dotkc-openclaw
v0.1.4
Published
OpenClaw plugin: dotkc integration (typed tools + safe secrets inspection)
Maintainers
Readme
dotkc OpenClaw plugin (L2)
This plugin exposes typed OpenClaw tools for dotkc so agents can interact with dotkc via a constrained interface.
Docs: https://dotkc-openclaw.hczhang.com/
dotkc manual: https://dotkc.hczhang.com/
Tools
dotkc_status(required)dotkc_doctor(optional)dotkc_inspect(optional, redacted by default)
Install
# from npm (recommended)
openclaw plugins install [email protected]
openclaw gateway restart
# or local dev link
openclaw plugins install -l /path/to/dotkc-openclaw
openclaw gateway restartNote: this plugin bundles dotkc as a dependency, so you do not need to install dotkc globally.
Configure (~/.openclaw/openclaw.json)
{
plugins: {
entries: {
"dotkc-openclaw-plugin": {
enabled: true,
config: {
// dotkcBin: "dotkc", // optional override (default uses bundled dotkc)
dotkcBin: "",
specFile: "./dotkc.spec",
// vaultPath: "/path/to/dotkc.vault",
// keyPath: "~/.dotkc/key",
allowUnsafe: false
}
}
}
},
// Allow optional plugin tools (choose a profile and then opt-in)
tools: {
// profile: "coding",
allow: ["dotkc"]
}
}Security stance
No-leak default: the plugin enforces DOTKC_NO_LEAK=1 for dotkc subprocesses (blocks dotkc get and --unsafe-values).
- This plugin is designed to avoid secrets entering model context.
dotkc_inspectusesdotkc run --openclawand is expected to be redacted.- Do not enable
allowUnsafeunless you fully understand the leakage risk.
Notes
- Plugins run in-process with the OpenClaw Gateway. Treat this as trusted code.
- This repo is an MVP skeleton; we should add tests + stricter output filtering.
