- Never commit secrets, API keys, tokens, or
.envfiles. Use.env.examplewith placeholders; copy to.envlocally (and add.envto.gitignore). - Use placeholders in docs and examples:
@your_bot,+1XXXXXXXXXX,192.0.2.x,admin@example.com, etc. - No default passwords in code — require env vars for secrets and fail with a clear error if unset.
- Rotate all affected credentials immediately (OpenClaw tokens, Telegram, API keys, etc.).
- Treat the credential as compromised; do not rely on removing it from the repo alone.
- Optional: run a secret scanner on the current tree (e.g.
gitleaksortrufflehogon HEAD or working directory) before adding contributors, to confirm the tree is clean.
If you find a secret or security issue in this repo, do not open a public issue. Rotate any exposed credentials and contact the maintainer privately.