docs(plugins): dedup in-process trust refs and add manifest cross-references

- Replace redundant in-process trust statements with cross-references
  to the Execution model section (lines 573, 2436)
- Add CLI reference link from plugin.md CLI section
- Add configuration reference link from manifest.md validation section
- Add provider runtime hooks link from manifest.md providerAuthChoices

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
Vincent Koc 2026-03-17 21:23:10 -07:00 committed by Val Alexander
parent 473ba3149b
commit 371732f399
No known key found for this signature in database
2 changed files with 13 additions and 11 deletions

View File

@ -121,6 +121,8 @@ Example:
- If plugin config exists but the plugin is **disabled**, the config is kept and
a **warning** is surfaced in Doctor + logs.
See [Configuration reference](/configuration) for the full `plugins.*` schema.
## Notes
- The manifest is **required for native OpenClaw plugins**, including local filesystem loads.
@ -131,7 +133,9 @@ Example:
runtime just to inspect env names.
- `providerAuthChoices` is the cheap metadata path for auth-choice pickers,
`--auth-choice` resolution, preferred-provider mapping, and simple onboarding
CLI flag registration before provider runtime loads.
CLI flag registration before provider runtime loads. For runtime wizard
metadata that requires provider code, see
[Provider runtime hooks](/tools/plugin#provider-runtime-hooks).
- Exclusive plugin kinds are selected through `plugins.slots.*`.
- `kind: "memory"` is selected by `plugins.slots.memory`.
- `kind: "context-engine"` is selected by `plugins.slots.contextEngine`

View File

@ -570,7 +570,8 @@ Native OpenClaw plugins can register capabilities and surfaces:
- **Skills** (by listing `skills` directories in the plugin manifest)
- **Auto-reply commands** (execute without invoking the AI agent)
Native OpenClaw plugins run **inprocess** with the Gateway, so treat them as trusted code.
Native OpenClaw plugins run in-process with the Gateway (see
[Execution model](#execution-model) for trust implications).
Tool authoring guide: [Plugin agent tools](/plugins/agent-tools).
Think of these registrations as **capability claims**. A plugin is not supposed
@ -1609,7 +1610,7 @@ openclaw plugins install ./extensions/voice-call # relative path ok
openclaw plugins install ./plugin.tgz # install from a local tarball
openclaw plugins install ./plugin.zip # install from a local zip
openclaw plugins install -l ./extensions/voice-call # link (no copy) for dev
openclaw plugins install @openclaw/voice-call # install from npm
openclaw plugins install @openclaw/voice-call # install from npm
openclaw plugins install @openclaw/voice-call --pin # store exact resolved name@version
openclaw plugins update <id>
openclaw plugins update --all
@ -1618,14 +1619,11 @@ openclaw plugins disable <id>
openclaw plugins doctor
```
`openclaw plugins list` shows the top-level format as `openclaw` or `bundle`.
Verbose list/inspect output also shows bundle subtype (`codex`, `claude`, or
`cursor`) plus detected bundle capabilities.
See [`openclaw plugins` CLI reference](/cli/plugins) for full details on each
command (install rules, inspect output, marketplace installs, uninstall).
`plugins update` only works for npm installs tracked under `plugins.installs`.
If stored integrity metadata changes between updates, OpenClaw warns and asks for confirmation (use global `--yes` to bypass prompts).
Plugins may also register their own toplevel commands (example: `openclaw voicecall`).
Plugins may also register their own top-level commands (example:
`openclaw voicecall`).
## Plugin API (overview)
@ -2433,7 +2431,7 @@ See [Voice Call](/plugins/voice-call) and `extensions/voice-call/README.md` for
## Safety notes
Plugins run in-process with the Gateway. Treat them as trusted code:
Plugins run in-process with the Gateway (see [Execution model](#execution-model)):
- Only install plugins you trust.
- Prefer `plugins.allow` allowlists.