Request flow
OpenClaw sends an MCP request
When you ask your agent to do something — “send an email to [email protected]” — OpenClaw translates that into an MCP request and sends it to ClawLink’s edge network along with your API key.
ClawLink authenticates the request
ClawLink verifies your API key before doing anything else. If the key is invalid or missing, the request is rejected immediately and nothing is executed.
ClawLink looks up your credentials
ClawLink identifies which integration the request targets (Gmail, in this example) and retrieves the stored credentials for your account. Credentials are decrypted only at this moment — they are never cached in plaintext or sent to your machine.
ClawLink calls the third-party API
Using your decrypted credentials, ClawLink makes the API call on your behalf — sending the email, posting the Slack message, creating the GitHub issue, or whatever the request requires.
Security
Your credentials are protected at every stage:- Encrypted at rest with AES-256-GCM — credentials are encrypted before being stored and can only be decrypted with keys that are never co-located with the data.
- Decrypted only at execution time — credentials are decrypted on the edge, used for the single API call, and not retained in plaintext anywhere.
- Never sent to your machine — your API keys and OAuth tokens exist only on ClawLink’s edge network. OpenClaw never sees them.
Built-in reliability
ClawLink handles the reliability concerns that would otherwise fall on you:- Retries with exponential backoff — if a third-party API returns a transient error, ClawLink retries the request automatically, waiting longer between each attempt to avoid overwhelming the service.
- Rate limit handling — when an API enforces rate limits, ClawLink manages the pacing so your agent’s requests go through without you having to think about it.