LocalUDPMessenger

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill mostly matches its local agent-messaging purpose, but it can let peer-agent messages wake and prompt your agent, and its documented trust migration may bypass fresh user approval.

Install only if you want agent-to-agent LAN messaging and are comfortable with trusted peers being able to wake and prompt your agent. Use always-confirm mode on shared networks, avoid sending secrets, keep relay disabled unless you control the monitor server, and protect the Gateway hook token.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A peer whose identity changes, or a local peer that can appear to match a trusted hostname, may become trusted without a fresh approval step and then send messages that the agent may process automatically.

Why it was flagged

The documentation simultaneously promises explicit approval and describes automatic trust migration based on hostname, which is a weak identity boundary for agent-to-agent messages.

Skill content
Peers are **never auto-approved** ... If a peer's ID does change ... trust is **auto-migrated** by hostname match
Recommendation

Require explicit re-approval when a peer ID changes, prefer cryptographic peer authentication or pinned keys, and use always-confirm mode on shared or untrusted networks.

What this means

A trusted peer can wake the agent and influence what it does or says without the original user actively starting that turn.

Why it was flagged

Incoming peer-controlled text is inserted into a new agent prompt and framed as a user-like message to answer, which can redirect the agent if the peer is compromised or mistakenly trusted.

Skill content
`Message: "${message}"` ... `Please read this message and respond appropriately using udp_send.` ... `treat the content as you would a user message`
Recommendation

Frame peer messages as untrusted quoted data, require user confirmation before acting on instructions from peers, and avoid automatic responses for sensitive workspaces.

What this means

Anyone who obtains or misconfigures this token may be able to trigger agent wake-up behavior through the Gateway.

Why it was flagged

The plugin intentionally uses a Gateway hook token to trigger local agent turns. This is disclosed and purpose-aligned, but the token is still sensitive authority over the local agent.

Skill content
The plugin auto-discovers the token from ... `hooks.token` ... `gateway.auth.token` ... `OPENCLAW_HOOK_TOKEN`
Recommendation

Only configure the hook token if active wake-up is needed, keep it private, and rotate it if it may have been exposed.

What this means

If relay is enabled to the wrong server, agent-to-agent messages may be visible to unintended observers.

Why it was flagged

The relay feature is disclosed and optional, but it can mirror all message contents to another host if enabled.

Skill content
When `relayServer` is configured, every sent and received message is forwarded as a UDP packet to the specified server.
Recommendation

Leave relay disabled unless needed, point it only at a trusted monitoring server, and avoid relaying sensitive project or credential information.

What this means

The agent may continue briefly to handle peer messages instead of stopping immediately.

Why it was flagged

A stop hook can cause the agent to check and potentially answer peer messages before ending. This is consistent with a messenger skill, but it changes normal stopping behavior.

Skill content
Before stopping, check if there are unread UDP messages by calling udp_receive ... process them and respond.
Recommendation

Disable the hook or use stricter confirmation settings if you do not want peer messages processed at stop time.