Files
moltbot/docs/providers/kilocode.md
Vincent Koc 42e3d8d693 Secrets: add inline allowlist review set (#38314)
* Secrets: add inline allowlist review set

* Secrets: narrow detect-secrets file exclusions

* Secrets: exclude Docker fingerprint false positive

* Secrets: allowlist test and docs false positives

* Secrets: refresh baseline after allowlist updates

* Secrets: fix gateway chat fixture pragma

* Secrets: format pre-commit config

* Android: keep talk mode fixture JSON valid

* Feishu: rely on client timeout injection

* Secrets: allowlist provider auth test fixtures

* Secrets: allowlist onboard search fixtures

* Secrets: allowlist onboard mode fixture

* Secrets: allowlist gateway auth mode fixture

* Secrets: allowlist APNS wake test key

* Secrets: allowlist gateway reload fixtures

* Secrets: allowlist moonshot video fixture

* Secrets: allowlist auto audio fixture

* Secrets: allowlist tiny audio fixture

* Secrets: allowlist embeddings fixtures

* Secrets: allowlist resolve fixtures

* Secrets: allowlist target registry pattern fixtures

* Secrets: allowlist gateway chat env fixture

* Secrets: refresh baseline after fixture allowlists

* Secrets: reapply gateway chat env allowlist

* Secrets: reapply gateway chat env allowlist

* Secrets: stabilize gateway chat env allowlist

* Secrets: allowlist runtime snapshot save fixture

* Secrets: allowlist oauth profile fixtures

* Secrets: allowlist compaction identifier fixture

* Secrets: allowlist model auth fixture

* Secrets: allowlist model status fixtures

* Secrets: allowlist custom onboarding fixture

* Secrets: allowlist mattermost token summary fixtures

* Secrets: allowlist gateway auth suite fixtures

* Secrets: allowlist channel summary fixture

* Secrets: allowlist provider usage auth fixtures

* Secrets: allowlist media proxy fixture

* Secrets: allowlist secrets audit fixtures

* Secrets: refresh baseline after final fixture allowlists

* Feishu: prefer explicit client timeout

* Feishu: test direct timeout precedence
2026-03-06 19:35:26 -05:00

1.7 KiB

summary, read_when
summary read_when
Use Kilo Gateway's unified API to access many models in OpenClaw
You want a single API key for many LLMs
You want to run models via Kilo Gateway in OpenClaw

Kilo Gateway

Kilo Gateway provides a unified API that routes requests to many models behind a single endpoint and API key. It is OpenAI-compatible, so most OpenAI SDKs work by switching the base URL.

Getting an API key

  1. Go to app.kilo.ai
  2. Sign in or create an account
  3. Navigate to API Keys and generate a new key

CLI setup

openclaw onboard --kilocode-api-key <key>

Or set the environment variable:

export KILOCODE_API_KEY="<your-kilocode-api-key>" # pragma: allowlist secret

Config snippet

{
  env: { KILOCODE_API_KEY: "<your-kilocode-api-key>" }, // pragma: allowlist secret
  agents: {
    defaults: {
      model: { primary: "kilocode/anthropic/claude-opus-4.6" },
    },
  },
}

Surfaced model refs

The built-in Kilo Gateway catalog currently surfaces these model refs:

  • kilocode/anthropic/claude-opus-4.6 (default)
  • kilocode/z-ai/glm-5:free
  • kilocode/minimax/minimax-m2.5:free
  • kilocode/anthropic/claude-sonnet-4.5
  • kilocode/openai/gpt-5.2
  • kilocode/google/gemini-3-pro-preview
  • kilocode/google/gemini-3-flash-preview
  • kilocode/x-ai/grok-code-fast-1
  • kilocode/moonshotai/kimi-k2.5

Notes

  • Model refs are kilocode/<provider>/<model> (e.g., kilocode/anthropic/claude-opus-4.6).
  • Default model: kilocode/anthropic/claude-opus-4.6
  • Base URL: https://api.kilo.ai/api/gateway/
  • For more model/provider options, see /concepts/model-providers.
  • Kilo Gateway uses a Bearer token with your API key under the hood.