azure",
      "notes": "For M365 calendar integration"
    }
  ]
}

Run check manually

bash
~/.openclaw/workspace/skills/key-expiry-tracker/scripts/check-credentials.sh

Cron schedule

Weekly on Sunday at 10:00:

text
cron add --name "key-expiry-tracker" \
  --schedule "0 10 * * 0" \
  --payload '{"kind":"systemEvent","text":"Run key-expiry-tracker weekly check"}' \
  --sessionTarget main

Credential Types

  • client-secret: Azure AD, API keys
  • api-key: Third-party APIs (OpenAI, etc.)
  • certificate: SSL/TLS certs
  • token: OAuth tokens, refresh tokens
  • password: Passwords with expiry

Alert Thresholds

  • 14 days: Warning (yellow)
  • 7 days: Critical (red)
  • Expired: Already expired!

JSON Schema

json
{
  "credentials": [
    {
      "name": "string (required)",
      "type": "client-secret|api-key|certificate|token|password",
      "expires": "ISO-8601 timestamp (required)",
      "provider": "string (optional)",
      "renewed": "ISO-8601 timestamp (optional, last renewal)",
      "notes": "string (optional)"
    }
  ]
}

Installation

Terminal bash

openclaw install key-expiry-tracker
    
Copied!

💻Code Examples

~/.openclaw/workspace/skills/key-expiry-tracker/scripts/check-credentials.sh

openclawworkspaceskillskey-expiry-trackerscriptscheck-credentialssh.txt
### Cron schedule

Weekly on Sunday at 10:00:

--sessionTarget main

---sessiontarget-main.txt
## Credential Types

- `client-secret`: Azure AD, API keys
- `api-key`: Third-party APIs (OpenAI, etc.)
- `certificate`: SSL/TLS certs
- `token`: OAuth tokens, refresh tokens
- `password`: Passwords with expiry

## Alert Thresholds

- **14 days**: Warning (yellow)
- **7 days**: Critical (red)
- **Expired**: Already expired!

## JSON Schema
example.json
{
  "credentials": [
    {
      "name": "Azure OpenClaw Calendar",
      "type": "client-secret",
      "expires": "2026-03-15T00:00:00Z",
      "provider": "Microsoft Azure",
      "notes": "For M365 calendar integration"
    }
  ]
}
example.txt
cron add --name "key-expiry-tracker" \
  --schedule "0 10 * * 0" \
  --payload '{"kind":"systemEvent","text":"Run key-expiry-tracker weekly check"}' \
  --sessionTarget main
example.json
{
  "credentials": [
    {
      "name": "string (required)",
      "type": "client-secret|api-key|certificate|token|password",
      "expires": "ISO-8601 timestamp (required)",
      "provider": "string (optional)",
      "renewed": "ISO-8601 timestamp (optional, last renewal)",
      "notes": "string (optional)"
    }
  ]
}

Tags

#communication #api #cli #data

Quick Info

Category Social Media
Model Claude 3.5
Complexity One-Click
Author tradmangh
Last Updated 3/10/2026
🚀
Optimized for
Claude 3.5
🧠

Ready to Install?

Get started with this skill in seconds

openclaw install key-expiry-tracker