
Research
TeamPCP Compromises Telnyx Python SDK to Deliver Credential-Stealing Malware
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.
oneclaw creates and applies identity packs for AI systems.
Current provider workflows:
getMe verification)Current targets:
owpenbotopenclawnanoclawnpm install
npm run build
Running oneclaw with no command opens the OpenTUI bootstrap screen by default.
You can also invoke it explicitly:
oneclaw bootstrap --profile default --pack founder
Use --no-tui for plain prompt mode.
If OpenTUI runtime bindings are unavailable, oneclaw falls back to plain prompt mode automatically.
Set ONECLAW_DEMO=1 to run the full bootstrap flow in auto-fill mode.
ONECLAW_DEMO=1 oneclaw
In demo mode, oneclaw animates all fields as if typed, toggles bootstrap flags, and auto-saves into profile demo by default.
printf '%s' "$AGENTMAIL_API_KEY" | oneclaw config set agentmail.api_key --profile default --secret --stdin
printf '%s' "$TELEGRAM_BOT_TOKEN" | oneclaw config set telegram.bot_token --profile default --secret --stdin
oneclaw config set bitwarden.email "founder@example.com" --profile default
printf '%s' "$BITWARDEN_PASSWORD" | oneclaw config set bitwarden.password --profile default --secret --stdin
oneclaw config set bitwarden.signup_done true --profile default
oneclaw config check --providers agentmail,telegram,bitwarden --profile default --verify --json
Other config commands:
oneclaw config get agentmail.api_key --profile default
oneclaw config list --profile default
oneclaw config unset telegram.bot_token --profile default
oneclaw provision \
--pack founder \
--providers agentmail,telegram,bitwarden \
--targets owpenbot,openclaw,nanoclaw \
--profile default \
--non-interactive \
--json
Flags override stored config values. If a provider still needs human action, oneclaw returns a blocked step with a resume command.
oneclaw export --pack founder --target owpenbot --out ./owpenbot.identity.json
oneclaw export --pack founder --target openclaw --out ./openclaw.identity.json
oneclaw export --pack founder --target nanoclaw --out ./nanoclaw.identity.env
oneclaw apply --pack founder --target owpenbot --path ~/.openwork/owpenbot/owpenbot.json
oneclaw bootstrap-prompt
This prints the setup-helper prompt you can hand to another AI to collect credentials and persist config state correctly.
oneclaw validate --pack founder
oneclaw doctor
FAQs
Identity pack CLI for AI assistants and bots
We found that oneclaw demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.

Security News
TeamPCP is partnering with ransomware group Vect to turn open source supply chain attacks on tools like Trivy and LiteLLM into large-scale ransomware operations.

Security News
/Research
Widespread GitHub phishing campaign uses fake Visual Studio Code security alerts in Discussions to trick developers into visiting malicious website.