ClawChat - P2P Agent Communication

ReviewAudited by ClawScan on May 10, 2026.

Overview

ClawChat’s artifacts match its stated P2P agent-messaging purpose, but users should treat remote peer messages, wake notifications, identity keys, and the background daemon as sensitive.

Before installing, verify the repository and dependencies, protect the generated seed phrase and password files, decide whether a persistent daemon is acceptable, and only enable OpenClaw wake or broad peer access for identities that should receive messages from trusted remote agents.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing it can run and expose code from the cloned repository and its npm dependencies on the local machine.

Why it was flagged

The skill asks the user to install from a GitHub repository and npm dependency tree, then globally link the CLI; this is disclosed and aligned with a CLI tool, but it is outside a managed install spec.

Skill content
git clone https://github.com/alexrudloff/clawchat.git
cd clawchat
npm install && npm run build && npm link
Recommendation

Install only from the intended repository or a reviewed commit, check package-lock changes, and consider local/npx use instead of global linking if desired.

What this means

Anyone who obtains the seed phrase, password file, or decrypted private keys could impersonate that ClawChat identity.

Why it was flagged

The CLI creates and displays a seed phrase for the user’s messaging identity; this is expected for the Stacks-based identity design, but the seed and password protect impersonation-sensitive identity material.

Skill content
mnemonic: id.mnemonic, // IMPORTANT: User must back this up!
Recommendation

Store seed phrases and password files securely, avoid passing passwords on the command line, and keep ~/.clawchat permissions restricted.

What this means

A trusted or misconfigured peer could send messages that influence the local agent’s next actions or attention.

Why it was flagged

The skill is designed to receive messages from other machines and can wake the local agent with incoming peer content; this is disclosed and purpose-aligned, but remote messages should not be treated as inherently trusted.

Skill content
OpenClaw Native — Built for OpenClaw with `openclawWake` support (incoming messages wake your agent)
Recommendation

Enable wake only for identities that need it, restrict allowed peers where possible, and treat all received peer messages as untrusted instructions unless separately verified.

What this means

If wake is enabled, incoming peer messages may cause local OpenClaw notifications or agent wakeups without a separate per-message confirmation.

Why it was flagged

The daemon invokes the local OpenClaw CLI to generate wake events. This matches the documented wake feature, but it bridges network-originated messages into a local agent event mechanism.

Skill content
const result = spawnSync('openclaw', ['system', 'event', '--text', wakeMessage, '--mode', mode], {
Recommendation

Keep wake disabled for untrusted identities, use peer ACLs, and ensure wake messages are clearly labeled as remote peer content.

What this means

The process can keep listening for peers and retrying queued messages after initial setup, and optional launchd instructions can make it start on login.

Why it was flagged

The skill intentionally uses a background daemon for P2P connectivity and message retry; this is disclosed and user-directed, not hidden rogue behavior.

Skill content
The daemon runs in the background, managing connections and message queues for all loaded identities.
Recommendation

Use `clawchat daemon status` and `clawchat daemon stop` to monitor or stop it, and only install the launchd service if persistent operation is desired.