1password-cliSecurely access and manage secrets with 1Password CLI using a Service Account token for vault operations like read, write, edit, and delete.
Install via ClawdBot CLI:
clawdbot install sichengchen/1password-cliThis skill allows agents to securely access and manage secrets using the 1Password CLI (op) and a Service Account. It provides commands for reading, writing, and managing items within a dedicated vault.
brew install --cask 1password-cliOP_SERVICE_ACCOUNT_TOKEN in your environment (e.g., .env file or export in shell).OP_SERVICE_ACCOUNT_TOKEN=... to .env.All commands require the OP_SERVICE_ACCOUNT_TOKEN to be set.
Verify the service account is working:
op whoami
List vaults accessible to the service account:
op vault list
Get details of an item (JSON format is best for parsing):
op item get "Item Name" --vault "Vault Name" --format json
Or get a specific field (e.g., password):
op read "op://Vault Name/Item Name/password"
Create a login item:
op item create --category login --title "My Service" --url "https://example.com" --vault "Vault Name" username="myuser" password="mypassword"
Create a secure note:
op item create --category "Secure Note" --title "API Key" --vault "Vault Name" notes="my-secret-key"
Update a password:
op item edit "Item Name" password="newpassword" --vault "Vault Name"
op item delete "Item Name" --vault "Vault Name"
--format json to op commands for structured data that is easier to parse.OP_SERVICE_ACCOUNT_TOKEN or retrieved secrets to the console unless explicitly asked.--vault flag to avoid ambiguity.OP_SERVICE_ACCOUNT_TOKEN is set correctly.AI Usage Analysis
Analysis is being generated⦠refresh in a few seconds.
Set up and use 1Password CLI (op). Use when installing the CLI, enabling desktop app integration, signing in (single or multi-account), or reading/injecting/running secrets via op.
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope, and suspicious patterns.
Perform a comprehensive read-only security audit of Clawdbot's own configuration. This is a knowledge-based skill that teaches Clawdbot to identify hardening opportunities across the system. Use when user asks to "run security check", "audit clawdbot", "check security hardening", or "what vulnerabilities does my Clawdbot have". This skill uses Clawdbot's internal capabilities and file system access to inspect configuration, detect misconfigurations, and recommend remediations. It is designed to be extensible - new checks can be added by updating this skill's knowledge.
Use when reviewing code for security vulnerabilities, implementing authentication flows, auditing OWASP Top 10, configuring CORS/CSP headers, handling secrets, input validation, SQL injection prevention, XSS protection, or any security-related code review.
Security check for ClawHub skills powered by Koi. Query the Clawdex API before installing any skill to verify it's safe.
Scan Clawdbot and MCP skills for malware, spyware, crypto-miners, and malicious code patterns before you install them. Security audit tool that detects data exfiltration, system modification attempts, backdoors, and obfuscation techniques.