โœ“ Verified ๐Ÿ’ป Development โœ“ Enhanced Data

Vault

Secure local password storage tool with AES-256-GCM encryption.

Rating
4.9 (323 reviews)
Downloads
1,301 downloads
Version
1.0.0

Overview

Secure local password storage tool with AES-256-GCM encryption.

โœจKey Features

1

๐Ÿ”’ AES-256-GCM encryption for all stored passwords

2

๐Ÿ“ Simple command-line interface

3

๐Ÿ—‚๏ธ Key management and listing

4

๐Ÿ’พ JSON-based local storage (encrypted)

5

๐Ÿ• Automatic timestamp tracking

6

๐Ÿ”‘ Master key protection

Complete Documentation

View Source โ†’

vault

Use when you need secure local storage for passwords, API keys, or credentials.

๐Ÿ”’ AES-256-GCM encryption - This plugin stores passwords encrypted using industry-standard AES-256-GCM encryption with a master key.

Features

  • ๐Ÿ”’ AES-256-GCM encryption for all stored passwords
  • ๐Ÿ“ Simple command-line interface
  • ๐Ÿ—‚๏ธ Key management and listing
  • ๐Ÿ’พ JSON-based local storage (encrypted)
  • ๐Ÿ• Automatic timestamp tracking
  • ๐Ÿ”‘ Master key protection

Installation

bash
clawhub install vault

Usage

Set a password

bash
vault gemini sk-abc123xyz

Show a password

bash
vault gemini show

Remove a password

bash
vault gemini remove

List all keys

bash
vault list

Configuration

Master Key (Required)

Set your master encryption key via environment variable:

bash
export VAULT_MASTER_KEY="your-secure-master-key-here"

Or in your OpenClaw config:

json
{
  "plugins": {
    "vault": {
      "masterKey": "your-secure-master-key-here",
      "storageFile": ".vault/passwords.json"
    }
  }
}

Options:

  • masterKey - Master encryption key (can also use VAULT_MASTER_KEY env var)
  • storageFile (default: .vault/passwords.json) - Storage file path relative to home directory
โš ๏ธ Important: Keep your master key secure! Without it, you cannot decrypt stored passwords.

Security

๐Ÿ”’ Encryption Details:

  • Algorithm: AES-256-GCM (Galois/Counter Mode)
  • Key Derivation: scrypt with random salt per password
  • IV: Random 12-byte initialization vector per password (GCM recommended size)
  • Salt: Random 32-byte salt per password, stored with encrypted data
  • Authentication: GCM authentication tag for integrity verification
Security Best Practices:
  • Use a strong, unique master key (minimum 32 characters recommended)
  • Store master key securely (environment variable or secure config)
  • Set strict file permissions: chmod 600 ~/.vault/passwords.json
  • Add .vault/ to your .gitignore
  • Never commit your master key to version control
  • Use system-level disk encryption for additional protection
  • Backup your master key securely - lost keys mean lost passwords
Suitable for:
  • Development/testing credentials
  • API keys and tokens
  • Personal passwords
  • Team shared credentials (with secure key distribution)

Examples

bash
# Save API keys
vault openai sk-proj-abc123
vault anthropic sk-ant-xyz789

# View a key
vault openai show
# Output: Password for 'openai': sk-proj-abc123

# List all keys
vault list
# Output:
# Stored passwords:
# โ€ข openai (created: 2026-02-17T..., updated: 2026-02-17T...)
# โ€ข anthropic (created: 2026-02-17T..., updated: 2026-02-17T...)

# Remove a key
vault openai remove

Links

  • GitHub: https://github.com/zuiho-kai/openclaw-vault
  • Issues: https://github.com/zuiho-kai/openclaw-vault/issues

Installation

Terminal bash

openclaw install vault
    
Copied!

๐Ÿ’ปCode Examples

clawhub install vault

clawhub-install-vault.txt
## Usage

### Set a password

vault list

vault-list.txt
## Configuration

### Master Key (Required)

Set your master encryption key via environment variable:

}

.txt
**Options:**
- `masterKey` - Master encryption key (can also use VAULT_MASTER_KEY env var)
- `storageFile` (default: `.vault/passwords.json`) - Storage file path relative to home directory

โš ๏ธ **Important**: Keep your master key secure! Without it, you cannot decrypt stored passwords.

## Security

๐Ÿ”’ **Encryption Details**:

- **Algorithm**: AES-256-GCM (Galois/Counter Mode)
- **Key Derivation**: scrypt with random salt per password
- **IV**: Random 12-byte initialization vector per password (GCM recommended size)
- **Salt**: Random 32-byte salt per password, stored with encrypted data
- **Authentication**: GCM authentication tag for integrity verification

**Security Best Practices**:
- Use a strong, unique master key (minimum 32 characters recommended)
- Store master key securely (environment variable or secure config)
- Set strict file permissions: `chmod 600 ~/.vault/passwords.json`
- Add `.vault/` to your `.gitignore`
- Never commit your master key to version control
- Use system-level disk encryption for additional protection
- Backup your master key securely - lost keys mean lost passwords

**Suitable for**:
- Development/testing credentials
- API keys and tokens
- Personal passwords
- Team shared credentials (with secure key distribution)

## Examples
example.json
{
  "plugins": {
    "vault": {
      "masterKey": "your-secure-master-key-here",
      "storageFile": ".vault/passwords.json"
    }
  }
}
example.sh
# Save API keys
vault openai sk-proj-abc123
vault anthropic sk-ant-xyz789

# View a key
vault openai show
# Output: Password for 'openai': sk-proj-abc123

# List all keys
vault list
# Output:
# Stored passwords:
# โ€ข openai (created: 2026-02-17T..., updated: 2026-02-17T...)
# โ€ข anthropic (created: 2026-02-17T..., updated: 2026-02-17T...)

# Remove a key
vault openai remove

Tags

#devops_and-cloud

Quick Info

Category Development
Model Claude 3.5
Complexity One-Click
Author zuiho-kai
Last Updated 3/10/2026
๐Ÿš€
Optimized for
Claude 3.5
๐Ÿง 

Ready to Install?

Get started with this skill in seconds

openclaw install vault