Security

What Is Encrypted Secrets?

API keys and credentials stored with AES-256 encryption at rest, only decrypted and injected into the agent at runtime.

In Plain English

Your AI agent needs API keys to access LLM providers, tool integrations, and external services. These keys are sensitive — a leaked API key can result in unauthorized access and financial damage.

Encrypted secrets means these keys are stored encrypted in the database, never in plaintext. They are decrypted only at runtime when the agent needs them, and never exposed in logs, audit trails, or the dashboard.

Why It Matters for OpenClaw

API key leaks are one of the most common security incidents. If your agent's keys are stored in plaintext (environment variables, config files), anyone with access to the server can steal them.

How Clawctl Helps

Clawctl encrypts all API keys and credentials with AES-256 at rest. Keys are injected at runtime and never appear in logs or the UI. The setup wizard handles secure key entry.

Try Clawctl — 60 Second Deploy

Common Questions

What encryption is used?

AES-256 encryption at rest. TLS in transit.

Can I see my stored keys?

No. Keys are write-only in the dashboard. You can update or delete them, but never read them back.

What if I need to rotate a key?

Update the key in the Clawctl dashboard. The agent picks up the new key on next restart.