Skills omniclaw
install
source · Clone the upstream repo
git clone https://github.com/openclaw/skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/abiorh001/omniclaw" ~/.claude/skills/openclaw-skills-omniclaw && rm -rf "$T"
OpenClaw · Install into ~/.openclaw/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.openclaw/skills && cp -r "$T/skills/abiorh001/omniclaw" ~/.openclaw/skills/openclaw-skills-omniclaw && rm -rf "$T"
manifest:
skills/abiorh001/omniclaw/SKILL.mdsource content
OmniClaw CLI Skill
Trigger
Use
omniclaw-cli only when the task is directly about one of these actions:
- pay for a paid URL that returns
402 Payment Required - transfer USDC to an address
- inspect wallet, Gateway, or Circle balances
- inspect transaction history
- expose a paid seller endpoint with
serve
Do not use this skill for:
- editing policy files
- creating wallets
- provisioning secrets
- changing allowlists, limits, or owner approvals outside the exposed CLI commands
- administering the Financial Policy Engine process itself
Core Model
OmniClaw is not just a wallet wrapper. It is the economic execution and control layer that combines:
- zero-trust execution through the CLI
- owner-defined financial policy through the Financial Policy Engine
- settlement rails such as direct transfers, x402, CCTP, and Circle Gateway nanopayments
This skill is specifically about the CLI execution surface.
The same CLI has two economic roles:
- buyer role:
omniclaw-cli pay - seller role:
omniclaw-cli serve
The agent does not control the private key. The Financial Policy Engine enforces policy and signs allowed actions.
Inputs The Agent Should Expect
The runtime should normally provide either:
- environment-driven execution
OMNICLAW_SERVER_URLOMNICLAW_TOKEN- optionally
if this run is allowed to approve confirmationsOMNICLAW_OWNER_TOKEN
- preconfigured CLI state
was already run before the turnomniclaw-cli configure
If neither is true, stop and ask the owner for:
- Financial Policy Engine URL
- agent token
- wallet alias
Do not invent or search for them yourself.
Safe Default Workflow
For any new spend
- Run
if connectivity or health is uncertain.omniclaw-cli status - Run
if Gateway balance matters.omniclaw-cli balance-detail - Run
before paying a new recipient.omniclaw-cli can-pay --recipient ... - Use
for job-based payments.--idempotency-key - For direct-address payments where budget/guards matter, use
first.simulate
For x402 URLs
- Use
.omniclaw-cli pay --recipient <url> - Add
,--method
, and--body
when the paid endpoint expects a non-GET request.--header - Add
if the paid response should be saved.--output
For direct address transfers
- Use
.omniclaw-cli pay --recipient <0xaddress> --amount <usdc> - Always include
.--purpose
For seller tasks
- Inspect current state with
.balance-detail - Start the paid endpoint with
.omniclaw-cli serve - Remember that
binds toserve
even if the banner prints0.0.0.0
.localhost
Approval Handling
If
pay returns approval-required output, for example:
requires_confirmation: trueconfirmation_id: ...
Then:
- do not retry blindly
- do not invent a workaround
- if the run explicitly has owner authority, use
omniclaw-cli confirmations approve --id <confirmation-id> - otherwise stop and notify the owner
Stop Conditions
Stop and notify the owner if any of these happen:
- token or Financial Policy Engine URL is missing
says the recipient is blockedcan-pay
returns a policy or guard rejectionpay- available or Gateway balance is insufficient
- the exact command or flag is unclear
Command Reference
For exact command schemas, flags, and live help output, read:
references/cli-reference.md
Do not guess flags from memory when a reference is available.