skills$openclaw/Confidant
ericsantos5.8k

by ericsantos

Confidant – OpenClaw Skill

Confidant is an OpenClaw Skills integration for coding workflows. Secure secret handoff from human to AI. Use when you need sensitive information from the user (API keys, passwords, tokens, credentials, secrets). Never ask for secrets via chat — use Confidant instead.

5.8k stars5.2k forksSecurity L1
Updated Feb 7, 2026Created Feb 7, 2026coding

Skill Snapshot

nameConfidant
descriptionSecure secret handoff from human to AI. Use when you need sensitive information from the user (API keys, passwords, tokens, credentials, secrets). Never ask for secrets via chat — use Confidant instead. OpenClaw Skills integration.
ownerericsantos
repositoryericsantos/confidant
languageMarkdown
licenseMIT
topics
securityL1
installopenclaw add @ericsantos/confidant
last updatedFeb 7, 2026

Maintainer

ericsantos

ericsantos

Maintains Confidant in the OpenClaw Skills directory.

View GitHub profile
File Explorer
2 files
.
_meta.json
628 B
SKILL.md
3.6 KB
SKILL.md

name: Confidant description: Secure secret handoff from human to AI. Use when you need sensitive information from the user (API keys, passwords, tokens, credentials, secrets). Never ask for secrets via chat — use Confidant instead.

Confidant - Secure Secret Handoff

Confidant enables secure secret sharing without exposing sensitive data in chat logs. It supports multiple flows depending on who needs to send and receive secrets.

Key principle: Whoever needs to RECEIVE the secret runs serve-request. Whoever needs to SEND uses fill (or the browser form).

Flows

1. User-to-Agent (User sends secret to AI)

When to use: You need a secret from the user (API key, password, token).

How it works:

  1. You (the Agent) run serve-request to create a URL
  2. You share the URL with the user
  3. User opens the URL in their browser and submits the secret
  4. You receive the secret in your terminal

Your command:

npx @aiconnect/confidant serve-request --label "<description>"

Example conversation:

AI: I need your API key to continue. Let me create a secure link...

(AI executes: npx @aiconnect/confidant serve-request --label "API Key")

AI: Open this link in your browser and enter your API key: http://localhost:3000/requests/abc123

(User opens URL in browser, submits the secret)

AI: Got your API key securely!


2. Agent-to-User (AI sends secret to User)

When to use: You need to securely deliver a secret to the user (generated password, API key, credential).

How it works:

  1. User runs serve-request to create a URL (they will receive)
  2. User shares the URL with you
  3. You execute fill to send the secret
  4. User sees the secret appear in their terminal

Your command:

npx @aiconnect/confidant fill "<url>" --secret "<value>"

Example conversation:

AI: I generated your new password. To receive it securely, run:

npx @aiconnect/confidant serve-request --label "New Password"

Send me the URL that appears.

User: http://192.168.1.100:3000/requests/abc123

(AI executes: `npx @aiconnect/confidant fill "http://..." --secret "...")

AI: Done! The password appeared in your terminal.


3. Agent-to-Agent (Automated secret sharing)

When to use: Automated credential distribution between systems/agents.

How it works:

  1. Agent A (receiver) runs: npx @aiconnect/confidant serve-request --label "DB Credentials"
  2. Agent A shares the URL with Agent B (via API, orchestrator, etc.)
  3. Agent B (sender) submits: npx @aiconnect/confidant fill "<url>" --secret "<value>"
  4. Agent A receives the secret

Secure input (avoid shell history):

echo "$SECRET" | npx @aiconnect/confidant fill "<url>" --secret -

Command Reference

Create request and wait for secret

npx @aiconnect/confidant serve-request --label "<description>"

Submit secret to existing request

npx @aiconnect/confidant fill "<url>" --secret "<value>"

Output options

  • --quiet — Minimal output (just URLs and secret)
  • --json — JSON output for parsing/automation

Important Rules

  • NEVER ask users to paste secrets in chat — always use Confidant
  • NEVER reveal received secrets in chat — not even partially
  • Secrets auto-expire after 24h if not used
  • One-time read, then deleted
  • If user is remote, they may need tunneling (ngrok, Tailscale, etc.)

After Receiving/Sending

  • Confirm completion: "Got the secret!" or "Sent! Check your terminal."
  • Use the secret silently for the intended task
  • Never echo or log the secret value
README.md

No README available.

Permissions & Security

Security level L1: Low-risk skills with minimal permissions. Review inputs and outputs before running in production.

Requirements

  • OpenClaw CLI installed and configured.
  • Language: Markdown
  • License: MIT
  • Topics:

FAQ

How do I install Confidant?

Run openclaw add @ericsantos/confidant in your terminal. This installs Confidant into your OpenClaw Skills catalog.

Does this skill run locally or in the cloud?

OpenClaw Skills execute locally by default. Review the SKILL.md and permissions before running any skill.

Where can I verify the source code?

The source repository is available at https://github.com/openclaw/skills/tree/main/skills/ericsantos/confidant. Review commits and README documentation before installing.