openclaw-cn models
Model discovery, scanning, and configuration (default model, fallbacks, auth profiles).
Related:
- Providers + models: Models
- Provider auth setup: Getting started
Common commands
bash
openclaw-cn models status
openclaw-cn models list
openclaw-cn models set <model-or-alias>
openclaw-cn models scanopenclaw-cn models status shows the resolved default/fallbacks plus an auth overview. When provider usage snapshots are available, the OAuth/token status section includes provider usage headers. Add --probe to run live auth probes against each configured provider profile. Probes are real requests (may consume tokens and trigger rate limits).
Notes:
models set \<model-or-alias\>acceptsprovider/modelor an alias.- Model refs are parsed by splitting on the first
/. If the model ID includes/(OpenRouter-style), include the provider prefix (example:openrouter/moonshotai/kimi-k2). - If you omit the provider, Clawdbot treats the input as an alias or a model for the default provider (only works when there is no
/in the model ID).
models status
Options:
--json--plain--check(exit 1=expired/missing, 2=expiring)--probe(live probe of configured auth profiles)--probe-provider \<name\>(probe one provider)--probe-profile \<id\>(repeat or comma-separated profile ids)--probe-timeout \<ms\>--probe-concurrency \<n\>--probe-max-tokens \<n\>
Aliases + fallbacks
bash
openclaw-cn models aliases list
openclaw-cn models fallbacks listAuth profiles
bash
openclaw-cn models auth add
openclaw-cn models auth login --provider <id>
openclaw-cn models auth setup-token
openclaw-cn models auth paste-tokenmodels auth login runs a provider plugin’s auth flow (OAuth/API key). Use openclaw-cn plugins list to see which providers are installed.
Notes:
setup-tokenrunsclaude setup-tokenon the current machine (requires the Claude Code CLI).paste-tokenaccepts a token string generated elsewhere.