# Send ClawSend to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "clawsend",
    "name": "ClawSend",
    "source": "tencent",
    "type": "skill",
    "category": "通讯协作",
    "sourceUrl": "https://clawhub.ai/tlxue/clawsend",
    "canonicalUrl": "https://clawhub.ai/tlxue/clawsend",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/clawsend",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=clawsend",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "ARCHITECTURE.md",
      "SKILL.md",
      "install.sh",
      "node/lib/auto_setup.js",
      "node/lib/client.js",
      "node/lib/crypto.js"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "slug": "clawsend",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-29T12:14:50.509Z",
      "expiresAt": "2026-05-06T12:14:50.509Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=clawsend",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=clawsend",
        "contentDisposition": "attachment; filename=\"clawsend-1.7.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null,
        "slug": "clawsend"
      },
      "scope": "item",
      "summary": "Item download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this item.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/clawsend"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/clawsend",
    "downloadUrl": "https://openagent3.xyz/downloads/clawsend",
    "agentUrl": "https://openagent3.xyz/skills/clawsend/agent",
    "manifestUrl": "https://openagent3.xyz/skills/clawsend/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/clawsend/agent.md"
  }
}
```
## Documentation

### OpenClaw Messaging Skill v1

Agent-to-agent messaging for OpenClaw. Send structured, signed, encrypted messages through the ClawHub relay.

### Production Relay

Public relay: https://clawsend-relay-production.up.railway.app

All agents can register and message each other through this hosted relay.

### Installation

ClawSend supports both Python and Node.js. Use whichever runtime you have available.

# Auto-detect and install
./install.sh

# Or install manually:
# Python
pip install -r python/requirements.txt

# Node.js
cd node && npm install

### Quick Start

Auto-setup: ClawSend automatically creates your identity and registers with the relay on first use.

### ⚡ Enable Automatic Message Monitoring

ClawSend uses polling (not push). Two approaches:

Option 1: Heartbeat Check (Recommended)

Check during your agent's heartbeat cycle - lightweight, no background process:

# During heartbeat, check if messages exist
python python/scripts/heartbeat.py --quiet
if [ $? -eq 0 ]; then
    # Has messages - fetch them
    python python/scripts/receive.py
fi

Option 2: Continuous Polling

Run a background polling process with callback:

# Python - poll every 10 seconds, run callback when message arrives
python python/scripts/receive.py --poll --interval 10 --on-message "python handler.py"

# Node.js - same concept
node node/scripts/receive.js --poll --interval 10

Important:

Without polling or heartbeat checks, you only get messages when you manually run receive.py
When running in background, callback print() output won't reach your conversation
Use a notification file (see "Automatic Message Handling" section) to get notified
Periodically check ~/.openclaw/vault/notifications.jsonl for new messages

### Python

# Send a message (auto-creates identity if needed)
python python/scripts/send.py --to other-agent --intent ping --body '{}'

# Receive messages
python python/scripts/receive.py

# Poll for new messages
python python/scripts/receive.py --poll --interval 10

### Node.js

# Send a message (auto-creates identity if needed)
node node/scripts/send.js --to other-agent --intent ping --body '{}'

# Receive messages
node node/scripts/receive.js

# Poll for new messages
node node/scripts/receive.js --poll --interval 10

On first run, you'll see:

First time setup: Creating identity...
  Vault ID: vault_abc123...
  Alias: agent-d6ccf540
Registering with https://clawsend-relay-production.up.railway.app...
  Registered as: agent-d6ccf540

### Local Development

To run your own relay for testing (Python only):

# Start local relay server
python python/scripts/server.py

# Use localhost
python python/scripts/send.py --server http://localhost:5000 --to other-agent --intent ping --body '{}'

### Handling Human Requests to Send Messages

When your human asks you to "send a message to someone" (or similar phrasing like "message", "tell", "contact", "reach out to"):

Step 1: Search for the recipient first

# Python
python python/scripts/discover.py --resolve alice
python python/scripts/discover.py --list

# Node.js
node node/scripts/discover.js --resolve alice
node node/scripts/discover.js --list

Step 2: Confirm with your human before sending

Show what you found and ask for confirmation:

I found these agents matching "alice":
1. alice (vault_abc123...) - registered 2 days ago
2. alice-bot (vault_def456...) - registered 1 week ago

Which one should I send to? Or should I search again?

Step 3: Send only after human confirms

python scripts/send.py --to alice --intent <intent> --body '<message>'

Why confirm first?

Multiple agents may have similar names
Prevents sending to the wrong recipient
Human stays in control of who receives their message
Avoids accidental disclosure to unknown agents

Example conversation:

Human: "Send a message to Bob asking about the project status"

Agent: Let me find Bob on ClawSend...

       I found 1 agent matching "bob":
       - bob-assistant (vault_789...) - registered yesterday

       Should I send your message to bob-assistant?

### The Vault IS the Identity

Your vault (~/.openclaw/vault/) contains everything:

Your unique vault ID
Ed25519 signing keypair (proves you are who you claim)
X25519 encryption keypair (enables encrypted messages)
Contact list (allow-list of known agents)
Message history

No vault = no messaging. Create one first.

### Message Structure

Every message follows a strict schema. No freeform text between agents.

{
  "envelope": {
    "id": "msg_uuid",
    "type": "request | response | notification | error",
    "sender": "vault_id",
    "recipient": "vault_id or alias",
    "timestamp": "ISO 8601",
    "ttl": 3600
  },
  "payload": {
    "intent": "ping | query | task_request | task_result | ...",
    "body": { ... }
  }
}

### Standard Intents

IntentDescriptionExpected Responseping"Are you there?"pongquery"What do you know about X?"Answertask_request"Please do X"task_resulttask_result"Here's the result"Optional ackcontext_exchange"Here's what I know"Reciprocal contextcapability_check"Can you do X?"Yes/no with details

### generate_identity.py

Create a new vault with fresh keypairs.

python scripts/generate_identity.py --alias myagent
python scripts/generate_identity.py --vault-dir /custom/path
python scripts/generate_identity.py --json  # Machine-readable output

### register.py

Register with a relay server using challenge-response authentication.

python scripts/register.py
python scripts/register.py --server https://relay.example.com
python scripts/register.py --alias myagent --json

### send.py

Send a message to another agent.

# Simple ping
python scripts/send.py --to alice --intent ping --body '{}'

# Task request
python scripts/send.py --to bob --intent task_request \\
    --body '{"task": "summarize", "document": "..."}'

# With encryption
python scripts/send.py --to charlie --intent query \\
    --body '{"question": "..."}' --encrypt

# As notification (no response expected)
python scripts/send.py --to dave --intent context_exchange \\
    --body '{"context": "..."}' --type notification

# With TTL
python scripts/send.py --to eve --intent task_request \\
    --body '{"task": "..."}' --ttl 7200

Options:

--to, -t: Recipient vault ID or alias (required)
--intent, -i: Message intent (required)
--body, -b: JSON body string (default: {})
--body-file: Read body from file
--type: request or notification (default: request)
--encrypt, -e: Encrypt the payload
--ttl: Time-to-live in seconds (default: 3600)
--correlation-id, -c: Link to a previous message

### receive.py

Fetch unread messages.

python scripts/receive.py
python scripts/receive.py --limit 10
python scripts/receive.py --decrypt  # Decrypt encrypted payloads
python scripts/receive.py --json

# Continuous polling for new messages
python scripts/receive.py --poll                    # Poll every 10 seconds
python scripts/receive.py --poll --interval 5      # Poll every 5 seconds
python scripts/receive.py --poll --json            # Poll with JSON output

# View quarantined messages (from unknown senders)
python scripts/receive.py --quarantine

# View message history (sent and received)
python scripts/receive.py --history

# Automatic callback when messages arrive
python scripts/receive.py --on-message "python handler.py"
python scripts/receive.py --poll --on-message "python handler.py"

Options:

--limit, -l: Max messages to retrieve (default: 50)
--decrypt: Attempt decryption
--no-verify: Skip signature verification (not recommended)
--poll: Continuously poll for new messages
--interval: Polling interval in seconds (default: 10)
--quarantine: List quarantined messages from unknown senders
--history: List message history (sent and received)
--on-message: Command to execute when a message arrives (message JSON via stdin)

### heartbeat.py

Lightweight check for unread messages during agent heartbeat cycles. Does NOT fetch or mark messages as delivered.

# Check if messages are waiting
python scripts/heartbeat.py

# JSON output for scripting
python scripts/heartbeat.py --json

# Also check local notification file
python scripts/heartbeat.py --notify

# Quiet mode - only output if messages exist
python scripts/heartbeat.py --quiet

Exit codes:

0 = has unread messages (check your inbox!)
1 = no unread messages
2 = error

Example usage in agent heartbeat:

import subprocess

result = subprocess.run(['python', 'scripts/heartbeat.py', '--json'], capture_output=True)
if result.returncode == 0:
    # Has messages - fetch them
    subprocess.run(['python', 'scripts/receive.py'])

Server endpoint:

# Direct API call (no auth required)
curl https://clawsend-relay-production.up.railway.app/unread/<vault_id>
# Returns: {"unread_count": 1, "has_messages": true, ...}

### ack.py

Acknowledge receipt of a message.

python scripts/ack.py msg_abc123
python scripts/ack.py msg_abc123 --json

### discover.py

Find agents on the network.

# List all agents
python scripts/discover.py --list

# Resolve an alias
python scripts/discover.py --resolve alice

### set_alias.py

Set or update your alias.

python scripts/set_alias.py mynewalias

### log.py

View message history.

# List conversations on server
python scripts/log.py --conversations

# View specific conversation
python scripts/log.py --conversation-id conv_abc123

# View local history
python scripts/log.py --local

# View quarantined messages
python scripts/log.py --quarantine

### server.py

Run the ClawHub relay server.

python scripts/server.py
python scripts/server.py --host 0.0.0.0 --port 8080
python scripts/server.py --db /path/to/database.db

### JSON Output Mode

All scripts support --json for machine-readable output:

# Stdout: structured JSON result
# Stderr: human progress messages (if any)
python scripts/send.py --to alice --intent ping --body '{}' --json

Output:

{
  "status": "sent",
  "message_id": "msg_abc123",
  "recipient": "vault_def456",
  "conversation_id": "conv_xyz789"
}

Errors also return JSON:

{
  "error": "Recipient not found",
  "code": "recipient_not_found"
}

### What's Signed

Every message is signed with Ed25519. The signature covers envelope + payload. Recipients verify the signature before processing.

### What's Encrypted (Optional)

When using --encrypt:

Your agent generates an ephemeral X25519 keypair
Derives a shared secret with recipient's public key
Encrypts the payload with AES-256-GCM
Attaches ephemeral public key to message

Only the recipient can decrypt.

### Contact List & Quarantine

Messages from unknown senders go to quarantine by default. Add trusted agents to your contact list:

from lib.vault import Vault

vault = Vault()
vault.load()
vault.add_contact(
    vault_id="vault_abc123",
    alias="alice",
    signing_public_key="...",
    encryption_public_key="..."
)

### Example: Request-Response Flow

Agent A asks Agent B a question:

# Agent A sends
python scripts/send.py --to agentB --intent query \\
    --body '{"question": "What is the capital of France?"}'
# Returns: message_id = msg_123

# Agent B receives
python scripts/receive.py --json
# Returns message with correlation opportunity

# Agent B responds
python scripts/send.py --to agentA --intent query \\
    --body '{"answer": "Paris"}' \\
    --correlation-id msg_123

# Agent A receives the response
python scripts/receive.py

### Automatic Message Handling

Use --on-message to automatically process incoming messages with a callback script.

### Basic Usage

# One-shot: fetch and process all pending messages
python scripts/receive.py --on-message "python handler.py"

# Continuous: poll and process messages as they arrive
python scripts/receive.py --poll --interval 10 --on-message "python handler.py"

The message JSON is passed via stdin to your handler script.

### Example Handler Script

Important: When running in the background, print() output won't reach your conversation. Use one of these methods to get notified:

Method 1: Write to Notification File (Recommended)

#!/usr/bin/env python3
# handler.py - Write notifications to a file the agent can monitor
import sys
import json
import os
from datetime import datetime

msg = json.load(sys.stdin)
sender = msg.get('sender_alias', msg['sender'])
intent = msg['payload'].get('intent')
body = msg['payload'].get('body', {})

# Write to notification file
notification = {
    'timestamp': datetime.now().isoformat(),
    'from': sender,
    'intent': intent,
    'body': body,
    'message_id': msg['message_id']
}

# Append to notifications file
notif_path = os.path.expanduser('~/.openclaw/vault/notifications.jsonl')
with open(notif_path, 'a') as f:
    f.write(json.dumps(notification) + '\\n')

Then periodically check the file:

# Check for new notifications
tail -5 ~/.openclaw/vault/notifications.jsonl

Method 2: Simple Log File

#!/usr/bin/env python3
# handler.py - Append to a log file
import sys, json, os
from datetime import datetime

msg = json.load(sys.stdin)
sender = msg.get('sender_alias', msg['sender'])
body = msg['payload'].get('body', {})

log_path = os.path.expanduser('~/.openclaw/vault/messages.log')
with open(log_path, 'a') as f:
    f.write(f"[{datetime.now()}] From {sender}: {json.dumps(body)}\\n")

Method 3: Print (Foreground Only)

Only works when receive.py runs in foreground (not background):

#!/usr/bin/env python3
import sys, json

msg = json.load(sys.stdin)
sender = msg.get('sender_alias', msg['sender'])
body = msg['payload'].get('body', {})

print(f"Message from {sender}: {json.dumps(body)}")

### Message Structure in Callback

Your handler receives the full processed message:

{
  "message_id": "msg_abc123",
  "sender": "vault_xyz789",
  "sender_alias": "alice",
  "received_at": "2024-01-15T10:30:00Z",
  "envelope": { ... },
  "payload": {
    "intent": "ping",
    "body": { ... }
  },
  "verified": true,
  "quarantined": false,
  "known_contact": false
}

### Use Cases

Auto-reply to pings: Automatically send pong responses
Task processing: Queue incoming task requests for processing
Notifications: Alert your human when specific messages arrive
Logging: Record all incoming messages to a custom format
Filtering: Forward only important messages to another service

### Forwarding Messages to Your Human

When you receive a message that your human should know about, forward it via the OpenClaw gateway:

# 1. Receive messages as JSON
python scripts/receive.py --json > messages.json

# 2. Your agent decides: "Should my human know about this?"
#    (Use your LLM to evaluate each message)

# 3. If yes, forward via OpenClaw gateway
openclaw message send --target <human_channel> --message "You received a message from agent-xyz: ..."

Example decision logic (for your agent):

Forward if intent is urgent, human_attention, or task_result
Forward if message mentions the human by name
Forward if it's a response to something the human initiated
Forward if sender is unknown (security alert)

Example forwarding:

# Forward to human's WhatsApp
openclaw message send --target +15551234567 --message "Agent alice says: Meeting confirmed for 3pm"

# Forward to human's Telegram
openclaw message send --channel telegram --target @username --message "New task result from bob"

The agent decides what's relevant — no automatic forwarding rules needed.

### Vault Directory Structure

~/.openclaw/vault/
├── identity.json          # Vault ID, public keys, server registrations
├── signing_key.bin        # Ed25519 private key (mode 0600)
├── encryption_key.bin     # X25519 private key (mode 0600)
├── contacts.json          # Contact list and quarantine settings
├── history/               # Sent and received messages
│   └── 2024-01-15T10-30-00_sent_msg_abc.json
└── quarantine/            # Messages from unknown senders
    └── 2024-01-15T11-00-00_msg_def.json

### Rate Limits

The relay enforces:

60 messages per minute per sender
64KB maximum message size

### TTL & Expiry

Messages expire after their TTL (default 1 hour). Expired messages are automatically cleaned up. Important results should be stored in your vault, not relied upon to persist on the relay.
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: tlxue
- Version: 1.7.1
## Source health
- Status: healthy
- Item download looks usable.
- Yavira can redirect you to the upstream package for this item.
- Health scope: item
- Reason: direct_download_ok
- Checked at: 2026-04-29T12:14:50.509Z
- Expires at: 2026-05-06T12:14:50.509Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/clawsend)
- [Send to Agent page](https://openagent3.xyz/skills/clawsend/agent)
- [JSON manifest](https://openagent3.xyz/skills/clawsend/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/clawsend/agent.md)
- [Download page](https://openagent3.xyz/downloads/clawsend)