InterClaw

ReviewAudited by ClawScan on May 10, 2026.

Overview

InterClaw’s purpose is coherent, but it asks you to trust missing or unreviewed helper scripts with email and PGP credentials and optional background mail processing.

Install only from a complete, reviewed source that includes the referenced scripts. Use a dedicated email account, app-specific passwords, and a dedicated PGP key; verify peer fingerprints out of band; and enable background polling only if you are comfortable with ongoing automated email processing.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

You cannot review the actual commands that would receive your email passwords, use your PGP key, and send or process messages.

Why it was flagged

The skill depends on helper scripts and a bootstrap command, but the provided manifest says no code files are present. The unprovided scripts would be the components handling mail, PGP operations, and credentials.

Skill content
files: ["scripts/*", "config/*", "docs/*"] ... ./scripts/interclaw-bootstrap ... Always use `interclaw-send` ... Always verify incoming messages with `interclaw-receive`.
Recommendation

Do not give real credentials to this skill until installing from a complete, pinned source package where the scripts are present and reviewed. Prefer a dedicated mailbox and app password.

What this means

If misconfigured or implemented unsafely, the skill could expose or misuse an email account or PGP identity.

Why it was flagged

The skill needs SMTP/IMAP credentials and a PGP signing identity. This is expected for an email mesh, but it grants authority to access the mailbox and sign messages as the configured agent.

Skill content
INTERCLAW_SMTP_PASS="" ... INTERCLAW_IMAP_PASS="" ... PGP_PRIVATE_KEY_ID="" ... PGP_PASSPHRASE=""
Recommendation

Use a dedicated email account, provider app passwords, and a dedicated PGP key. Avoid reusing a personal mailbox or high-value signing key.

What this means

A mistakenly trusted peer could continue sending messages that the agent treats as valid until that trust is revoked.

Why it was flagged

The skill creates an agent-to-agent communication channel with persistent trusted peers. The protocol includes fingerprints and PGP checks, which are appropriate, but trust decisions are long-lived and sensitive.

Skill content
After successful handshake, agents are permanently trusted (until revoked) ... Only messages signed by these keys will be processed
Recommendation

Verify fingerprints out of band, keep the trusted-peer list small, and periodically audit or revoke stale peers.

What this means

If enabled, the agent may continue checking mail and sending protocol responses in the background.

Why it was flagged

The skill documents optional polling and scheduled operation, plus automatic protocol responses such as ACKs. This is disclosed and aligned with the purpose, but it can keep operating beyond a single user invocation.

Skill content
`interclaw-receive --poll` ... `interclaw-receive --once    # single poll for cron` ... `interclaw-setup-polling` | Optional: set up cron or systemd polling
Recommendation

Only enable polling or cron/systemd setup intentionally, monitor logs, and disable it when not needed.

What this means

Messages and metadata may remain on disk after the conversation is over.

Why it was flagged

The protocol stores conversation state, sent messages, received messages, and logs locally. This supports retransmit and auditability, but it is persistent data that may include sensitive coordination content.

Skill content
~/.interclaw/ ... sent/ ... received/ ... logs/interclaw.log ... sent_archive/<GlobalSeq>.msg
Recommendation

Place INTERCLAW_HOME in a protected directory, restrict file permissions, and define a retention/cleanup practice for archives and logs.