Secrets Management
How to safely store and manage API credentials in your hosted OpenClaw environment on Molten.Bot.
Secret storage is the foundation of safe agent automation. If an API key or token is exposed, an attacker can spend your money, read your data, or impersonate your systems. This guide shows a simple, repeatable way to store and use secrets safely.
Storage Rules (TL;DR)
- Store all credentials in the Molten.Bot Secrets UI (not in code, prompts, or local files).
- Never store secrets in git-tracked files, prompts, chat logs, or screenshots.
- Reference secrets by name in code/config, never by raw value.
- Rotate secrets on a schedule and immediately after any suspected exposure.
Where to Find Secrets in the UI
In the app, open the Secrets tab (key icon) from the top navigation.

What Must Be Stored as a Secret
- LLM provider keys (
OPENAI_API_KEY,ANTHROPIC_API_KEY, etc.) - Bot tokens and webhook signing secrets
- Database passwords and private connection strings
- Third-party integration credentials (GitHub, Stripe, Slack, etc.)
How Secrets Storage Works in Molten.Bot
Molten.Bot hosted environment
In Molten.Bot, add credentials from the Secrets page using Add Group and Add Secret. Save each value once, then reference only secret names in your agent configuration and tooling.
Under the hood, Molten.Bot stores credentials in a dedicated secure enclave for your environment and mounts them into runtime as environment variables, so secret values never need to be pasted into code or prompts.

Standard Naming Convention
We recomend using uppercase snake case and include provider/purpose. Good names make automation easier and avoid confusion later.
OPENAI_API_KEY
GITHUB_TOKEN
STRIPE_WEBHOOK_SECRET
POSTGRES_PASSWORD