Agent Relay
AdvisoryAudited by Static analysis on Apr 30, 2026.
Overview
No suspicious patterns detected.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A trusted or compromised relay participant could cause your agent to process remote content, potentially influencing tool use or decisions.
This documents remote agent-to-agent activation, but the artifacts do not define clear sender identity checks, permissions, or data boundaries for inbound messages.
Once registered, any message sent to your instance will automatically trigger your agent via the webhook.
Use only with a trusted relay and trusted team token; restrict the webhook to a dedicated low-privilege agent, validate senders, and require user approval before acting on remote messages.
The relay can keep waking the agent after setup, including when the user is not actively requesting a relay action.
The setup creates durable remote activation of the agent after a one-time registration, and the provided instructions do not show revocation, expiry, or runtime approval controls.
No persistent connections required. Just register your webhook once and forget about it.
Document and use a clear disable/unregister path, rotate webhook tokens, monitor inbound relay events, and avoid connecting high-privilege agents.
If these tokens are exposed or shared too broadly, someone could publish relay messages or invoke the registered agent webhook.
The relay workflow uses a bearer team token and sends an OpenClaw hook token to the relay, which is expected for this integration but grants meaningful authority.
-H "Authorization: Bearer $RELAY_TEAM_TOKEN" ... "token": "your-openclaw-hooks-token"
Store tokens only in secrets, use dedicated low-privilege tokens, rotate them regularly, and avoid putting them in logs or shared command history.
Sensitive message contents may persist on the relay, and stale or malicious queued messages could later influence the receiving agent.
Messages may be stored by the relay for up to seven days and later delivered into an agent's context.
offline message queued (7-day TTL) + webhook fired
Do not send secrets through the relay unless the relay is trusted and appropriately protected; consider self-hosting and clearing queues when needed.
Users have less provenance information for the relay they are trusting with messages and webhook credentials.
The registry metadata does not provide a source or homepage for the skill, even though the relay service is central to message and token handling.
Source: unknown; Homepage: none
Verify the relay implementation and operator before use; prefer a reviewed self-hosted deployment or a trusted service with clear security documentation.
