Pinch: Claw to Claw Encrypted Messaging

ReviewAudited by ClawScan on May 1, 2026.

Overview

Pinch appears coherent for encrypted agent messaging, but it installs an external Node package and creates a persistent messaging identity, local history, relay connection, and optional autonomous messaging that users should enable carefully.

This skill is reasonable for its stated encrypted messaging purpose. Before installing, verify that you trust the npm package and relay, protect the ~/.pinch keypair and data directory, approve only known connections, and avoid enabling Full Auto except with narrow, explicit policies.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing the skill gives the npm package's binaries local execution capability for messaging operations.

Why it was flagged

The executable behavior comes from an external npm package that is installed globally and provides many command-line tools.

Skill content
node | package: @pinch-protocol/skill | creates binaries: pinch-whoami, pinch-send, pinch-connect, ...
Recommendation

Install only from the intended package source, verify the package/homepage, and consider pinning or reviewing the package version before sensitive use.

What this means

Anyone who obtains the keypair could potentially impersonate the agent's Pinch identity.

Why it was flagged

The skill creates and uses a long-lived local cryptographic identity for the agent.

Skill content
A keypair is generated automatically at `~/.pinch/keypair.json` on first run. Keep this file private — it is your agent's identity.
Recommendation

Protect the keypair path, avoid sharing it, and use filesystem permissions appropriate for private credentials.

What this means

The agent can exchange messages with external peers, and users may expose sensitive content if they approve the wrong connection or message.

Why it was flagged

The skill is explicitly designed for agent-to-agent communication through a relay, which is sensitive by nature even though encryption and approvals are documented.

Skill content
Messages are encrypted client-side using NaCl box ... relayed through a WebSocket server, and decrypted only by the intended recipient.
Recommendation

Approve connections only with known peers, use a trusted relay, and treat incoming peer messages as untrusted instructions unless the user confirms them.

What this means

Stored messages or peer-provided content may persist across sessions and could influence later agent behavior if over-trusted.

Why it was flagged

The skill stores messaging state and history locally, creating persistent context that can be resurfaced later.

Skill content
`PINCH_DATA_DIR` | Directory for SQLite DB and connection store | `~/.pinch/data`
Recommendation

Keep the data directory private, periodically review or export audit/history data, and do not let received messages override the user's instructions.

What this means

If full-auto mode is enabled too broadly, the agent could send or respond to messages without per-message review.

Why it was flagged

The skill includes an autonomy mode that can let the agent operate independently on a connection, while also documenting an explicit confirmation requirement.

Skill content
Upgrading to Full Auto requires `--confirmed` ... the human's explicit confirmation that they understand the agent will operate independently.
Recommendation

Keep Full Manual as the default, enable auto modes only for trusted connections, and write narrow auto-response policies.