Archon Vault - Encrypted Distributed Storage
Manage DID vaults and backup/restore files. Data is encrypted client-side before transmission — only you (or vault members) can decrypt.
Prerequisites
- Archon identity configured (
~/.archon.envwith wallet path and passphrase) - Run
archon-keymasterfirst to create your DID if you don't have one
Backup Operations
Backup Workspace to Vault
./scripts/backup/backup-to-vault.sh [vault-did]
Archives ~/clawd and ~/.openclaw to your encrypted vault. Respects .backup-ignore files.
Restore from Vault
./scripts/backup/restore-from-vault.sh <backup-did> [target-dir]
Verify Backup Integrity
./scripts/backup/verify-backup.sh <backup-did>
Disaster Recovery
./scripts/backup/disaster-recovery.sh
Full recovery procedure with mnemonic.
Vault Management
Create Vault
./scripts/vaults/create-vault.sh <vault-name>
Add/Remove Items
./scripts/vaults/add-vault-item.sh <vault-did> <item-did>
./scripts/vaults/remove-vault-item.sh <vault-did> <item-did>
./scripts/vaults/get-vault-item.sh <vault-did> <item-did>
./scripts/vaults/list-vault-items.sh <vault-did>
Manage Vault Members (Multi-Party Access)
./scripts/vaults/add-vault-member.sh <vault-did> <member-did>
./scripts/vaults/remove-vault-member.sh <vault-did> <member-did>
./scripts/vaults/list-vault-members.sh <vault-did>
Security Notes
-
Backup scope: Archives
~/clawdand~/.openclawby default. Review.backup-ignoreto exclude sensitive items. -
Encryption: All data encrypted before transmission to Archon gatekeeper/hyperswarm.
-
Vault members: Adding a member grants them decrypt access to vault contents.
-
Recovery: Your 12-word mnemonic is the master key. Store it offline.