openclaw_kraken

Use a Bash CLI to query Kraken Spot and Futures APIs, inspect account state, run guarded trading and funding actions, and work with Kraken websocket payloads using OpenClaw-managed secrets.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "openclaw_kraken" with this command: npx skills add Gabriel-0110/kraken-spot

OpenClaw Kraken

Use {baseDir}/bin/openclaw-kraken for Kraken Spot REST tasks.

Use when

  • The user wants Kraken market data.
  • The user wants Kraken account state from private REST endpoints.
  • The user wants guarded order placement, funding, earn, futures, subaccount, or websocket actions through a local Bash tool instead of ad hoc curl commands.

Rules

  • Never print API secrets, signatures, or raw auth headers.
  • Read secrets from the environment only. In OpenClaw, inject them via secret refs rather than plaintext config.
  • Refuse to run if required config is missing or malformed.
  • Use configured base URLs only. Do not accept arbitrary destination URLs.
  • Preserve stdout for API results; use --jq or --compact when structured formatting is needed.
  • Prefer read-only endpoints unless the user clearly asked for a state-changing action.
  • For state-changing aliases such as trading, withdrawal, earn allocation, or subaccount transfer operations, require --confirm.

Commands

  • market time
  • market ticker --pair XBTUSD
  • account balance
  • funding deposit-methods --asset ETH
  • earn strategies --ascending true
  • futures call market.tickers
  • ws spot-public --message-json '{"method":"ping"}'
  • orders add --pair XBTUSD --side buy --type limit --volume 0.01 --price 25000 --time-in-force GTC --post-only true --confirm
  • call funding.withdraw-info --asset ETH --key MyWallet --amount 0.5

Configuration

  • Non-secret config is read from environment or OPENCLAW_KRAKEN_CONFIG.
  • Secrets must be provided via environment variables that OpenClaw resolves from secret refs.
  • See {baseDir}/README.md for examples.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Coding

Webhook Tester

Webhook testing and debugging tool. Send test webhook payloads to any URL, simulate various webhook events (GitHub, Stripe, Slack), inspect responses, and lo...

Registry SourceRecently Updated
Coding

Azuredatastudio

Azure Data Studio is a data management and development tool with connectivity to popular cloud and o azuredatastudio, typescript, azure, azure-data-studio, e...

Registry SourceRecently Updated
1130ckchzh
Coding

Awesome Postgres

A curated list of awesome PostgreSQL software, libraries, tools and resources, inspired by awesome-m awesome postgres, python, database, postgres, postgresql...

Registry SourceRecently Updated
Coding

Awesome Cheatsheets

👩‍💻👨‍💻 Awesome cheatsheets for popular programming languages, frameworks and development tools. They awesome cheatsheets, javascript, backend, bash, chea...

Registry SourceRecently Updated