Keep OpenClaw deploy envs in Ghostable.
Store secrets once in Ghostable, then write the env file OpenClaw already expects before Docker or host startup. Teams keep audit history, scoped access, and fresh values across local, CI, and production runs.
Uses the config flow OpenClaw already supports
Generate a deploy file for Docker Compose, a host process, or ~/.openclaw/.env without adding a custom provider shim.
Separate tokens per environment
Create deployment tokens for dev, staging, and prod so OpenClaw runners only read the values they need.
Teams get history and rotation trails
Ghostable stays the source of truth for changes, approvals, and rollback context while OpenClaw stays focused on runtime.
Turn on OpenClaw syncing and forget about manual updates.
-
1
Add your deployment token
Store `GHOSTABLE_CI_TOKEN` and `GHOSTABLE_DEPLOY_SEED` in the runner, host, or secret manager that starts OpenClaw.
-
2
Insert the deploy command
Before `docker compose up` or your service restart, run `ghostable env deploy --token $GHOSTABLE_CI_TOKEN --file .env.openclaw`.
-
3
Start OpenClaw with the generated env file
Boot OpenClaw with `docker compose --env-file .env.openclaw up -d`, or write directly to `~/.openclaw/.env` for host installs.
More integrations
Explore other providers
Browse the growing lineup—new integrations land here as soon as we ship them.