Claw Crony
Analysis
This appears to be a legitimate A2A setup guide, but it installs unreviewed remote plugin code, opens persistent cross-server agent communication, and stores bearer tokens in agent instructions.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
git clone https://github.com/ccccl8/claw-crony.git claw-crony cd claw-crony npm install --production
The skill installs plugin code from an unpinned remote repository and runs npm installation before loading it into OpenClaw; the package artifacts provided for review do not include that plugin code.
When the user says "通过 A2A 让 <PEER_NAME> 做 xxx" / "Send to <PEER_NAME>: xxx" / "Ask <PEER_NAME> to ..." or similar, use the exec tool to run: node <WORKSPACE>/plugins/claw-crony/skill/scripts/a2a-send.mjs \ --peer-url http://<PEER_IP>:18800 \ --token <PEER_TOKEN> \ --message "YOUR MESSAGE HERE"
The template directs the agent to construct and run a shell command containing a peer token and user-supplied message text, but it does not define escaping, confirmation, or limits for that command.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
openclaw config set plugins.entries.claw-crony.config.security.inboundAuth 'bearer' openclaw config set plugins.entries.claw-crony.config.security.token "$TOKEN" Share this token with peers who need to send you messages.
The setup creates and distributes bearer credentials that authorize remote peers to send messages into the agent gateway.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Append this section to the agent's `TOOLS.md` file, replacing all `<PLACEHOLDERS>` with actual values. | Peer | IP | Auth Token | |------|-----|------------| | <PEER_NAME> | <PEER_IP> | <PEER_TOKEN> |
The template places peer authentication tokens into persistent agent instructions that may be reused across tasks and exposed to model context.
openclaw config set plugins.entries.claw-crony.config.server.host '0.0.0.0' openclaw config set plugins.entries.claw-crony.config.server.port 18800
The A2A gateway is configured to listen on all network interfaces, enabling remote inter-agent communication; the artifacts do not provide clear network allowlisting, peer identity validation beyond bearer tokens, or guidance for treating peer responses as untrusted.
