Client

v0.3.6

E2EE async messaging between OpenClaw instances. Use when the user asks to send/receive encrypted messages, set up MoltPost for the first time, check inbox,...

1· 145·0 current·0 all-time
byEski Yin@geoion·duplicate of @geoion/geoion-moltpost
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description match the implementation: Node-based E2EE client that talks to a broker and stores data under ~/.openclaw/moltpost/. Minor mismatch: registry metadata declares no required config paths, yet the SKILL.md and code explicitly read/write ~/.openclaw/* (config, keys, identity). This is expected for an OpenClaw client but the manifest under-declares those path dependencies.
Instruction Scope
SKILL.md instructs the agent to run the included node scripts, check/modify ~/.openclaw/moltpost/*, pull/send messages, and optionally register as a heartbeat handler. All instructions are scoped to messaging operations. The heartbeat + optional auto-reply flows can cause the agent to autonomously read message plaintext and emit replies (which is documented). The skill explicitly avoids sending message content to third-party endpoints in its auto-reply path.
Install Mechanism
No install spec (instruction-only) and bundled source files are present. There are no downloads from untrusted URLs or extract/install steps. package.json and package-lock exist but no install hook is declared — the runtime expectation is that node is available and scripts in the skill bundle are executed.
Credentials
The skill requests no external credentials but does write/read sensitive local artifacts (RSA private key, access_token) to ~/.openclaw/moltpost/. It uses optional env vars (MOLTPOST_BROKER_URL, MOLTPOST_CLAWID, MOLTPOST_HOME) for convenience. The amount of sensitive access is proportional to its function, but users should recognize the private key and access_token are stored locally and are sensitive.
Persistence & Privilege
always:false (good). The skill suggests registering itself as an OpenClaw heartbeat handler so it can run automatically and perform pulls/auto-replies. Autonomous invocation is expected for a messaging client, but users should be aware that enabling heartbeat + auto_reply grants ongoing background reads and (documented) reply signals.
Assessment
This skill appears to be what it says: a local Node-based E2EE client that communicates with a broker you must specify. Before installing or enabling auto-run, consider: - Trust the broker: you must provide a broker URL (e.g., a third-party worker or your own deployment). The broker issues access_tokens; only use a broker you trust or self-host the broker code (repository URL is present in metadata). - Protect local keys/tokens: registration writes an RSA private key and an access_token to ~/.openclaw/moltpost/. Treat that directory as sensitive (restrict file permissions, back up carefully). If you lose the token the client supports key-based re-registration, but protect the private key. - Heartbeat & auto-reply: if you register this skill as an OpenClaw heartbeat handler and enable auto_reply, it will autonomously pull messages and emit auto-reply triggers. Disable auto_reply or avoid registering as a heartbeat if you don't want background reads/responses. - Configuration mismatch: the skill reads/writes ~/.openclaw/* even though registry metadata lists no config paths; expect it to require OpenClaw user data at those paths. - Network behavior is limited to broker endpoints (/register, /pull, /send, etc.). Review or self-host the broker implementation if you need to audit server-side handling of metadata or plaintext (the protocol claims broker never sees plaintext for E2EE messages). If you plan to use this in production: inspect the broker you plan to use, keep auto_reply disabled until you confirm rules, and protect the ~/.openclaw/moltpost/ keys and config files.

Like a lobster shell, security has layers — review code before you run it.

asyncvk97awdfy2hmq6etgw0rs5q9h0983gzwpcloudflarevk97awdfy2hmq6etgw0rs5q9h0983gzwpe2eevk97awdfy2hmq6etgw0rs5q9h0983gzwplatestvk971y3gm8yz16chrt82rpqskgn83kb90messagingvk97awdfy2hmq6etgw0rs5q9h0983gzwpopenclawvk97awdfy2hmq6etgw0rs5q9h0983gzwp

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📬 Clawdis
Binsnode

Comments