×
Community Blog 40+ Commits Daily: HiClaw v1.0.6 Lands; Credential-zero Security, Skills + MCP > 2

40+ Commits Daily: HiClaw v1.0.6 Lands; Credential-zero Security, Skills + MCP > 2

HiClaw just bridged the gap between AI experimentation and enterprise security. Stop leaking credentials. Start orchestrating.

By Cheng Tan

The Dilemma of Credential Security

If you are running an AI Agent in a production environment, you may face such a dilemma:

"I want the Agent to use GitHub, but I don't want to give it my PAT" — a leaked token could lead to an attack on the repository.

"I need the Worker to call the internal API, but those keys are too sensitive" — API keys for billing systems, databases, payment gateways... giving them to the Agent poses too much risk.

"Different Workers need different permissions, but managing them is a nightmare" — Should the front-end Worker have access to the production database? Probably not. But how to enforce that?

In version 1.0.6, we introduced a comprehensive solution: Enterprise-level MCP Server management based on Higress AI Gateway + mcporter.

What is MCP? Why is it important?

MCP (Model Context Protocol) is an open standard for exposing APIs as tools that AI Agents can discover and call. It can be understood as "OpenAPI for AI Agents" — you don't need to explain each API endpoint to the Agent manually; you only need to define the MCP tool once, and any MCP-compatible Agent can use it immediately.

The beauty of MCP lies in its separation of tool definition and credential management. The schema of the tool explains "what this API does and what parameters it needs", but does not say "this is the API key". This separation is the foundation of enterprise-level secure deployments.

Introducing mcporter: A Universal MCP CLI

Before delving into the integration with HiClaw, let's introduce mcporter — a powerful MCP toolkit developed by Peter Steinberger (the author of OpenClaw).

mcporter is a TypeScript runtime, CLI, and code generation toolkit. Core capabilities include:

  • Zero-configuration discovery: Automatically discover MCP servers configured in Cursor, Claude Code, Codex, Windsurf, VS Code
  • User-friendly CLI: Call any MCP tool using mcporter call server.tool key=value
  • **Type safety: Generate TypeScript clients with full type inference
  • One-click CLI generation: Convert any MCP server into a standalone CLI tool
# List all configured MCP servers
mcporter list

# View tools and full parameter schema for a specific server
mcporter list github --schema

# Invoke a tool
mcporter call github.search_repositories query="hiclaw" limit=5

In HiClaw 1.0.6, both the Manager and Worker interact with the MCP server via mcporter — but with key security enhancements provided by Higress AI Gateway.

MCP and SKILLS: Complementary, Not Substitutable

Before understanding the MCP integration architecture of HiClaw, it is necessary to clarify the relationship between MCP and SKILLS.

HiClaw's Open Skills Ecosystem

HiClaw supports skills.sh for an open SKILLS marketplace and provides support for a Nacos enterprise-built SKILLS marketplace. SKILLS are iterative capability packages aimed at practical scenarios:

  • Scenario-oriented: Combine multiple atomic tools into complete business processes
  • Continuous evolution: Optimize and improve based on practical experience
  • Knowledge accumulation: Include best practices, error handling, parameter explanations

MCP's Positioning in the Ecosystem

MCP is not meant to replace SKILLS, but rather to act as a complement within the SKILLS ecosystem, enabling the rapid conversion of existing APIs into standard tools usable by Agents. The core value of MCP lies in:

  • Clear constraints and specifications: Tools have stricter definitions and type constraints
  • Permission governance system: Reuse MCP's authentication and authorization capabilities (MCP Server granular permission management, enterprise version supports tool-granular management)
  • Batch conversion capability: Especially in enterprise scenarios, the MCP gateway capability based on Higress can painlessly batch convert a large number of existing APIs into MCP tools for refined management

The Bridging Role of mcporter

With CLI tools like mcporter, HiClaw achieves the reorganization and orchestration of MCP tools, forming iteratively optimized SKILLS:

MCP Tools (Atomic Capabilities)
    │
    ▼ mcporter Orchestration
    │
SKILL (Scenario-based Capability Packs)
    │
    ▼ Real-world Execution
    │
Iterate & Optimize SKILLs

SKILL + MCP = 1+1 > 2

The best practices for both are:

  • SKILL handles scenario evolution: Aligns with actual business scenarios, continuously iterating the combination logic and best practices of skills
  • MCP handles fine-grained permission control: Aligns with business capabilities to manage permissions and credential management for MCP Server and tools

This complementary relationship achieves the effect of SKILL + MCP being greater than the sum of their parts: enterprises can enjoy the rich capabilities of the open SKILLS marketplace while achieving secure, granular permission control over internal APIs through the MCP gateway.

Architecture: How Everything Works

When you want to add a new API tool for a Worker, the complete process is as follows:

┌─────────────────────────────────────────────────────────────────────────────┐
│                              YOU (Human)                                    │
│                                                                             │
│  "Add a stock index API: GET https://api.finance.com/v1/index?symbol={symbol}"│
│  "Authenticate via X-API-Key header, here is my key: sk_xxx"                │
└────────────────────────────────────┬────────────────────────────────────────┘
                                     │
                                     ▼
┌─────────────────────────────────────────────────────────────────────────────┐
│                           MANAGER CLAW                                      │
│                                                                             │
│  1. Generate MCP Server YAML configuration based on your description        │
│  2. Run setup-mcp-server.sh stock-index "sk_xxx" --yaml-file /tmp/stock.yaml│
│  3. Validate with mcporter: mcporter call stock-index.get_index symbol=000001.SH│
│  4. Notify Worker: "New MCP server 'stock-index' is ready"                  │
└────────────────────────────────────┬────────────────────────────────────────┘
                                     │
                                     ▼
┌─────────────────────────────────────────────────────────────────────────────┐
│                        HIGRESS AI GATEWAY                                   │
│                                                                             │
│  ┌─────────────────────────────────────────────────────────────────────┐    │
│  │  MCP Server: stock-index-mcp-server                                 │    │
│  │  ├─ Real credentials: sk_xxx (stored securely, never exposed)       │    │
│  │  ├─ Tools: get_index(symbol: string) -> stock index data            │    │
│  │  └─ Authorized consumers: manager, worker-alice, worker-bob         │    │
│  └─────────────────────────────────────────────────────────────────────┘    │
│                                                                             │
│  Issue temporary consumer token to Worker                                   │
│  Token can only call authorized MCP servers                                 │
│  Real API key never leaves the gateway                                      │
└────────────────────────────────────┬────────────────────────────────────────┘
                                     │
                                     ▼
┌─────────────────────────────────────────────────────────────────────────────┐
│                           WORKER CLAW                                       │
│                                                                             │
│  1. Receive notification from Manager                                       │
│  2. Pull latest mcporter configuration from MinIO                           │
│  3. Discover tools: mcporter list stock-index --schema                      │
│  4. Test tools: mcporter call stock-index.get_index symbol=000001.SH        │
│  5. Generate SKILL.md based on understanding                                │
│  6. Use this tool in subsequent tasks!                                      │
│                                                                             │
│  ┌─────────────────────────────────────────────────────────────────────┐    │
│  │  Worker's Perspective:                                              │    │
│  │  ├─ Has: Consumer token (like a "work ID badge")                    │    │
│  │  ├─ Can: Call stock-index.get_index through the gateway             │    │
│  │  └─ Cannot: See the real API key sk_xxx                             │    │
│  └─────────────────────────────────────────────────────────────────────┘    │
└─────────────────────────────────────────────────────────────────────────────┘

As shown in the following figure, you can also directly upload Swagger files for the Manager to analyze

Once the configuration is complete, the Manager can view the tool list under the MCP Server in the Higress console and carry out further permission management

Through the console, you can:

  • Manage calling credentials (for example, not telling the manager the real credentials, but manually configuring them in the console)
  • View all tools included in the MCP Server
  • Configure MCP Server-level access permissions for each Consumer (Worker)
  • Monitor tool invocation status and performance metrics
  • Dynamically adjust permission policies without restarting the service

Permission Management Guidelines:

  • Higress Open Source Edition: supports MCP Server granularity of permission management (e.g., Worker A can access the entire stock-index MCP Server)
  • Higress Enterprise Edition: supports tool granularity of permission management (e.g., Worker A can only call stock-index.get_index, but cannot call stock-index.update_index)

HiClaw 1.0.6 implements security isolation at the MCP Server level based on the open source version, which can meet the permission control needs of most enterprises.

Core Security Principle: Workers never see the real credentials.

Even if the Worker is fully compromised, the attacker can only obtain a consumer token:

  • Can only call specific MCP servers you authorized
  • Can be revoked instantly by the Manager
  • Does not contain any reusable credential information

End-to-End Example: Adding Custom APIs

Let’s walk through a real scene. You have an internal billing API and want the Worker to query customer data.

Step 1: Describe the API to the Manager

In your Matrix room, tell the Manager:

You: I want to add a billing API as an MCP tool.
     Endpoint: GET https://billing.internal.company.com/api/v1/customers/{customer_id}
     Auth: Bearer token in the Authorization header
     Here is the token: Bearer eyJhbGciOiJSUzI1NiIs...

Step 2: The Manager Does The Heavy Lifting

The Manager will:

1. Generate the YAML configuration:

server:
  name: billing-mcp-server
  config:
    accessToken: ""  # Manager replaces this with your actual token
tools:
- name: get_customer
  description: "Retrieve customer details by ID"
  args:
  - name: customer_id
    description: "Customer ID (e.g., CUST-12345)"
    type: string
    required: true
  requestTemplate:
    url: "https://billing.internal.company.com/api/v1/customers/{{.args.customer_id}}"
    method: GET
    headers:
    - key: Authorization
      value: "Bearer {{.config.accessToken}}"

2. Deploy to Higress MCP Gateway:

setup-mcp-server.sh billing "eyJhbGciOiJSUzI1NiIs..." --yaml-file /tmp/mcp-billing.yaml

3. Validate with mcporter:

mcporter list billing --schema
mcporter call billing.get_customer customer_id=CUST-12345

4. Notify relevant Workers:

Manager: @alice @bob New MCP server `billing` is now configured with the `get_customer` tool.
         Please use the file-sync skill to pull the updated configuration, then use the 
         mcporter skill to discover and learn the new tool.

Step 3: Workers Auto Configuration

Worker Alice:

# Pull the updated configuration from MinIO
hiclaw-sync

# Discover the new tool
mcporter list billing --schema

# Test the tool
mcporter call billing.get_customer customer_id=CUST-12345

# Generate a SKILL for future reference
mkdir -p ~/skills/billing-operations
# ... Write SKILL.md, including tool documentation

Step 4: Workers Use Tools in Tasks

Then, when you assign tasks:

You: @alice Check if customer CUST-12345 has any overdue bills.

Alice: Let me query the billing system...
       mcporter call billing.get_customer customer_id=CUST-12345

       Customer: Acme Corp
       Status: Active
       Overdue: Yes, $4,500 since January 15th

       The customer does indeed have an overdue bill.

Alice never saw the real API token. She only used a consumer token to call through the gateway.

From Swagger/OpenAPI to MCP Tools

If you have existing Swagger or OpenAPI format API documentation? Even easier.

You: Here is our product catalog API Swagger documentation:
     https://docs.internal.company.com/swagger.json
     Authenticated via X-API-Key header. Key: prod_cat_xxx

Manager: I will convert the Swagger documentation into MCP tools...
         Found 12 endpoints, creating 12 MCP tools...
         Deploying to Higress as the `product-catalog` MCP server.
         
         Testing the first tool... ✓
         Testing the second tool... ✓
         All tools verified.
         
         @warehouse-team New MCP server `product-catalog` is ready, containing 12 tools.

The Manager can read the Swagger/OpenAPI documentation and automatically generate the corresponding MCP server configuration.

From curl to MCP Tools

Even simpler — just paste the curl command:

You: Add this API call as a tool:
     curl -X GET "https://api.shipping.com/v1/track?tracking_id=ABC123" \
          -H "X-API-Key: ship_xxx"

Manager: Creating MCP server `shipping` with tool `track_package`...
         Deployment and testing complete. @logistics-team can now use `track_package`.

Skills Generated by Workers: Self-improving Documentation

One unique feature of HiClaw 1.0.6 is that Workers not only use MCP tools — they write documentation for them.

When a Worker first encounters a new MCP server, it will:

  1. Discover all tools: using mcporter list --schema
  2. Test representative tools: Understand their behavior
  3. Generate SKILL.md, including:
  • Tool descriptions in natural language
  • Example mcporter call commands
  • Parameter explanations and common patterns
  • Notes discovered during testing

This SKILL becomes the Worker’s permanent reference for that MCP server. Over time, the more the Worker uses the tools, the more they can improve the SKILL based on practical experience:

  • Add error handling tips
  • Document rate limits
  • Document which parameters are actually required vs optional
  • Share best practices

It’s like having an AI writing its own documentation — and continuously improving it.

Security Model: Deep Defense

Let’s clarify what Workers can and cannot do:

What Workers Can Do

✅ Call any authorized MCP server

✅ Use tools through Higress AI Gateway

✅ Generate and improve SKILL documentation

✅ Work autonomously within authorized scope

What Workers Cannot Do

❌ See real API keys, tokens, or credentials

❌ Call unauthorized MCP servers

❌ Extract credentials from the gateway

❌ Share credentials with other Workers

What Happens if a Worker is Compromised

  1. The attacker gains a consumer token — only useful within HiClaw
  2. The Manager instantly revokes that token — no need to rotate credentials
  3. The real API keys remain secure — they have never left the gateway
  4. Create new Workers — resume work within minutes

This is the zero trust principle for credentials: Agents operate on a need-to-know basis, while they never need to know the real credentials.

What This Means for the Roadmap

This release completes the roadmap planning for "Universal MCP Service Support":

Pre-configured MCP Connectors: GitHub, as well as any custom service via YAML configuration

Custom MCP Integration: Access any HTTP API, documented via Swagger/curl/YAML

Fine-grained Permission Control: Manager authorizes Workers by MCP server

Any MCP-compatible tool can now be safely exposed to Workers, with zero credential leakage.

Other Improvements

Slash Commands: Cross-Scenario Control

Version 1.0.6 also introduced universally available slash commands — usable in DMs or group chats:

/reset — Fixes a stuck or misconfigured Claw

You: @alice /reset

Alice: Context cleared. Ready for new tasks.

Applicable for:

  • Claw is caught in a loop
  • Configuration errors causing issues
  • Want to restart a task

/stop — Interrupt long-running tasks

You: @bob /stop

Bob: Task interrupted. Here is what I was working on:
     - Analyzed 45% of the codebase
     - Found 3 potential issues
     - Haven't started the fixes yet
     
     Why did you interrupt me? Do you want me to change direction?

Applicable for:

  • Tasks are taking too long
  • Want to provide guidance mid-task

/model — Quickly switch the current session model

You:@manager /model qwen3.5-plus

manager:Model set to qwen3.5-plus (hiclaw-gateway/qwen3.5-plus).

Applicable for:

  • Quickly switch the manager or worker to a specified model without restarting

Optimized File Synchronization

The design principles for file synchronization have been unified: "Writers push and notify, receivers pull on demand"; pulling every 5 minutes serves as a backup. The Manager adds on-demand mc mirror pulls during task/project completion processes to ensure that Workers read the latest results.

See full release notes.

Quick Start

Already using HiClaw? Upgrade to the latest version:

bash <(curl -sSL https://higress.ai/hiclaw/install.sh)

New to HiClaw? Get started with one command:

# macOS / Linux
bash <(curl -sSL https://higress.ai/hiclaw/install.sh)

# Windows (PowerShell 7+)
Set-ExecutionPolicy Bypass -Scope Process -Force; $wc=New-Object Net.WebClient; iex $wc.DownloadString('https://higress.ai/hiclaw/install.ps1')

After installation, open Element Web at http://127.0.0.1:18088 and tell your Manager to add some MCP tools!

What’s Next

We are continuously improving HiClaw. Coming soon:

  • Team Management Center: Real-time visualization of all Agents, task timelines, resource monitoring
  • More Worker Runtimes: ZeroClaw (built on Rust, 3.4MB), NanoClaw (a minimal OpenClaw alternative)
  • Enhanced MCP Discovery: Automatically import from popular MCP registries

Join our community: Discord | DingTalk

2

0 1 0
Share on

You may also like

Comments

Related Products

  • Container Compute Service (ACS)

    A cloud computing service that provides container compute resources that comply with the container specifications of Kubernetes

    Learn More
  • Container Service for Kubernetes

    Alibaba Cloud Container Service for Kubernetes is a fully managed cloud container management service that supports native Kubernetes and integrates with other Alibaba Cloud products.

    Learn More
  • API Gateway

    API Gateway provides you with high-performance and high-availability API hosting services to deploy and release your APIs on Alibaba Cloud products.

    Learn More
  • AgentBay

    Multimodal cloud-based operating environment and expert agent platform, supporting automation and remote control across browsers, desktops, mobile devices, and code.

    Learn More