ClawLink
Trusted SaaS integrations for OpenClaw agents through the ClawLink plugin
Audits
PassInstall
openclaw plugins install clawhub:clawlink-pluginClawLink OpenClaw Plugin
Third-party OpenClaw plugin that lets OpenClaw talk to external SaaS apps through ClawLink's hosted integration layer.
Not affiliated with OpenClaw. ClawLink is an independent service. This package is published by the ClawLink team under the npm scope
@useclawlink. Source: public GitHub repository. License: MIT.
What it does
ClawLink stores provider OAuth tokens and API credentials on ClawLink servers, encrypted at rest, for a growing catalog of business apps on your behalf. It then exposes a uniform set of tools so OpenClaw can read from and write to those apps without per-provider setup. Today that includes integrations like Google Docs, Google Sheets, Google Calendar, Google Drive, Twilio, and Google Search Console. Setup is browser pairing: OpenClaw opens a ClawLink approval page, you approve the device once, then return to chat and send done so the plugin can store its local ClawLink device credential safely.
Install
openclaw plugins install clawhub:clawlink-plugin
Or directly from npm:
openclaw plugins install @useclawlink/openclaw-plugin
Configure
- In OpenClaw, start browser pairing:
- let the assistant call
clawlink_begin_pairing - if your session started before the plugin was installed and the tools are not visible yet, start a fresh chat and retry pairing there
- if a fresh chat still doesn't show the tools, contact your OpenClaw admin or ClawLink support to reload the gateway
- let the assistant call
- Open the returned ClawLink pairing URL in your browser and approve the device.
- Go back to OpenClaw and send
done. - Let the assistant call
clawlink_get_pairing_statusto finish storing the local credential.
The resulting device credential is stored locally in ~/.openclaw/openclaw.json under plugins.entries.clawlink-plugin.config.apiKey and is only sent to claw-link.dev.
Full setup walkthrough: https://docs.claw-link.dev/openclaw
Tools
The plugin registers ten tools. OpenClaw's assistant discovers available integrations dynamically — you don't need to configure individual apps here.
clawlink_begin_pairing— start or resume browser pairing for this OpenClaw installclawlink_get_pairing_status— finish pairing after the user returns from the browser and saysdoneclawlink_start_connection— start a hosted OAuth/connect session for a new appclawlink_get_connection_status— poll an in-progress connect sessionclawlink_list_integrations— list apps already connectedclawlink_list_tools— list callable tools for one connected appclawlink_search_tools— search connected tools by capability or keywordclawlink_describe_tool— fetch schema and usage guidance for one toolclawlink_preview_tool— preview a tool call before execution, especially for writesclawlink_call_tool— execute a tool against a connected app
File Arguments
Some ClawLink tools accept file arguments shaped as { name, mimetype, s3key }. When OpenClaw attaches a local file, the plugin reads files only from OpenClaw media directories, rejects path traversal and files over 25 MB, then sends the file bytes to ClawLink in the request's files envelope. ClawLink stages those bytes with Composio before executing the provider tool, so local OpenClaw attachment paths are not forwarded directly to providers.
If a tool accepts a public URL alternative such as image_url or video_url, agents may use that instead of a local file attachment.
Support Commands
Normal onboarding should happen through tools and browser pairing. These commands remain as support/debug escape hatches:
/clawlink pair [deviceLabel]— start or resume browser pairing from the plugin fast path/clawlink pair-status— check whether browser pairing has been approved yet and finish setup after browser approval/clawlink status— show whether the plugin is paired/clawlink logout— remove the saved credential
Security
- ClawHub package:
clawlink-plugin - npm package:
@useclawlink/openclaw-plugin - ClawHub publishes are source-linked to the public GitHub repository and the latest ClawHub security scan is clean.
- npm releases are published from GitHub Actions with npm provenance.
- ClawHub verification includes source-linked release metadata for the published artifact.
- The plugin only makes outbound HTTPS requests to
https://claw-link.dev. - Browser pairing stores only a local ClawLink device credential under
~/.openclaw/openclaw.json. - Provider tokens and API keys are not written to OpenClaw config or shown to the assistant; they stay on ClawLink servers encrypted at rest.
- The local device credential is sent only as the
X-ClawLink-API-Keyheader to ClawLink. - Report security issues to security@claw-link.dev.
