Rank
70
AI Agents & MCPs & AI Workflow Automation โข (~400 MCP servers for AI agents) โข AI Automation / AI Agent with MCPs โข AI Workflows & AI Agents โข MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Bitwarden & Vaultwarden password manager integration. Use when storing, retrieving, generating, or managing passwords and credentials. Wraps the Bitwarden CLI (bw) with automatic session management. Works with both official Bitwarden and self-hosted Vaultwarden servers. --- name: Bitwarden / Vaultwarden description: Bitwarden & Vaultwarden password manager integration. Use when storing, retrieving, generating, or managing passwords and credentials. Wraps the Bitwarden CLI (bw) with automatic session management. Works with both official Bitwarden and self-hosted Vaultwarden servers. homepage: https://github.com/TWhidden/openclaw-skill-bitwarden metadata: clawdbot: emoji: "๐" require Capability contract not published. No trust telemetry is available yet. Last updated 3/1/2026.
Freshness
Last checked 3/1/2026
Best For
Bitwarden / Vaultwarden is best for be workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
Bitwarden & Vaultwarden password manager integration. Use when storing, retrieving, generating, or managing passwords and credentials. Wraps the Bitwarden CLI (bw) with automatic session management. Works with both official Bitwarden and self-hosted Vaultwarden servers. --- name: Bitwarden / Vaultwarden description: Bitwarden & Vaultwarden password manager integration. Use when storing, retrieving, generating, or managing passwords and credentials. Wraps the Bitwarden CLI (bw) with automatic session management. Works with both official Bitwarden and self-hosted Vaultwarden servers. homepage: https://github.com/TWhidden/openclaw-skill-bitwarden metadata: clawdbot: emoji: "๐" require
Public facts
4
Change events
1
Artifacts
0
Freshness
Mar 1, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 3/1/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Mar 1, 2026
Vendor
Twhidden
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 3/1/2026.
Setup snapshot
git clone https://github.com/TWhidden/openclaw-skill-bitwarden.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Twhidden
Protocol compatibility
OpenClaw
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
5
Snippets
0
Languages
typescript
Parameters
bash
# Environment variables (preferred) export BW_SERVER="https://vault.bitwarden.com" # Official Bitwarden # OR export BW_SERVER="https://your-vaultwarden-instance.example.com" # Vaultwarden export BW_EMAIL="your-email@example.com" export BW_MASTER_PASSWORD="your-master-password" # Or use a credentials file (default: secrets/bitwarden.env) export CREDS_FILE="/path/to/your/bitwarden.env"
text
BW_SERVER=https://vault.bitwarden.com BW_EMAIL=your-email@example.com BW_MASTER_PASSWORD=your-master-password
bash
bash skills/bitwarden/bw.sh <command> [args...]
bash
# Generate + store PASS=$(bash skills/bitwarden/bw.sh generate 32) bash skills/bitwarden/bw.sh create "New Service" "user@email.com" "$PASS" "https://service.com"
bash
# Register using configured credentials (from env/credentials file) bash skills/bitwarden/bw.sh register # Register with explicit credentials bash skills/bitwarden/bw.sh register "user@example.com" "SecurePass123!" "Display Name"
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Bitwarden & Vaultwarden password manager integration. Use when storing, retrieving, generating, or managing passwords and credentials. Wraps the Bitwarden CLI (bw) with automatic session management. Works with both official Bitwarden and self-hosted Vaultwarden servers. --- name: Bitwarden / Vaultwarden description: Bitwarden & Vaultwarden password manager integration. Use when storing, retrieving, generating, or managing passwords and credentials. Wraps the Bitwarden CLI (bw) with automatic session management. Works with both official Bitwarden and self-hosted Vaultwarden servers. homepage: https://github.com/TWhidden/openclaw-skill-bitwarden metadata: clawdbot: emoji: "๐" require
Bitwarden/Vaultwarden CLI (bw) wrapper with automatic login, session caching, and convenient commands. Works seamlessly with both official Bitwarden (vault.bitwarden.com) and self-hosted Vaultwarden instances.
bw) installed: npm install -g @bitwarden/cliSet credentials via environment variables or a credentials file:
# Environment variables (preferred)
export BW_SERVER="https://vault.bitwarden.com" # Official Bitwarden
# OR
export BW_SERVER="https://your-vaultwarden-instance.example.com" # Vaultwarden
export BW_EMAIL="your-email@example.com"
export BW_MASTER_PASSWORD="your-master-password"
# Or use a credentials file (default: secrets/bitwarden.env)
export CREDS_FILE="/path/to/your/bitwarden.env"
The credentials file should contain:
BW_SERVER=https://vault.bitwarden.com
BW_EMAIL=your-email@example.com
BW_MASTER_PASSWORD=your-master-password
bash skills/bitwarden/bw.sh <command> [args...]
| Command | Description | Example |
|---------|-------------|---------|
| register [email] [pass] [name] | Register new account | bw.sh register user@example.com pass123 "My Name" |
| login | Login & unlock vault | bw.sh login |
| status | Show vault status | bw.sh status |
| list [search] | List/search items | bw.sh list github |
| get <name\|id> | Get full item JSON | bw.sh get "GitHub" |
| get-password <name\|id> | Get password only | bw.sh get-password "GitHub" |
| get-username <name\|id> | Get username only | bw.sh get-username "GitHub" |
| create <name> <user> <pass> [uri] [notes] | Create login | bw.sh create "GitHub" user pass https://github.com |
| generate [length] | Generate password | bw.sh generate 32 |
| delete <id> | Delete item | bw.sh delete <uuid> |
| lock | Lock vault | bw.sh lock |
bw.sh login (auto-authenticates from configured credentials)/tmp/.bw_sessionlogin again# Generate + store
PASS=$(bash skills/bitwarden/bw.sh generate 32)
bash skills/bitwarden/bw.sh create "New Service" "user@email.com" "$PASS" "https://service.com"
Register a new account on your Bitwarden/Vaultwarden server directly from the CLI:
# Register using configured credentials (from env/credentials file)
bash skills/bitwarden/bw.sh register
# Register with explicit credentials
bash skills/bitwarden/bw.sh register "user@example.com" "SecurePass123!" "Display Name"
How it works:
/api/accounts/register endpointRequirements: OpenSSL 3.x+ (for PBKDF2 and HKDF support), curl, xxd.
Note: The master password must be at least 12 characters. Works with both official Bitwarden and Vaultwarden servers.
bitwarden.env out of version control.chmod 600 on credential files./tmp and cleared on lock/logout.| Endpoint | Purpose | Data Sent | |----------|---------|-----------| | User-configured BW_SERVER | Bitwarden/Vaultwarden API | Encrypted vault data, authentication credentials |
Note: The skill communicates with the Bitwarden server you configure via BW_SERVER. For official Bitwarden, this is https://vault.bitwarden.com. For Vaultwarden, this is your self-hosted instance URL.
What leaves your machine:
What stays local:
/tmp/.bw_session)bitwarden.env)Trust statement: By using this skill, you are sending authentication credentials and vault data to the Bitwarden server you configure. Only install this skill if you trust your Bitwarden/Vaultwarden instance.
This skill can be invoked autonomously by your OpenClaw agent when it needs to:
If you prefer manual approval before password operations, configure your OpenClaw agent's tool policy accordingly.
chmod 600 on secrets/bitwarden.envbw.sh lock when done.gitignore excludes all secrets (secrets/, *.env, .bw_session)Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/twhidden-openclaw-skill-bitwarden/snapshot"
curl -s "https://xpersona.co/api/v1/agents/twhidden-openclaw-skill-bitwarden/contract"
curl -s "https://xpersona.co/api/v1/agents/twhidden-openclaw-skill-bitwarden/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation โข (~400 MCP servers for AI agents) โข AI Automation / AI Agent with MCPs โข AI Workflows & AI Agents โข MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | ๐ Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/twhidden-openclaw-skill-bitwarden/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/twhidden-openclaw-skill-bitwarden/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/twhidden-openclaw-skill-bitwarden/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/twhidden-openclaw-skill-bitwarden/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/twhidden-openclaw-skill-bitwarden/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/twhidden-openclaw-skill-bitwarden/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-16T23:39:45.790Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "be",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:be|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Twhidden",
"href": "https://github.com/TWhidden/openclaw-skill-bitwarden",
"sourceUrl": "https://github.com/TWhidden/openclaw-skill-bitwarden",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-03-01T06:02:58.070Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/twhidden-openclaw-skill-bitwarden/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/twhidden-openclaw-skill-bitwarden/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-03-01T06:02:58.070Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/twhidden-openclaw-skill-bitwarden/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/twhidden-openclaw-skill-bitwarden/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub ยท GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to Bitwarden / Vaultwarden and adjacent AI workflows.