Install
openclaw skills install lobsterlanCommunicate with other OpenClaw agents on your local network. Use when you need to ask another agent a question (sync), delegate a task (async), or check if...
openclaw skills install lobsterlanTalk to other OpenClaw agents on your LAN.
config/peers.example.json to config/peers.jsonFor sync ask (chat completions):
// Target agent's openclaw.json — keep bind as "loopback"!
{
"gateway": {
"http": {
"endpoints": {
"chatCompletions": { "enabled": true }
}
}
}
}
⚠️ Do NOT set
gateway.bindto"lan"— OpenClaw will refuse to start if the gateway is exposed on a non-loopback address without TLS. Use a secure transport instead (see below).
For async delegate (webhooks):
{
"hooks": {
"enabled": true,
"token": "a-secure-shared-secret"
}
}
OpenClaw gateways default to bind: loopback and will not start with plaintext on non-loopback addresses. You need a secure transport layer for cross-host communication:
| Approach | Complexity | Best For |
|---|---|---|
| SSH Tunnel ⭐ | Low | Home LANs, simple setups |
| Reverse Proxy (TLS) | Medium | Environments with existing Caddy/nginx |
| Tailscale Serve | Medium | Multi-site or remote agents |
For simple LANs, SSH tunneling is recommended. Both gateways stay on loopback, the SSH tunnel provides encryption, and no gateway config changes are needed.
Forward a local port to the remote agent's loopback gateway:
ssh -N -L 18790:127.0.0.1:18790 user@remote-agent-host
Then in peers.json, point the peer to 127.0.0.1:18790 (the local tunnel endpoint).
For persistence, use a systemd user service with Restart=always. See the full setup guide in docs/setup.md.
scripts/lobsterlan.sh ask scotty "What is the CPU temperature?"
Use for quick questions where you need the answer now.
scripts/lobsterlan.sh delegate scotty "Generate 5 zen wallpapers and push to the file share"
Use for long-running tasks. The peer processes independently.
scripts/lobsterlan.sh status scotty
scripts/lobsterlan.sh peers
Run via exec tool:
cd ~/.openclaw/workspace/skills/lobsterlan && scripts/lobsterlan.sh ask scotty "status report"
Three layers protect communication:
X-LobsterLAN-Agent sent with self-IDThe gateway token is the real security boundary. The agent ID header is defense-in-depth for environments where you want explicit identity verification.
LOBSTERLAN_CONFIG — path to peers.json (default: ../config/peers.json relative to script)