5.8k★by ericsantos
Confidant – OpenClaw Skill
Confidant is an OpenClaw Skills integration for coding workflows. Secure secret handoff from human to AI. Use when you need sensitive information from the user (API keys, passwords, tokens, credentials, secrets). Never ask for secrets via chat — use Confidant instead.
Skill Snapshot
| name | Confidant |
| description | Secure secret handoff from human to AI. Use when you need sensitive information from the user (API keys, passwords, tokens, credentials, secrets). Never ask for secrets via chat — use Confidant instead. OpenClaw Skills integration. |
| owner | ericsantos |
| repository | ericsantos/confidant |
| language | Markdown |
| license | MIT |
| topics | |
| security | L1 |
| install | openclaw add @ericsantos/confidant |
| last updated | Feb 7, 2026 |
Maintainer

name: Confidant description: Secure secret handoff from human to AI. Use when you need sensitive information from the user (API keys, passwords, tokens, credentials, secrets). Never ask for secrets via chat — use Confidant instead.
Confidant - Secure Secret Handoff
Confidant enables secure secret sharing without exposing sensitive data in chat logs. It supports multiple flows depending on who needs to send and receive secrets.
Key principle: Whoever needs to RECEIVE the secret runs serve-request. Whoever needs to SEND uses fill (or the browser form).
Flows
1. User-to-Agent (User sends secret to AI)
When to use: You need a secret from the user (API key, password, token).
How it works:
- You (the Agent) run
serve-requestto create a URL - You share the URL with the user
- User opens the URL in their browser and submits the secret
- You receive the secret in your terminal
Your command:
npx @aiconnect/confidant serve-request --label "<description>"
Example conversation:
AI: I need your API key to continue. Let me create a secure link...
(AI executes:
npx @aiconnect/confidant serve-request --label "API Key")AI: Open this link in your browser and enter your API key:
http://localhost:3000/requests/abc123(User opens URL in browser, submits the secret)
AI: Got your API key securely!
2. Agent-to-User (AI sends secret to User)
When to use: You need to securely deliver a secret to the user (generated password, API key, credential).
How it works:
- User runs
serve-requestto create a URL (they will receive) - User shares the URL with you
- You execute
fillto send the secret - User sees the secret appear in their terminal
Your command:
npx @aiconnect/confidant fill "<url>" --secret "<value>"
Example conversation:
AI: I generated your new password. To receive it securely, run:
npx @aiconnect/confidant serve-request --label "New Password"Send me the URL that appears.
User:
http://192.168.1.100:3000/requests/abc123(AI executes: `npx @aiconnect/confidant fill "http://..." --secret "...")
AI: Done! The password appeared in your terminal.
3. Agent-to-Agent (Automated secret sharing)
When to use: Automated credential distribution between systems/agents.
How it works:
- Agent A (receiver) runs:
npx @aiconnect/confidant serve-request --label "DB Credentials" - Agent A shares the URL with Agent B (via API, orchestrator, etc.)
- Agent B (sender) submits:
npx @aiconnect/confidant fill "<url>" --secret "<value>" - Agent A receives the secret
Secure input (avoid shell history):
echo "$SECRET" | npx @aiconnect/confidant fill "<url>" --secret -
Command Reference
Create request and wait for secret
npx @aiconnect/confidant serve-request --label "<description>"
Submit secret to existing request
npx @aiconnect/confidant fill "<url>" --secret "<value>"
Output options
--quiet— Minimal output (just URLs and secret)--json— JSON output for parsing/automation
Important Rules
- NEVER ask users to paste secrets in chat — always use Confidant
- NEVER reveal received secrets in chat — not even partially
- Secrets auto-expire after 24h if not used
- One-time read, then deleted
- If user is remote, they may need tunneling (ngrok, Tailscale, etc.)
After Receiving/Sending
- Confirm completion: "Got the secret!" or "Sent! Check your terminal."
- Use the secret silently for the intended task
- Never echo or log the secret value
No README available.
Permissions & Security
Security level L1: Low-risk skills with minimal permissions. Review inputs and outputs before running in production.
Requirements
- OpenClaw CLI installed and configured.
- Language: Markdown
- License: MIT
- Topics:
FAQ
How do I install Confidant?
Run openclaw add @ericsantos/confidant in your terminal. This installs Confidant into your OpenClaw Skills catalog.
Does this skill run locally or in the cloud?
OpenClaw Skills execute locally by default. Review the SKILL.md and permissions before running any skill.
Where can I verify the source code?
The source repository is available at https://github.com/openclaw/skills/tree/main/skills/ericsantos/confidant. Review commits and README documentation before installing.
