Scan & Import Guide
ID Wispera can scan files, directories, and known credential locations to detect secrets, then import them as governed passports in the vault. This guide covers the three import modes and the full scan-review-import workflow.Overview
The import command supports three modes:- Single file — parse a specific file (
.env,.json, or generic) for credentials. - Directory scan (
--all) — recursively scan a directory and import everything found. - Confidence threshold (
--min-confidence) — scan a directory but only import detections above a confidence score.
Import Modes
Import from a Single File
.envfiles are parsed asKEY=VALUEpairs..jsonfiles are recursively scanned for keys namedkey,secret,token,password, orapi.- All other files use regex-based pattern detection.
Scan and Import All
Recursively scan a directory and import every detected credential.Import by Confidence Level
Only import detections that meet a minimum confidence threshold.Import from OpenClaw
Scan the~/.openclaw/ directory structure for all managed credentials (API keys, bot tokens, OAuth tokens, session keys).
This mode discovers credentials across the OpenClaw directory tree including WhatsApp sessions, LLM auth profiles, OAuth tokens, channel bot tokens, and gateway tokens.
What Gets Imported
For each detected credential, a passport is created with:- Name:
{pattern} in {filename}(e.g., “OpenAI API Key in .env”) - Tags:
imported,scan, confidence level tag, source filename - Notes: Full file path, line number, confidence score, detection pattern
- Platform: Auto-guessed from the credential value:
sk-prefix —> OpenAIsk-ant-prefix —> AnthropicAKIAprefix —> AWSghp_/gho_prefix —> GitHub- Other patterns —> custom
Confidence Levels
The detection engine assigns a confidence score to each finding based on the pattern strength and context.| Level | Range | Examples |
|---|---|---|
| High | >= 0.9 | OpenAI keys (sk-...), AWS keys (AKIA...), GitHub tokens (ghp_...) |
| Medium | 0.7-0.9 | Generic API keys, connection strings, base64-encoded tokens |
| Low | < 0.7 | Possible secrets, high-entropy strings, base64 blobs |
confidence-high, confidence-medium, or confidence-low.
Supported File Types
| File Type | Parsing Strategy |
|---|---|
.env | Line-by-line KEY=VALUE parsing; keys containing key, secret, token, password, or api are flagged |
.json | Recursive key scanning; string values checked against known patterns |
| All others | Regex-based detection using known credential patterns (API key prefixes, private key headers, etc.) |
Options Reference
| Option | Description |
|---|---|
--all | Import all detected credentials without a confidence filter |
--min-confidence <n> | Minimum confidence threshold (0.0 to 1.0) |
--format <fmt> | Import format: env, json, openclaw |
--owner <email> | Human owner email (required for passport creation) |
--auto-name | Auto-generate passport names from detection pattern |
-y, --yes | Skip the interactive confirmation prompt |
-p, --path <path> | Custom vault path (default: ~/.id-wispera) |
Workflow: Scan, Review, Import
A typical import session follows three steps.Step 1: Scan
Step 2: Review
Without the-y flag, the CLI prompts for confirmation:
Step 3: Import
Migrating from .env Files
For teams moving from.env-based secret management to ID Wispera, the quickest migration path is:
process.env.
Before — reading from environment variables:
Next Steps
Passport model
Understand the data structure behind every imported credential.
Locations registry
Register where credentials are deployed and used.
Security architecture
Learn how the vault encrypts and protects your secrets.