Comms Hub Bridge

WarnAudited by ClawScan on May 10, 2026.

Overview

The bridge broadly matches its messaging purpose, but it is preconfigured to a specific hub and gives agents broad cross-agent messaging, file sharing, inbox deletion, and automatic message-processing capabilities with unclear identity and data boundaries.

Only install this if you recognize and trust the configured Comms Hub server and intended agent identity. Before use, replace the packaged config with your own hub settings, avoid uploading sensitive files unless you trust the hub and recipients, and require human approval before processing or deleting messages from other agents.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Private messages or selected files could be sent to, or retrieved from, a bridge server the user did not intend to trust.

Why it was flagged

The packaged config directs bridge traffic to a specific hub and agent identity by default, so messages and uploaded files can go to that hub unless the user notices and changes the config.

Skill content
"hubIp": "208.111.34.11",
  "hubHost": "omni-alienware2025.tail2ccb03.ts.net",
  "hubPort": 443,
  "hubProto": "https",
  "agentName": "plato"
Recommendation

Remove live default hub settings, require explicit user configuration, and document the hub trust model, authentication, authorization, and file-sharing boundaries.

What this means

A misconfigured or abused client could impersonate an agent name, read that inbox, or remove messages from it.

Why it was flagged

The client uses the locally configured MY_NAME as the sender and inbox identity, and acknowledgements delete messages for that identity. The artifacts do not show any credential or token binding that identity to the user.

Skill content
send:        (to, subject, body, priority)      => request('POST',   '/api/bridge/message', { from: MY_NAME, to, subject, body, priority: priority || 'normal' }),
  inbox:       ()                                 => request('GET',    `/api/bridge/inbox/${MY_NAME}`),
  ack:         (messageId)                        => request('DELETE', `/api/bridge/inbox/${MY_NAME}/${messageId}`)
Recommendation

Bind agent names to authenticated credentials or per-agent tokens, and avoid shipping a default identity such as "plato".

What this means

Another agent’s message could steer this agent’s behavior or cause messages to be deleted before a human reviews them.

Why it was flagged

The skill instructs the agent to periodically process and acknowledge messages from other agents, and possibly respond immediately, without saying to treat those messages as untrusted or to seek approval before changing tasks.

Skill content
Check inbox on every heartbeat or periodic interval:

```
1. Run: node scripts/bridge-client.js inbox
2. If messages exist → read, process, ack each
3. If high priority → respond immediately or alert human
4. Log activity to daily memory file
```
Recommendation

Treat bridge messages as untrusted input, require confirmation before acting on new instructions or deleting messages, and preserve audit logs for human review.

What this means

Misleading or malicious bridge messages could be saved and later influence future agent behavior.

Why it was flagged

The skill recommends persisting activity from bridge communications into memory, which can be useful but can also carry untrusted message content into future context.

Skill content
Log activity to daily memory file
Recommendation

Log only bounded summaries, mark bridge-originated content as untrusted, and avoid storing raw external instructions in persistent memory.