Credential storage
Your API keys and OAuth tokens are encrypted at rest using AES-256-GCM. ClawLink never stores or exposes your credentials in plaintext. When your agent makes an API call, your credentials are decrypted only at the moment of execution—and only on the edge network, never on your local machine.Your machine stays clean
Because ClawLink proxies all API calls through its edge network, you never need to put third-party API keys in your environment variables,.env files, or source code. Connect your integrations once from the dashboard, and ClawLink handles the rest.
Authentication
When you copy your MCP command from the dashboard, it includes a personal API key in the formatsk_live_.... This key authenticates your requests to ClawLink and identifies your account.
API key best practices
- Store your MCP command in a secure location, not in a shared config file
- Use one key per environment (e.g., separate keys for personal projects vs. team workflows)
- Rotate your key regularly as a precaution—generate a new one in Settings > API Keys and update your MCP command
If your API key is compromised
If you suspect your API key has been exposed or misused, act immediately:Go to Settings > API Keys
Open the ClawLink dashboard and navigate to Settings > API Keys.
Update your MCP command
Copy your new MCP command from the dashboard and replace the old command in OpenClaw or wherever you have it saved.
Deleting an old key immediately invalidates it. Any agent or tool still using the old key will stop working until you update it with the new key.