Claim this agent
Agent DossierGITHUB OPENCLEWSafety 89/100

Xpersona Agent

gopass-skill

Gopass Skill Gopass Skill Manage secrets securely using $1, the GPG-encrypted password store for teams. Prerequisites - gopass installed and initialized (gopass init) - GPG key configured for the agent - At least one secret store mounted Commands List secrets Read a secret (password/value only) The -o flag outputs only the first line (the secret value), without metadata. Read with metadata Shows the full entry including any key-v

MCP · self-declaredOpenClaw · self-declared
Trust evidence available
git clone https://github.com/brenner-axiom/gopass-skill.git

Overall rank

#42

Adoption

No public adoption signal

Trust

Unknown

Freshness

Feb 25, 2026

Freshness

Last checked Feb 25, 2026

Best For

gopass-skill is best for decrypt, multiple workflows where MCP and OpenClaw compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack

Overview

Key links, install path, reliability highlights, and the shortest practical read before diving into the crawl record.

Verifiededitorial-content

Overview

Executive Summary

Gopass Skill Gopass Skill Manage secrets securely using $1, the GPG-encrypted password store for teams. Prerequisites - gopass installed and initialized (gopass init) - GPG key configured for the agent - At least one secret store mounted Commands List secrets Read a secret (password/value only) The -o flag outputs only the first line (the secret value), without metadata. Read with metadata Shows the full entry including any key-v Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.

No verified compatibility signals

Trust score

Unknown

Compatibility

MCP, OpenClaw

Freshness

Feb 25, 2026

Vendor

Brenner Axiom

Artifacts

0

Benchmarks

0

Last release

Unpublished

Install & run

Setup Snapshot

git clone https://github.com/brenner-axiom/gopass-skill.git
  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence & Timeline

Public facts grouped by evidence type, plus release and crawl events with provenance and freshness.

Verifiededitorial-content

Public facts

Evidence Ledger

Vendor (1)

Vendor

Brenner Axiom

profilemedium
Observed Apr 15, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

MCP, OpenClaw

contractmedium
Observed Apr 15, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance
Integration (1)

Crawlable docs

6 indexed pages on the official domain

search_documentmedium
Observed Apr 15, 2026Source linkProvenance

Artifacts & Docs

Parameters, dependencies, examples, extracted files, editorial overview, and the complete README when available.

Self-declaredGITHUB OPENCLEW

Captured outputs

Artifacts Archive

Extracted files

0

Examples

6

Snippets

0

Languages

typescript

Parameters

Executable Examples

bash

gopass ls

bash

gopass show -o <path>

bash

gopass show <path>

bash

echo "my-secret-value" | gopass insert -f <path>

bash

gopass insert -m <path>

bash

gopass rm <path>

Editorial read

Docs & README

Docs source

GITHUB OPENCLEW

Editorial quality

ready

Gopass Skill Gopass Skill Manage secrets securely using $1, the GPG-encrypted password store for teams. Prerequisites - gopass installed and initialized (gopass init) - GPG key configured for the agent - At least one secret store mounted Commands List secrets Read a secret (password/value only) The -o flag outputs only the first line (the secret value), without metadata. Read with metadata Shows the full entry including any key-v

Full README

Gopass Skill

Manage secrets securely using gopass, the GPG-encrypted password store for teams.

Prerequisites

  • gopass installed and initialized (gopass init)
  • GPG key configured for the agent
  • At least one secret store mounted

Commands

List secrets

gopass ls

Read a secret (password/value only)

gopass show -o <path>

The -o flag outputs only the first line (the secret value), without metadata.

Read with metadata

gopass show <path>

Shows the full entry including any key-value pairs stored below the password line.

Store a secret

echo "my-secret-value" | gopass insert -f <path>

The -f flag forces overwrite without confirmation (safe for automation).

Store multi-line secrets

gopass insert -m <path>

Opens an editor for multi-line content (e.g., JSON tokens, certificates).

Delete a secret

gopass rm <path>

Search secrets by name

gopass find <keyword>

Search secret contents

gopass grep <pattern>

Store Organization

Organize secrets hierarchically by service:

openclaw/
├── github/
│   ├── axiom_pat          # Personal Access Token
│   └── axiom_username     # Username
├── codeberg-token         # API token
├── signal/
│   ├── bot_number         # Bot phone number
│   └── admin_number       # Admin phone number
└── google/
    └── calendar_token     # OAuth token

Naming Conventions

  • Use lowercase with hyphens: my-service/api-token
  • Group by service: github/, codeberg/, signal/
  • Prefix agent-specific secrets: openclaw/ for shared infrastructure

Usage Patterns

In shell commands

# Use command substitution to inject secrets
curl -H "Authorization: token $(gopass show -o openclaw/github/axiom_pat)" https://api.github.com/user

# Basic auth
curl -u "$(gopass show -o codeberg/username):$(gopass show -o codeberg/password)" https://codeberg.org/api/v1/user

In environment variables

FORGEJO_ACCESS_TOKEN=$(gopass show -o openclaw/codeberg-token) forgejo-mcp --cli get_my_user_info

Storing new credentials

# Store a new API token
echo "ghp_abc123..." | gopass insert -f openclaw/github/new-token

# Store with metadata
gopass insert -m openclaw/myservice/api-key
# Line 1: the secret value
# Line 2+: key: value metadata

Security Rules

  1. NEVER echo or print secret values in logs or output
  2. NEVER store secrets in environment variables, .env files, or config files
  3. ALWAYS use gopass show -o with command substitution ($(...))
  4. ALWAYS use -f flag when inserting programmatically (avoids interactive prompts)
  5. NEVER pass secrets as command-line arguments visible in ps output — use stdin or env vars
  6. Secrets are encrypted at rest with GPG — only authorized keys can decrypt
  7. Rotation: update secrets with echo "new-value" | gopass insert -f <path>

Multi-Agent Access

Gopass supports multiple GPG recipients per store:

# Add a new recipient (agent or human)
gopass recipients add <gpg-key-id>

# List current recipients
gopass recipients

Each agent should have its own GPG key. Access is scoped per store — agents only see secrets in stores where their key is a recipient.

Troubleshooting

"gpg: decryption failed: No secret key"

The agent's GPG key doesn't have access to this secret. Add the key as a recipient.

"gopass: command not found"

Install gopass: https://github.com/gopasspw/gopass/releases

Pinentry issues in non-interactive environments

export GPG_TTY=$(tty)
# Or for fully non-interactive:
echo "allow-loopback-pinentry" >> ~/.gnupg/gpg-agent.conf
gpgconf --reload gpg-agent

API & Reliability

Machine endpoints, contract coverage, trust signals, runtime metrics, benchmarks, and guardrails for agent-to-agent use.

MissingGITHUB OPENCLEW

Machine interfaces

Contract & API

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

MCP: self-declaredOpenClaw: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/brenner-axiom-gopass-skill/snapshot"
curl -s "https://xpersona.co/api/v1/agents/brenner-axiom-gopass-skill/contract"
curl -s "https://xpersona.co/api/v1/agents/brenner-axiom-gopass-skill/trust"

Operational fit

Reliability & Benchmarks

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Machine Appendix

Raw contract, invocation, trust, capability, facts, and change-event payloads for machine-side inspection.

MissingGITHUB OPENCLEW

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/brenner-axiom-gopass-skill/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/brenner-axiom-gopass-skill/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/brenner-axiom-gopass-skill/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/brenner-axiom-gopass-skill/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/brenner-axiom-gopass-skill/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/brenner-axiom-gopass-skill/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "MCP",
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_OPENCLEW",
      "generatedAt": "2026-04-17T02:14:01.056Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "MCP",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "decrypt",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "multiple",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:MCP|unknown|profile protocol:OPENCLEW|unknown|profile capability:decrypt|supported|profile capability:multiple|supported|profile"
}

Facts JSON

[
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Brenner Axiom",
    "href": "https://github.com/brenner-axiom/gopass-skill",
    "sourceUrl": "https://github.com/brenner-axiom/gopass-skill",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:21:22.124Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "MCP, OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/brenner-axiom-gopass-skill/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/brenner-axiom-gopass-skill/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:21:22.124Z",
    "isPublic": true
  },
  {
    "factKey": "docs_crawl",
    "category": "integration",
    "label": "Crawlable docs",
    "value": "6 indexed pages on the official domain",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/brenner-axiom-gopass-skill/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/brenner-axiom-gopass-skill/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[
  {
    "eventType": "docs_update",
    "title": "Docs refreshed: Sign in to GitHub · GitHub",
    "description": "Fresh crawlable documentation was indexed for the official domain.",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  }
]

Sponsored

Ads related to gopass-skill and adjacent AI workflows.