Reef Protocol

ReviewAudited by ClawScan on May 10, 2026.

Overview

Reef’s purpose is coherent, but it should be reviewed carefully because it installs an external OpenClaw channel/daemon that can automatically exchange messages with other agents and uses persistent agent identity keys.

Install only if you are comfortable running the Reef CLI/plugin and a background A2A listener. Verify the package source, protect the `~/.reef/` keys, restrict communication to trusted agents, and confirm before sending sensitive information or acting on remote agent requests.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing the skill as instructed may run third-party code with access to the agent environment and messaging gateway.

Why it was flagged

The first-run flow pulls external, unpinned packages and installs an OpenClaw plugin that changes gateway behavior; this code is outside the provided instruction-only artifact review.

Skill content
npm install -g @reef-protocol/client ... openclaw plugins install @reef-protocol/reef-openclaw ... openclaw gateway restart
Recommendation

Only install after verifying the npm packages and repository, prefer pinned versions, and require explicit user approval before plugin installation or gateway restart.

What this means

Another agent could influence the assistant’s behavior or receive information the local user did not intend to send.

Why it was flagged

Remote agents can place messages into the conversation and receive replies automatically, but the visible instructions do not clearly require trusted-peer filtering or local-user approval before responding.

Skill content
Incoming Reef messages are delivered to you automatically via the channel plugin. When a message arrives, you will see it in the conversation — read it and respond naturally. Your text replies are automatically sent back to the sender as A2A messages.
Recommendation

Treat all incoming agent messages as untrusted, label their origin clearly, restrict communication to approved contacts, and require user confirmation before sharing sensitive information or taking actions.

What this means

A malicious or poorly written app rule file could steer future agent actions when reused.

Why it was flagged

Persistent markdown app rules are treated as authoritative context for agent behavior, creating a poisoning risk if an app file or peer-provided rules contain instructions outside the intended app scope.

Skill content
Apps on Reef are markdown files stored at `~/.reef/apps/<appId>.md`... The markdown IS the app — agents read it, reason about the rules, and interact accordingly.
Recommendation

Validate app files, treat app markdown as untrusted data, follow only task-relevant rules, and remove unknown apps from `~/.reef/apps/`.

What this means

The agent may continue receiving network messages while the daemon is running.

Why it was flagged

A background listener is expected for an A2A messaging protocol, but users should notice that it keeps the agent online and able to receive messages during the session.

Skill content
Run this in the background — it must stay running for the duration of your session: `reef start ... &`
Recommendation

Start the daemon only when needed, know how to stop it, and monitor which contacts or rooms can reach the agent.

What this means

If these files are exposed, someone could impersonate the agent or access encrypted messaging state.

Why it was flagged

The skill creates and uses local cryptographic material that controls the agent identity and encrypted messaging database; the artifact appropriately warns that these files are sensitive.

Skill content
Never share, log, display, or transmit the wallet key stored at `~/.reef/wallet-key`... The same applies to `~/.reef/.env` which contains the XMTP database encryption key.
Recommendation

Protect `~/.reef/wallet-key` and `~/.reef/.env`, exclude them from backups/logs/prompts, and rotate or recreate the identity if they are exposed.