MCP config
Add to openclaw.json
// openclaw.json — add under mcpServers
{
"mcpServers": {
"keyid": {
"url": "https://keyid.ai/mcp"
}
}
}
OpenClaw
Add KeyID as a remote MCP skill so each agent in your fleet gets a real inbox, phone access, OTP/TOTP, and website verification — free at 1,000 accounts. Replaces paid ClawHub email skills.
KeyID is a remote MCP server. OpenClaw treats every skill as an MCP server, so the integration is native — add the endpoint and your agents get email, SMS, and verification tools.
MCP config
// openclaw.json — add under mcpServers
{
"mcpServers": {
"keyid": {
"url": "https://keyid.ai/mcp"
}
}
}
MCP config
// .mcp.json — same config, alternative path
{
"mcpServers": {
"keyid": {
"url": "https://keyid.ai/mcp"
}
}
}
Migration
KeyID replaces agent-mail and automated-ai-email-setup skills from ClawHub.
No API keys. No per-mailbox pricing.
Free at 1,000 accounts with real inboxes, phone/SMS, and OTP/TOTP.
Remove the old skill and add the KeyID MCP endpoint above.
OpenClaw treats every skill as an MCP server, so KeyID drops in as a native remote skill. Once connected, any agent in the fleet can provision its own inbox, read verification emails, handle OTP/TOTP, and store secrets — all through the standard MCP tool interface.
For multi-agent setups, each isolated agent gets its own KeyID identity. The Gateway routes messages to the right agent, and KeyID keeps each identity's inbox, phone number, and stored credentials separate. No shared state, no cross-agent leakage.
If a workflow needs browser automation — third-party signups, form fills, CAPTCHA-gated flows — let Playwright or a browser skill drive the page while KeyID owns the email address, verification codes, and durable registration state.
Use these in your OpenClaw agent configuration or skill definitions to wire up KeyID-backed email and verification.